LilBambi
BSOD Kernel Dump Senior Analyst
I had an interesting time with a computer yesterday.
From what he told me, not much, it sounded like the FBI MoneyPak and he got it from a legitimate site (he called the institution and they confirmed it had been hacked and now fixed, BTW).
Apparently it was not the FBI one. I downloaded a created a bootable USB drive with HitManPro on it, and it would boot but the keyboard wouldn't work. So I used Trinity Rescue CD to remove all the temporary files from all locations.
But it turns out it was ICE MoneyPak or ICE very something similar to this MoneyPak GreenDot thing:
Removing all the files from the temporary spaces left the machine at a black screen but it appeared to be an overlay not a true black screen, with a commandline box on top saying that the 20someoddletter.exe file was not a valid executable or batch file.
I edited regedit to find that random filename and removed it from the registry several times, along with another item that kept coming back in the registry like a bad penny when I rebooted or refreshed the registry. So I knew there was something else there.
I called Malwarebytes from the commandline box and it updated, ran and found three additional items noted in the log file and nothing else:
Malwarebytes took care of them and when I rebooted, it booted fine.
I then ran the current JRT file and ran Malwarebytes Anti-Malware scans twice more over the course of the time I was updating the computer and they were all clean.
NOTE: Part of the problem appears as usual that the computer didn't have it's Windows 7 SP1 update and wasn't offering it either! The ONLY driver that needed updating was the Intel Video driver that I installed from the driver update button in Hardware Device Drivers. Then I downloaded the x64 SP1 (900+MB file thankfully on their fast Cox Cable connection) and installed it after disabling their (Groan!) McAfee Security Suite's realtime detection till a reboot.
I then got all the updates to all internet facing programs (plugins, extensions, browsers, etc.) and the computer seems to be doing fine now. Nothing else was found with scans.
When I got home, I found this The ICE Cyber Crimes Center (Computer Blocked) - MoneyPak Virus - PCRisk.com (was noted as a good site on WOT):
This one on this guy's computer was set at $100 instead of the $400 noted at the site.
Thankfully between Trinity Rescue CD, cautious Registry search/editing, and Malwarebytes Anti-malware and JRT, AND most important for the future health of the PC, Win7 SP1, IE10 installation since he uses Internet Explorer and MSN, and subsequent updates, updates to the other plugins, extensions, browsers, etc.
So, I think I can call this SOLVED. Any other thoughts?
:dance::dance::dance:
From what he told me, not much, it sounded like the FBI MoneyPak and he got it from a legitimate site (he called the institution and they confirmed it had been hacked and now fixed, BTW).
Apparently it was not the FBI one. I downloaded a created a bootable USB drive with HitManPro on it, and it would boot but the keyboard wouldn't work. So I used Trinity Rescue CD to remove all the temporary files from all locations.
But it turns out it was ICE MoneyPak or ICE very something similar to this MoneyPak GreenDot thing:
Removing all the files from the temporary spaces left the machine at a black screen but it appeared to be an overlay not a true black screen, with a commandline box on top saying that the 20someoddletter.exe file was not a valid executable or batch file.
I edited regedit to find that random filename and removed it from the registry several times, along with another item that kept coming back in the registry like a bad penny when I rebooted or refreshed the registry. So I knew there was something else there.
I called Malwarebytes from the commandline box and it updated, ran and found three additional items noted in the log file and nothing else:
Code:
Registry Values Detected:
1HKCU\Software\Microsoft\Windows NT\CurrentVersion\WinlogoN|Shell (PUM.Shell.CMD) -> Data: cmd.exe -> Quarantined and deleted successfully.
Files Detected: 2
C:\Users\{User}\Templates\2433f433 (Trojan.Agent.TPL) -> Quarantined and deleted successfully.
C:\ProgramData\2433f433 (Trojan.Agent.TPL) -> Quarantined and deleted successfully.
Malwarebytes took care of them and when I rebooted, it booted fine.
I then ran the current JRT file and ran Malwarebytes Anti-Malware scans twice more over the course of the time I was updating the computer and they were all clean.
NOTE: Part of the problem appears as usual that the computer didn't have it's Windows 7 SP1 update and wasn't offering it either! The ONLY driver that needed updating was the Intel Video driver that I installed from the driver update button in Hardware Device Drivers. Then I downloaded the x64 SP1 (900+MB file thankfully on their fast Cox Cable connection) and installed it after disabling their (Groan!) McAfee Security Suite's realtime detection till a reboot.
I then got all the updates to all internet facing programs (plugins, extensions, browsers, etc.) and the computer seems to be doing fine now. Nothing else was found with scans.
When I got home, I found this The ICE Cyber Crimes Center (Computer Blocked) - MoneyPak Virus - PCRisk.com (was noted as a good site on WOT):
The ICE Cyber Crimes Center message which locks computer user's screen and asks to pay a fine of $400 for some law violations is a scam. This message has nothing to do with U.S. Immigration and Customs Enforcement, it was created by Cyber criminals who are hoping that unsuspecting PC users would believe the false statements (accusations of watching pornography, using copyrighted files, usage of unlicensed software) made in this message and would pay them the non existent fine. Notice that in reality none of the authorities (including ICE Cyber Crimes Center) are using such messages which locks PC user's screen to collect fines for any law violations. This fake message is called ransowmare and this particular infection originates from a family called Reveton.
What makes ransomware infections especially rogue is the fact that they come localised - computer users from different countries will see different fake messages which exploits graphics and names of local authorities. This particular ransomware is targeted at computer users from USA, however if a PC user from Australia would get infected with this virus the same message would appear as if it came from Australian Federal Police (AFP). Computer users shouldn't trust any of the messages which supposedly comes from local authorities and asks to pay a fine to unblock one's PC - it's a scam, paying the fine when asked by such message equals to sending your money to Cyber criminals.
...
The ICE Cyber Crimes Center virus is being distributed using Trojans and drive-by downloads. Computer users should be very careful when using P2P networks, social networks and when downloading software updates from non legitimate sources. To prevent ransomware infiltrations one should keep your operating system and all of the installed software (Flash, Java, etc.) up-to-date. Furthermore one should always use legitimate antivirusand anti-spyware software. If you already see a message from "The ICE Cyber Crimes Center" asking you to pay a fine of $400 using MoneyPak - ignore it and proceed with the provided removal steps.
This one on this guy's computer was set at $100 instead of the $400 noted at the site.
Thankfully between Trinity Rescue CD, cautious Registry search/editing, and Malwarebytes Anti-malware and JRT, AND most important for the future health of the PC, Win7 SP1, IE10 installation since he uses Internet Explorer and MSN, and subsequent updates, updates to the other plugins, extensions, browsers, etc.
So, I think I can call this SOLVED. Any other thoughts?
:dance::dance::dance: