Malware using BITS to download its payload...

BehindEnemyLines

Senior member
Jul 24, 2000
979
0
76
I spent about five hours investigating why I was getting DEP protection error on Explorer.exe. It kept crashing with memory cannot be read and DEP error. This happens immediately at start-up.

Apparently my visiting brother had used my computer while I was asleep (it was 1am).

NOD32 v2.70.39 with 07/14/2007 updates immediately caught THREE files being "modified" by svchost.exe that had the name: BIT20DF.tmp, BIT20EF.tmp, BIT20??.tmp. It flagged those as new unknown heuristic PE virus. This happens at the first start-up.

RogueRemover v1.20 gives the following in C:\WINDOWS\:
1. msddx.dll, msqnx.dll, a third dll file as Rogue.Misc (some sort of downloader)
2. two registry settings for the first two dll files.

SUPERAntiSpyware (latest) gives the following:
1. Same files and registry as RogueRemover except without the third dll file.
2. Some folder as NewMediaCodec (the folder was empty when I checked before removing).

I used RogueRemover to remove all those files and then SUPERAntiSpyware to remove the rest. Kaspersky online scan came up clean, but it gave me warnings of a few locked files. Most of them belonged to Windows Desktop Search but two are in: C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader



Background Intelligent Transfer Service (BITS) as co-conspirator
The two files in the folder are: qmgr0.dat and qmgr1.dat which are locked by svchost.exe according to Unlocker v1.85. I was able to use Notepad to view the two files (mostly cryptic characters with a few visible plain text http links).

Both of them contained a link to the file: hxxp://update.bestmange.org/xarv0077.exe (can't remember the exact link and filename). Used Flashget to download it, but NOD32 wouldn't let it finish. The file was identified as a new unknown heuristic PE virus. There were also filenames of Windows Update security fixes.

The second link was something like http://195.xxx.xxx.xxx/?????/ which Dr. Web online website scan reveals it's a link to download a malware.

I believe BITS was used to download whatever else after the initial infection with the possible ability to bypass the Firewall, since BITS is probably trusted (Comodo Firewall). I read recently that BITS might be exploited for malicious purposes, and this might be one of it.

*******************************

EDITED:
Needless to say, I am pretty mad at him for downloading something from a pop-up asked him if he wanted to run the file. He wouldn't tell me how he got it, but my guess is some xxx website. The explorer.exe crashing and DEP errors stopped. To be safe, I will restore an image I had made about two months ago.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
That sounds like NewMediaCodec to me. same methodology noted here

bestmanage.org is bad news. Sorry to say that yes, it is XXX stuff typically used as bait. If you haven't already tried System Restore, try that next if any symptoms persist. Otherwise, I have some firsthand experience removing these and can PM you some suggestions.
 

BehindEnemyLines

Senior member
Jul 24, 2000
979
0
76
Originally posted by: mechBgon
That sounds like NewMediaCodec to me. same methodology noted here

bestmanage.org is bad news. Sorry to say that yes, it is XXX stuff typically used as bait. If you haven't already tried System Restore, try that next if any symptoms persist. Otherwise, I have some firsthand experience removing these and can PM you some suggestions.

Please PM me with your suggestions when you've the time. I intend on restoring the image, but it would be good for future reference. I had read a few of your tutorials on non-admin and software policy, and I will implement these tomorrow.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
Sure thing, I'll drop you a PM. BTW, be aware that the Kaspersky online scanner doesn't scan the system's active processes / memory (last I checked), so running malware could evade it.

Trivia time: the cuplrit is probably hXXp://setup.bestmanage(dot)org/xar6000v7.exe. VirusTotal results for that file at this time...

File xar6000v7.exe received on 07.16.2007 07:17:19 (CET)

