Adware/Malware/Rootkit (Windows)

Authored by: Support.com Tech Pro Team

1. Gather information

Gather Information

Evaluate and notate symptoms (all installed browsers, common malware, installed programs, customer stated symptoms, etc) on the ticket.

2. Disable Antivirus

Disable Antivirus


Generally, just right mouse click on the AV icon in the system tray and use the AV's menu to disable active scanning. Make sure that the AV is disabled for the duration of the service.

 

Disabling Major Anti-Virus Software

Disabling Kaspersky (which should no longer be used) and Trend Micro AVs will sometimes cause the AV to lock the screen in a way that cannot be approved remotely. You must get the customer or Store Agent to complete the disabling process with these AVs. 

Avast 

Avast does not have a timed disable function - you must re-enable the AV at the end of the service.Avast

  1. Right Mouse click on the red umbrella icon in the system tray.
  2. Uncheck AntiVir Guard enable.

Windows Defender/MSE

Windows Defender does not have a timed disable function - you must re-enable the AV at the end of the service.

MSE

If the green MSE icon exists the in the system tray:

  1. Right click the icon.
  2. Open.
  3. Settings.
  4. Real-time protection.
  5. Uncheck "Turn on real time protection".
  6. Save .

Win10

  1. Control panel.
  2. Windows Defender.
  3. Settings.
  4. Switch Real-time Protection off.

WinXP-7

  1. Control panel.
  2. Windows Defender.
  3. Tools.
  4. Options.
  5. Uncheck "Use real-time protection".
  6. Save.

McAfee

  1. Right click the red M icon in the system tray.
  2. Real-time scanning.
  3. Change settings.
  4. Turn off.
  5. Select a duration close to the amount to time to deliver this ticket (do not choose "Until next reboot" as you will have to repeat this process each reboot).

Symantec/Norton

  1. Right click on the Norton icon in the system tray (almost always a black on yellow icon).
  2. Click "Disable Auto-Protect".
  3. Select a duration close to the amount to time to deliver this ticket (do not choose "Until next reboot" as you will have to repeat this process each reboot).
  4. Click OK.

3. Run SSC

Run SDC_SSC

One of the most time-consuming functions that you can do is check for malware on a computer where no symptoms exist. Customers may suspect they’ve been attacked or infected in some way that isn’t apparent to them. When we encounter customers who have this issue, they may ask us, could you please just check my system for malware? This can be extremely time-consuming. If you run the entire malware removal procedure on certain older machines, this could be a 20 to a 40-minute investment of time. Most of the time, you’ll find nothing.

In order to speed this process and in order to get to an understanding of whether a computer is properly infected or not, there is a short procedure called Simple Symptoms Check, also known as SSC. The easiest way to run SSC on a customer PC is to push the SDC_SSC application. It is on the Approved Tools list as well as within Cloud, shown as “SDC SCC” in the Push Dropdown List. This deploys Process Explorer, AutoRuns, and appwiz, and will allow us to check the computer very quickly for the presence of malware on the system.

  1. Launch SDC_SSC from http://pdg.support.com/tools/SDC_SSC.exe
  2. SDC_SSC will automatically download AR, PE, and launch appwiz.cpl. The tools will also be automatically configured for optimal use (signature verification enabled in AR/PE, DLL view in PE).

If the customer's issue can be solved by using only SSC tools, then there is no need to deploy other tools (SysPrep, STK/GPfw/etc. Using additional tools to look for an infection that isn't present will only increase handle time. 

4. SSC Malware Check - Process Explorer

Malware Check - Process Explorer

  1. Launch PE.
  2. Maximize the PE window.
  3. Check DLLs windows for anything suspicious for each of the major components in the upper section.
  4. Check DLLs for CHILD internet browser processes.
  5. Examine running processes for symptoms of malware as instructed in training.
  1. One of the most prevalent places for malware to hang out is under System in Process Explorer. This should be the first place that you go and visit. Normally, a few seconds after you start, it will populate the bottom section of the window. Wait for it to finish. Sort by company name, and the important thing you’re looking for here are files marked not as Microsoft. As long as they say verified beside it, they can be ignored.
  2. VirusTotal is not definitive. A zero score on VT does not mean that a file is not malware. You will miss infections if you assume that VT is correct when it reads 0/56. VT will only show you infections that it knows about. If a brand new infection came out that day, or if there is a polymorphic infection, it will not know about it. What you should be looking for are applications that do not have verification, a company name, and a file name where the name seems to be a random number of characters.
  3. Occasionally, random Chinese AV companies associated with VT will flag items as false positives. This is normal and usually indicated when you see hits of 1-3/56. If you see multiple detections of 5+, then that may be a good reason to run a full malware scan.
  4. The files dump_dumpdata.sys, dump_atapi.sys, dump_dumpfve.sys should always be ignored
  5. Look for potential browser hijacks where you see multiple instances of a browser, E.G. chrome.exe running in the background, but the browser appears to not be running for the user. Terminate these instances in PE and look for the system to relaunch them.
  6. Perform quick research on files that are not digitally signed to determine if they are known bad.

