Pal

CLOSED simplitec and Application.BitCoinMiner.SX (B)

Recommended Posts

Emsisoft Anti-Malware scan shows that there is an application that cannot removed, the scan results are attached on the file


There were also some other files from previous scans I would like help with.

The folders were not affected by selecting the option to quarantine.  When I click the folders it says that I do not have permissions to access.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12/14/2017 8:48:39 PM
Behavior Blocker detected suspicious behavior "TrojanDownloader" of "C:\Users\Pasue-A240\AppData\Local\scewlnt\scewlnt.exe"

12/14/2017 8:48:39 PM
A notification message "Suspicious behavior has been found in the following program: C:\Users\Pasue-A240\AppData\Local\scewlnt\scewlnt.exe" has been shown

12/14/2017 8:48:42 PM
User "PASUE-A240\Pasue-A240" clicked "Quarantine now"

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12/14/2017 8:29:45 PM
Behavior Blocker detected suspicious behavior "CryptoMalware" of "C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe"

12/14/2017 8:29:47 PM
A notification message "Suspicious behavior has been found in the following program: C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe" has been shown

12/14/2017 8:29:50 PM
User "PASUE-A240\Pasue-A240" clicked "Quarantine now"


------------------

scan_171214-204854.txt

Share this post


Link to post
Share on other sites

Do the following:

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

(TOSHIBA CORPORATION) C:\Windows\System32\wemrsutsvc.exe
() C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
() C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
() C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
() C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
() C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
() C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
GroupPolicy: Restriction <==== ATTENTION
2017-12-14 20:46 - 2017-12-14 20:46 - 000142136 ____N C:\WINDOWS\system32\Drivers\dtdruxbe.sys
2017-11-30 15:18 - 2017-12-04 21:29 - 000000000 ____D C:\Users\Pasue-A240\AppData\Local\iasbhpv
2017-11-30 15:13 - 2017-12-15 00:06 - 000000000 ____D C:\Users\Pasue-A240\AppData\Local\scewlnt
2017-11-30 15:13 - 2017-11-30 15:17 - 000000000 ____D C:\Users\Pasue-A240\AppData\Local\igfxmtc
2017-11-30 15:12 - 2017-12-14 20:47 - 002884096 _____ (TOSHIBA CORPORATION) C:\WINDOWS\system32\wemrsutsvc.exe
2017-11-30 15:12 - 2017-11-30 15:12 - 000000020 _____ C:\WINDOWS\b80227600
C:\WINDOWS\system32\drivers\dtdruxbe.sys
C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
C:\Windows\System32\wemrsutsvc.exe
C:\ProgramData\simplitec
C:\Users\Pasue-A240\AppData\Local\iasbhpv

Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Share this post


Link to post
Share on other sites

Let's see if that managed to disable the active piece of SmartService.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Share this post


Link to post
Share on other sites

upon reboot EEK detected scewInt.exe and cobpkum.exe again

 

12/19/2017 4:51:49 PM
Behavior Blocker detected suspicious behavior "CryptoMalware" of "C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe"

12/19/2017 4:51:59 PM
A notification message "Suspicious behavior has been found in the following program: C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe" has been shown

12/19/2017 4:51:45 PM
Behavior Blocker detected suspicious behavior "TrojanDownloader" of "C:\Users\Pasue-A240\AppData\Local\scewlnt\scewlnt.exe"

12/19/2017 4:51:45 PM
A notification message "Suspicious behavior has been found in the following program: C:\Users\Pasue-A240\AppData\Local\scewlnt\scewlnt.exe" has been shown


 

system-log.txt

mbar-log-2017-12-19 (16-34-46).txt

Share this post


Link to post
Share on other sites

Download Farbar Recovery Scan Tool x64 and save it to a flash drive.

Copy the below code to Notepad; Save As fixlist.txt to your Flashdrive.