AhnLab-V3 2007.7.14.0 2007.07.16 no virus found
AntiVir 7.4.0.42 2007.07.15 TR/Dldr.Alphabet.LH1
Authentium 4.93.8 2007.07.13 no virus found
Avast 4.7.997.0 2007.07.16 Win32:Alphabet-C
AVG 7.5.0.476 2007.07.15 no virus found
BitDefender 7.2 2007.07.16 Generic.Drop.Alpha.D5CBFC53
CAT-QuickHeal 9.00 2007.07.14 (Suspicious) - DNAScan
ClamAV devel-20070416 2007.07.16 no virus found
DrWeb 4.33 2007.07.15 Trojan.DownLoader.25873
eSafe 7.0.15.0 2007.07.10 Suspicious Trojan/Worm
eTrust-Vet 30.8.3784 2007.07.14 no virus found
Ewido 4.0 2007.07.14 no virus found
FileAdvisor 1 2007.07.16 no virus found
Fortinet 2.91.0.0 2007.07.16 W32/Nonaco.I!tr.dldr
F-Prot 4.3.2.48 2007.07.13 no virus found
Ikarus T3.1.1.8 2007.07.16 Trojan-Downloader.Win32.Alphabet.i
Kaspersky 4.0.2.24 2007.07.16 Trojan-Downloader.Win32.Alphabet.i
McAfee 5074 2007.07.13 no virus found
Microsoft 1.2704 2007.07.16 TrojanDownloader:Win32/Nonaco.A
NOD32v2 2399 2007.07.14 probably unknown NewHeur_PE virus
Norman 5.80.02 2007.07.13 no virus found
Panda 9.0.0.4 2007.07.15 Suspicious file
Sophos 4.19.0 2007.07.06 Troj/Nonaco-Gen
Sunbelt 2.2.907.0 2007.07.14 VIPRE.Suspicious
Symantec 10 2007.07.16 no virus found
TheHacker 6.1.6.146 2007.07.13 no virus found
VBA32 3.12.0.2 2007.07.16 no virus found
VirusBuster 4.3.23:9 2007.07.15 no virus found
Webwasher-Gateway 6.0.1 2007.07.16 Trojan.Dldr.Alphabet.LH1

Aditional information
File size: 20992 bytes
MD5: 9dd03e148e30d2f821fd738fcf44e194
SHA1: 5f42e7245983e2660b281f8b3b0adb3c7fddf69f
packers: PECompact, PECompact
packers: PECOMPACT
packers: embedded, PecBundle, PECompact

This shows why not to expect miracles from antivirus alone, I guess. A non-Administrator user account certainly might be a good idea in the future, it would have prevented this episode.
 

John

Moderator Emeritus<br>Elite Member
Oct 9, 1999
33,944
2
81
Symantec Corp 10.1 does not detect anything malicious in xar6000v7.exe, but SUPERAntiSpyware flags it as a trojan.downloader-gen/avp

 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
The usual fallout of NMC is something like a Zlob, plus it's got a couple of bots performing click-fraud non-stop behind the user's back as well. screenshot from my infected test rig

Stuff needing removed via HJT :camera: in Safe Mode With Command Prompt

Another notable characteristic besides the BITS trick: it actively blocks installation of at least one spyware-removal program (Spybot S&D).


edit: for those interested, another file that is downloaded by means of BITS at the beginning of the NMC infection is nmextensions(DOT)com/soft/components-exe/install_cn.exe, which presently resolves to 195.225.117.206.

VirusTotal results for that file at this time are even worse. I know behavioral analysis might catch this on some security software even if heuristics and signatures fell through, so don't read this as Gospel, but it is more reason to use additional layers of protection, e.g. keeping people off your system's Admin accounts.

File install_cn.exe received on 07.16.2007 16:49:17 (CET)

AhnLab-V3 2007.7.14.0 2007.07.16 no virus found
AntiVir 7.4.0.42 2007.07.16 no virus found
Authentium 4.93.8 2007.07.13 no virus found
Avast 4.7.997.0 2007.07.16 no virus found
AVG 7.5.0.476 2007.07.15 no virus found
BitDefender 7.2 2007.07.16 DeepScan:Generic.Downloader.NXM.E508A3C9
CAT-QuickHeal 9.00 2007.07.16 no virus found
ClamAV devel-20070416 2007.07.16 no virus found
DrWeb 4.33 2007.07.16 no virus found
eSafe 7.0.15.0 2007.07.10 no virus found
eTrust-Vet 30.8.3787 2007.07.16 no virus found
Ewido 4.0 2007.07.14 no virus found
FileAdvisor 1 2007.07.16 no virus found
Fortinet 2.91.0.0 2007.07.16 no virus found
F-Prot 4.3.2.48 2007.07.13 no virus found
Ikarus T3.1.1.8 2007.07.16 no virus found
Kaspersky 4.0.2.24 2007.07.16 no virus found
McAfee 5074 2007.07.13 no virus found
Microsoft 1.2704 2007.07.16 no virus found
NOD32v2 2400 2007.07.16 no virus found
Norman 5.80.02 2007.07.16 no virus found
Panda 9.0.0.4 2007.07.16 no virus found
Sophos 4.19.0 2007.07.16 no virus found
Sunbelt 2.2.907.0 2007.07.14 no virus found
Symantec 10 2007.07.16 no virus found
TheHacker 6.1.6.147 2007.07.16 no virus found
VBA32 3.12.0.2 2007.07.16 no virus found
VirusBuster 4.3.23:9 2007.07.15 no virus found
Webwasher-Gateway 6.0.1 2007.07.16 no virus found

Aditional information
File size: 244095 bytes
MD5: ed043dfe8a43881b705a2eb5d11f8fdd
SHA1: 16867edacdf5712cdf340c8a5f9c14073b4070c5
packers: BINARYRES