5. Run Sysprep

Run SDC_Sysprep

The purpose of SysPrep is to save time by automating three functions we should be running on all malware based tickets. When you start it, it'll start three programs in order and cause each of them to start scanning:

  • SDC_PreClean (clean out the temp files)
  • MBAM (download our version, install in a separate folder from 2.2 (if it's installed), update to latest virus database, start an automatic scan)

In order to automate MBAM for scanning in SysPrep, we are manually updating the virus database. This database lags behind the daily update by a few days (almost always less than a week). The automatic scan with this slightly old database is perfectly acceptable for our processes. There is no need to manually update the database and re-scan as that will only add an unacceptable amount of time to the ticket.

  1. Launch SDC_Sysprep from http://pdg.support.com/tools/SDC_SysPrep.exe (if it's not already included in an STK).
  2. SDC_Sysprep will automatically download and run SDC_PreClean. Click 'Close' when done.
  3. SDC_Sysprep will automatically download and run MBAM.
  4. Remove PUPs:
  5. Go through the STK's Installed Programs or AppWiz.cpl and remove all PUPs from the system. Consult http://shouldiremoveit.com if unsure of a particular entry.
  6. If a PUP is not uninstalling from the program’s uninstaller, then skip to removal by MBAM and return afterwards to verify whether it is still an issue.
  7. MBAM Configuration, Run, Review, and Cleanup
  8. Configuration - MBAM 2.0 should only be used in the rare circumstance that it already exists on the system. In all other cases we should be installing MBAM 1.75, and declining the upgrade to 2.0 during installation. Whether 1.75 or 2.0 is being used, the definitions must be updated prior to initiating scan. If 2.0 is accidentally upgraded to, it must be uninstalled and the correct version installed.
  9. Run â€“ Only Quick Scan should be used. 
  10. Review â€“ Review the MBAM results to verify that there are no false-positives or other issues with the quarantining and removal of results.

6. Run Sysprep - Post

Post-SDC_Sysprep Steps

  1. MBAM:
  2. If applicable, quarantine unwanted results but do not reboot at this time.
  3. Quarantine / removal may take extra time depending on PC specs and amount of items found. If you find that MBAM is unable to perform the cleanup then look at the log and evaluate what you could remove manually. For example, a PUP with many files can be uninstalled via appwiz.cpl, or a folder with a ton of .log files could be purged manually, etc.
  4. If removal had to be performed in MBAM then a reboot is necessary. If clean then no reboot is required.

7. Post Reboot Cleanup - MBAM

Post Reboot Cleanup for MBAM

  1. Open MBAM and empty/delete the quarantined entries.
  2. Attach logs from both tools to the ticket.

8. Browser - Open All

Launch All Internet Browsers

  1. Open all browsers (for example Internet Explorer, Firefox, Chrome, Edge, Safari). This is necessary for the next steps.

9. Malware Check - Process Explorer

Malware Check - Process Explorer

  1. Launch PE.
  2. Set up PE as instructed in training.
  3. Maximize the PE window.
  4. Check DLLs windows for anything suspicious for each of the major components in the upper section.
  5. Check DLLs for CHILD internet browser processes.

10. Advanced Malware Removal/Escalate

Use Advanced Malware Removal Techniques/Escalate

  1. If your scope prevents use of manual removal techniques, escalate at this time
  2. Use advanced malware removal techniques in order to remove the infections found. Use any applicable tool like Process Explorer, Autoruns, cacls and so on.
  3. Use resources such as:
  4. Support.com KB
  5. Google Search
  6. If you are unable to find a fix, or if a fix fails then complete this step and continue on.

11. Browser - Verification

Browser Verification

Check Internet Explorer and other browsers for possible browser hijacks and redirects. Open multiple tabs to ensure we haven't missed anything. Clean up the browser if necessary. See below.

