Tough Zentom variant

MobileTechie

Well-Known Member
Reaction score
32
Location
UK
I've a PC in which had the Zentom virus. This was killed off by removing the reg keys and then running MBAM. Now the fake AV bit has gone.

However it, or it's associated rootkit, is still running.

In task manager you can see a file named something like 128320934:3093432.exe which is in the Windows directory. However deleting this offline makes no difference since it appears to be created freshly at boot.

Any program you use that messes with that file, such as Process Explorer or Kernel Detective or a scanner results in the scanner being terminated and then the next time you try to run it, you cannot and are given a permissions error. It's like it adds them to a kill list.

You cannot suspend that exe file as it just does not work. If you kill it, explorer restarts, your app gets killed and it's still there.

TDSSkiller completes a scan and finds nothing.

Autoruns finds nothing unusual.

Hitman Pro completed and found various problems with java exploits, trojans and cookies. Oddly it successfully removed all the infected exes but failed to delete the cookies.

Root Repeal finds odd things, including those cookies being linked to the API. but you cannot make any changes that make any difference.

Offline scans with Kaspersky find nothing at this stage - not bootkits, no startup objects, no infected files.

Yet there that little exe remains and it, or something else, is blocking any move to remove it.

Also weird is the inability to uninstall certain things. I want to run Combofix but AVG cannot be uninstalled. It goes through the process but on reboot - it's still there. I can turn it off but AVG only gives you 15 mins and combofix takes longer than that. I'll give it a go anyway but it's just another unusual feature.

Anyone seen anything like this before?
 
Never seen this particular virus, but here's a suggestions:

Maybe try fixing the MBR (even though TDSSkiller found nothing), and then before rebooting the PC, go into the Windows folder offline, delete the .exe, and see if that works.
 
Turns out it was the Zero Access rootkit. Info here: http://blog.webroot.com/2011/07/19/zeroaccess-gets-another-update/ except mine didn't infect disk.sys but another driver instead.

And here: http://hitmanpro.wordpress.com/2011/07/15/zeroaccess-rootkit-strikes-back/ - except Hitman did not remove it in my case. Hitman did run unlike other apps but didn't actually remove it.

Combofix sorted it.

I think fixmbr would have been a good idea.

Reading up on it a bit it seems that it mounts a virtual volume and stores its files in there and they are symbolically linked. Maybe that explains the : in the middle of filename as shown in task manager? So security apps have difficulty deleting the files online and they don't exist offline as such.
 
Last edited:
Very clever idea to mount a virtual disk to contain the files so that offline file recognition does not work.
 
Back
Top