Unfortunately, I’m unable to run the WinDiag software right now as I don’t have available CDs
or disks to burn the software on. I will get to it as soon as possible. In the meantime, can we
address the other issues?
I do not connect through a USB modem. Ethernet, yes. It is a cablemodem (EuroDOCSIS 3.0), and
also offers a wireless network (which I don’t use on this computer). Does this mean it is very insecure?
I checked the motherboard as you suggested, but found nothing. In addition, I plugged off the
hard drive(s) and started the computer with a Linux CD, and it seemed to work fine.
I think it was a hardware issue but now I’m also quite convinced it was a virus as well, because here’s where it gets interesting:
I have another PC on which I ran a clean install of Windows XP SP2 (updated to SP3) about a month ago and hadn’t used it since, until yesterday. Joined it into the network, downloaded and installed CIS, ran all the Windows updates. Booted several times and kept an eye on the system events log to see which services ran on start up of Windows. Everything seemed normal.
Then all of a sudden after one boot, it did the same thing as on my other computer: Telephony and Remote Access Connection Manager were now running. The only thing I did different before this boot, as opposed to the prior boots, was that I was signed in on Windows Live Messenger for a short time, talked to someone and initiated a file transfer (which wasn’t accepted, however). Would it be realistic to think someone could gain remote access to your computer like that, with up-to-date CIS running, and in a matter of few minutes?
I stopped and disabled those services, and ran a smart scan with CIS, which found the following:
Rootkit.HiddenValue@0 HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\DhcpDomain
Rootkit.HiddenValue@0 HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\DhcpNameServer
Rootkit.HiddenValue@0 HKEY_LOCAL_MACHINE\System\ControlSet001\Services{1B0ECA69-55CD-449B-B7BE-318E60614A3C}\Parameters\Tcpip\DhcpSubnetMaskOpt
Rootkit.HiddenValue@0 HKEY_LOCAL_MACHINE\System\ControlSet001\Services{1B0ECA69-55CD-449B-B7BE-318E60614A3C}\Parameters\Tcpip\DhcpDefaultGateway
However, Comodo was not able to clean them, and once I booted and tried again, the scan did not
even find them anymore. Nor does a full scan reveal anything (also tried TDSSKiller).
A while later, this entry showed up in the system events viewer:
“The browser has forced an election on network
\Device\NetBT_Tcpip_{1B0ECA69-55CD-449B-B7BE-318E60614A3C} because a
master browser was stopped.”
This entry has appeared frequently since then. It seems to appear whenever I go offline.
Next up, under the Applications events log, there was a ‘crypt32’ entry saying that a third party certificate has been automatically updated from
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/91C6D6EE3E8AC86384E548C299295C756C817B81.crt
And a second entry, with the same timestamp, saying the following certificate has been updated:
<CN=thawte Primary Root CA, OU=“(c) 2006 thawte, Inc. - For authorized use only”,
OU=Certification Services Division, O=“thawte, Inc.”, C=US> Sha1-signature:
<91C6D6EE3E8AC86384E548C299295C756C817B81>
Since then, when offline, there appear various error entries saying how a third party mainlist
cannot be extracted from automatically updated Cab-file in the source;
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
I then ran a scan with Malwarebytes Anti-Malware, which found a malware ‘officekey.exe’. At the same time, CIS also detected it, among a couple other files in the same folder:
C:\DOCUMENTS AND SETTINGS\computer\LOCAL SETTINGS\Temp\RarSFX0\findkey.exe
C:\DOCUMENTS AND SETTINGS\computer\LOCAL SETTINGS\Temp\RarSFX0\officekey.exe
C:\DOCUMENTS AND SETTINGS\computer\LOCAL SETTINGS\Temp\RarSFX0\xpkey.exe
It quarantined them on the spot. However, a while later, after I booted, I got the notification that Windows did not pass the authentication test (which it had passed earlier the same day), so apparently the virus modified my license key.
I also noticed the following entries in setupapi.log in the Windows folder (my XP is not in English and I had to translate the following lines, so they may be inaccurate):
[2012/09/02 02:17:16 1116.267]
#-198 Processed commandline: C:\WINDOWS\system32\svchost.exe -k netsvcs
#-166 Device installation function: DIF_PROPERTYCHANGE.
#I292 Device PCI\VEN_1106&DEV_3065&SUBSYS_30651849&REV_78\3&267A616A&0&90 properties are being changed.
#I300 DICS_DISABLE: Disabling device in profile (null).
[2012/09/02 02:17:35 1116.278]
#-198 Processed commandline: C:\WINDOWS\system32\svchost.exe -k netsvcs
#-166 Device installation function: DIF_PROPERTYCHANGE.
#I292 Device PCI\VEN_1106&DEV_3065&SUBSYS_30651849&REV_78\3&267A616A&0&90 properties are being changed.
#I296 DICS_ENABLE: Enabling device in profile (null).
[2012/09/02 02:19:10 1116.330]
#-198 Processed commandline: C:\WINDOWS\system32\svchost.exe -k netsvcs
#-166 Device installation function: DIF_PROPERTYCHANGE.
#I292 Device PCI\VEN_1106&DEV_3065&SUBSYS_30651849&REV_78\3&267A616A&0&90 properties are being changed.
#I300 DICS_DISABLE: Disabling device in profile (null).
[2012/09/02 02:26:53 1116.340]
#-198 Processed commandline: C:\WINDOWS\system32\svchost.exe -k netsvcs
#-166 Device installation function: DIF_PROPERTYCHANGE.
#I292 Device PCI\VEN_1106&DEV_3065&SUBSYS_30651849&REV_78\3&267A616A&0&90 properties are being changed.
#I296 DICS_ENABLE: Enabling device in profile (null).
Is that normal?
Lastly, I’d like to ask a few things about CIS:
Is it normal to have “Allow system to send/receive requests if the target is in [Home #1]” under the Application and Global rules section, and is it normal for Privileged Ports to say “In [0 - 1023]”?
Is it also normal for Defense+ Trusted Files to include files without company name? There are a lot of \WINDOWS\ files without an apparent signature to them, including jscript.dll, netapi32.dll, rpcss.dll etc.?