Internet Explorer

  1. Make sure all IE windows are closed (verify in PE if necessary).
  2. Open the Run box by pressing WIN + R.
  3. Copy and paste the following and press ENTER:
    inetcpl.cpl
  4. Go to the 'Connections' tab.
  5. Click on 'LAN Settings'.
  6. Uncheck all boxes, then click 'OK'.
  7. Go to the 'Security' tab.
  8. Click 'Reset all zones to default level'. The button is grayed out when the settings are already default.
  9. Click 'Trusted sites' then click the 'Sites' button.
  10. Highlight and Remove any harmful websites listed. Leave helpful websites in the list.
  11. Hit 'Close' when done.
  12. Click 'Restricted' sites then click the 'Sites' button.
  13. Highlight and Remove any helpful websites listed. Leave harmful websites in the list.
  14. Hit 'Close' when done.
  15. Go to the 'Programs' tab.
  16. Click the 'Manage add-ons' button.
  17. Click the 'Toolbars and Extensions' tab.
  18. Click the show drop-down box and select 'All add-ons'. Review all entries.
  19. Click the show drop-down box and select 'Currently Loaded'. Review all entries.
  20. Click the show drop-down box and select 'Run Without Permission'. Review all entries.
  21. Click the 'Search Providers' tab.
  22. Review search providers for any PUPs or malicious entries that need to be removed.
  23. Click the 'Accelerators' tab.
  24. Review search providers for any PUPs or malicious entries that need to be removed.
  25. Click 'OK'.
  26. Go to the 'General' tab.
  27. Verify Homepage is not malicious. If you do not recognize the website, google search it first.
  28. Click 'OK'.
  29. Open IE and verify shortcut opens successfully.
  30. Right mouse click on any browser shortcut and go to 'Properties'.
  31. Verify that the Target only contains the path to the EXE and nothing else.
  32. "C:\Program Files\Internet Explorer\iexplore.exe" with nothing after it.
  33. Verify a new tab can be opened successfully, and go to an approved site to validate browser functionality. Verify adverts on site are non-malicious by checking the link to the ad and verifying that the options in the upper right are available.
  34. Run a search for an approved search term through both the omnibox (built-in search) and through http://google.com, and click on the first search result to verify you arrive at the expected site.
  35. Verify ad results using the approved Ad site.

Firefox

  1. Enter 'about:plugins' into address bar and hit enter.
  2. Review plug-ins and remove any that are malicious.
  3. Check 'settings'.
  4. Remove any malicious extensions.
  5. Remove any malicious services.
  6. Verify Homepage is not malicious.
  7. Right mouse click on any browser shortcut and go to 'Properties'.
  8. Verify that the Target only contains the path to the EXE and nothing else.
  9. "C:\Program Files (x86)\Mozilla Firefox\firefox.exe" with nothing after it.
  10. Open Firefox and verify shortcut opens successfully.
  11. Verify a new tab can be opened successfully, and go to an approved site to validate browser functionality. Verify adverts on site are non-malicious by checking the link to the ad and verifying that the options in the upper right are available.
  12. Run a search for an approved search term through both the omnibox (built-in search) and through http://google.com, and click on the first search result to verify you arrive at the expected site.
  13. Verify ad results using the approved Ad site.

Chrome

  1. Enter 'chrome://extensions' into address bar and hit Enter.
  2. Review plug-ins and remove any that are malicious.
  3. Check Settings.
  4. Remove any malicious extensions.
  5. Verify Homepage is not malicious.
  6. Click on Manage Search Engines and verify no search hijackers are present.
  7. Open Chrome and verify shortcut opens successfully.
  8. Right mouse click on any browser shortcut and go to 'Properties'.
  9. Verify that the Target only contains the path to the EXE and nothing else.
  10. "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" with nothing after it.
  11. Verify a new tab can be opened successfully, and go to an approved site to validate browser functionality. Verify adverts on site are non-malicious by checking the link to the ad and verifying that the options in the upper right are available.
  12. Run a search for an approved search term through both the omnibox (built-in search) and through http://google.com, and click on the first search result to verify you arrive at the expected site.
  13. Verify ad results using the approved Ad site.