C:\WINDOWS\System32\wemrsutsvc.exe
C:\WINDOWS\SysWOW64\dsaipth
C:\WINDOWS\System32\dsaipth
C:\WINDOWS\System32\Drivers\dtdybeil.sys
c:\WINDOWS\System32\Drivers\filpsv.sys
C:\Users\Pasue-A240\AppData\Local\iasbhpv
c:\users\pasue-a240\appdata\local\igfxmtc\igfxmtc.exe
C:\Users\Pasue-A240\AppData\Local\igfxmtc
C:\Users\Pasue-A240\AppData\Local\scewlnt\cobpkum.exe
C:\Users\Pasue-A240\AppData\Local\scewlnt
C:\ProgramData\simplitec
Reg: reg delete "HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\UDISKMGR" /v "ImagePath" /f
Reg: reg delete "HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\UDISKMGR" /f

Close Notepad.

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select English as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.


To enter System Recovery Options by using Windows installation disc:

Share this post


Link to post
Share on other sites

That was somewhat successful.  The Coin miner is still present and a driver.

Download AdwCleaner and save it on your desktop.

  1. Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
  2. Double click on adwcleaner.exe to run the tool.
  3. Click on the Scan button.
  4. After the scan has finished, click on the Clean button.
  5. Confirm each time with OK.
  6. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
  7. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
    NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.

Share this post


Link to post
Share on other sites

AdwCleaner removed some Conduit related stuff, but nothing CoinMiner related.

Changing tools.

Download RogueKiller from https://www.fosshub.com/RogueKiller.html and save it to your desktop.

• Double-click on setup.exe to install RogueKiller.

Close all programs and disconnect any USB or external drives before running the tool.

• Right-click RogueKiller.exe and select Run As Administrator to run the tool.
• Once the Prescan has finished, click Scan.
• Once the Status box shows "Scan Finished", click on the "Report" button and attach the scan log to your reply.

Share this post


Link to post
Share on other sites

Close all programs and disconnect any USB or external drives before running the tool.

  • Double-click RogueKiller.exe to run the tool again (Vista/7/8/10 users: Right-click and select Run As Administrator).
  • Once the Prescan has finished, click Scan.
  • Once the Status box shows "Scan Finished".
    • Select the following items:
      [PUP.Gen1][Folder] C:\ProgramData\simplitec -> Found
      [PUP.Gen1][Folder] C:\ProgramData\simplitec -> Found
    • Click the Delete button.

  • Attach the RogueKiller report to your next reply.
    • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex.txt)
    • The highest number of [X], is the most recent Delete log.


That should delete the Simpletec folder.  If it doesn't then we'll check to see if the folder is empty or not.

RogueKiller found no CoinMiner related issues.

Share this post


Link to post
Share on other sites

Let's take a fresh look.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Be sure to let me know how things are running.

Share this post


Link to post
Share on other sites

There is a good chance that the Simplitec folder could be empty.

Please download SystemLook (x64) http://images.malwareremoval.com/jpshortstuff/SystemLook_x64.exe and save it to your desktop.

  • Double-click SystemLook_X64.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :dir
    C:\ProgramData\simplitec /s /md5
    C:\Users\All Users\simplitec /s /md5
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please attach this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt

Everything else in the EEK scan report is in the FRST Quarantine folder.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

S3 udiskMgr; system32\drivers\psvzcf.sys [X]
2017-12-27 01:30 - 2017-12-27 01:30 - 000142136 ____N C:\WINDOWS\system32\Drivers\dtdosvyb.sys

Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Share this post


Link to post
Share on other sites

The folder C:\ProgramData\simplitec is empty.  Since it contains no files it posses no threat.  You can whitelist the detection.

That should take care of everything.

How are things running?

Share this post


Link to post
Share on other sites

Unless you are having problems, it is time to do the final steps.

Now to remove most of the tools that we have used in fixing your machine:

Download Delfix from here and save it to your desktop.

  • Ensure Remove disinfection tools is checked.
  • Also place a checkmark next to:
    • Create registry backup
    • Purge system restore
  • Click the Run button.

When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad.

Empty the Recycle Bin

You can delete and uninstall any programs I had you download, that you do not wish to keep on the system.

To Remove EEK simple delete the EEK for in the of your System Drive, normally C:\EEK

Run Windows Update and update your Windows Operating System.

Articles to Read:
How to Protect Your Computer From Malware
How to keep you and your Windows PC happy
Web, email, chat, password and kids safety
How Did I Get Infected?

That should take care of everything.

Safe Surfing!

Share this post


Link to post
Share on other sites

Thread Closed

Reason: Resolved

The procedures contained in this thread are for this user and this user only.  Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair.  Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.