Edge

  1. Verify Edge shortcut:
  2. Right mouse click on Edge shortcut
  3. Right mouse click on 'Microsoft Edge' and look at the options presented.
  4. If you see Properties, immediately click Unpin from Taskbar.
  5. To re-add the Edge shortcut
  6. search for Edge via the Start Menu
  7. Right click on 'Microsoft Edge' and click 'Pin to taskbar'.
  8. Open Edge.
  9. Check settings (In Edge, click '...' then Settings.)
  10. Verify homepage settings. Start, New and Previous pages are fine. If a specific page is selected, make sure it isn't malicious.
  11. Scroll down and click 'View advanced settings'.
  12. Check for any possible bad Extensions
  13. Settings
  14. Extensions
  15. Verify proxy settings
  16. Click 'Open proxy settings'
  17. Turn all options Off.
  18. Close the Network & Internet page and return to Edge.
  19. Scroll down to 'Search in the address bar with' and verify not malicious. Click Change button if changes need to be made.
  20. Verify a new tab can be opened successfully, and go to an approved site to validate browser functionality. Verify adverts on site are non-malicious by checking the link to the ad and verifying that the options in the upper right are available.
  21. Run a search for an approved search term through both the omnibox (built-in search) and through http://google.com, and click on the first search result to verify you arrive at the expected site.
  22. Verify ad results using the approved Ad site.

12. Reboot

Reboot

  1. Reboot with the RANG toolbar.

13. Confirm Malware Removed

Confirm Malware Removed

  1. Confirm no more malware symptoms.

14. Issue Resolved

Issue Successfully Resolved

The system is now working as intended. Issue resolved.

15. Do Some Research

Research

  1. Take a moment to research for a possible quick fix for the issue. Use resources such as:
  2. Support.com KB
  3. Google Search
  4. Your peers.
  5. If you are unable to find a fix, or if a fix fails then complete this step and continue on.

16. Switch Paths / Send - System Restore (Windows)

Switch Paths / Send

Click the button below to be brought to the 'System Restore' guided path. Please use the switch paths feature to switch back here to resume where you left off.

Launch next Guided Path

Clicking this shortcut will mark this step as "Completed," and if you complete the next Guided Path, this Guided Path will be completed automatically

17. System Restore Successful?

18. OSRI

Launch next Guided Path

Clicking this shortcut will mark this step as "Completed," and if you complete the next Guided Path, this Guided Path will be completed automatically

OSRI

Advise customer a Windows Repair or OS reinstall is required to resolve the issue. Please see the OSRI Guided Path for your appropriate tenant.

19. Exit: Escalate to PTE

If you are a PST, follow the Escalation Process to PTE.

20. Malware Check - AutoRuns

Malware Check - Autoruns

  1. Launch AR.
  2. Set up AR as instructed in training.
  3. Maximize the AR window.
  4. Review entries in the Everything tab first. You may check the other tabs only after reviewing the Everything tab.

21. Disable malware/PUP autostart in AR

Disable Malware/PUP Autostart in AR

  1. Disable the malware or PUP in AR.
  2. DO NOT DELETE entries.
  3. You must not ignore entries not flagged by VT. Virustotal can be a good indication of malware however it is not fool proof.

22. Switch Paths / Send - Tool Issues

Switch Paths / Send

Click the button below to be brought to the 'Tools Issues' guided path. Please use the switch paths feature to switch back here to resume where you left off.

Launch next Guided Path

Clicking this shortcut will mark this step as "Completed," and if you complete the next Guided Path, this Guided Path will be completed automatically

23. Rootkit - Requested Resource In Use

The Requested Resource Is In Use Rootkit

Signs & Symptoms

  • "The requested resource is in use" error when running most malware removal tools (MBAM, etc.), System Restore, and so on.
  • PE may show ndistpr64.sys or NetUtils2016.sys loading under System.
  • AR may show Dataup or windowsmanagementservice services.
  • Windows Defender is disabled by group policy. An update and scan is possible if you remove the group policy but currently doesn't help with removal.
  • The Advanced Boot Menu will not function.

MBAM/Etc:

Process Explorer (PE)

Autoruns (AR):

Fix Steps

  1. Stop work as soon as you see "the requested resource is in use" error as no further troubleshooting is required.
  2. There is currently no known fix. An OS reinstall should be recommended.

24. SSC Malware Check - AutoRuns

Malware Check - Autoruns

  1. Launch AR.
  2. Maximize the AR window.
  3. Review entries in the Everything tab first. You may check the other tabs only after reviewing the Everything tab.

25. SSC Malware Check - appwiz.cpl

Review appwiz.cpl for any simple PUPs (E.G. Mindspark, browser addons/toolbars, registry "optimizers", etc) that can be removed. Uninstall them, notating what was uninstalled in your ticket notes, and wrap up the service.

shouldiremoveit.com is a good source to know if the particular name of something is an item that needs attention.