• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 962
  • Last Modified:

Potential virus corrupting Word and Excel files

I have a client that is getting an error when opening Word and Excel files.  She is using Office 2010 and it happens opening .doc and .docx files (same with Excel).  The error says the file cannot be opened because it is corrupt or part of the file is missing.  If you try to recover, it says it cannot recover the file.

Hitman Pro, Norton 360, and Security Essentials all report that the computer is clean.  MalwareBytes didn't find anything, but I do get an interesting message when Word is opened after installing MalwareBytes.

MalwareBytes Anti-Malware:

Succesfully blocked access to a potentially malicious website: 66.77.96.140
Type: outgoing
Port: 49577. Process: winword.exe

All Word and Excel files have been corrupted.  Has anyone seen this particular virus before and has anyone had any luck recovering the word and excel files?

Thanks in advance.
0
Austinns
Asked:
Austinns
  • 2
1 Solution
 
Giovanni HewardCommented:
See https://www.virustotal.com/en/ip-address/66.77.96.140/information/

Hashes of malicious executables are provided, these can be searched for by scanning your system (http://md5deep.sourceforge.net/#download for example) with a SHA-256 hash generator, redirecting the output to a text file.  You can then search the text file for each hash identified above and remove them.  Bear in mind these may be droppers, which drop additional malware, not currently associated with the report above.

Dr. Web seems to be the signature based scanning engine which is leading the pack on this particular piece of malware.  It would be worthwhile to scan your system with that product, prior to engaging in deeper analysis.

See http://it.pages.tcnj.edu/files/2012/04/MSAdvancedMalwareCleaningNov2011.pdf
http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf

• Disconnect from network
• Identify malicious processes and drivers
• Suspend and terminate suspicious processes
• Identify and delete malware autostarts
• Delete malware files
• Reboot
• Repeat Step 2

See Invincea
0
 
AustinnsAuthor Commented:
Thanks,

I will scan with that software when I get back to the office and will add follow-up info.
0
 
Giovanni HewardCommented:
Additionally, consider creating zones on your DNS server which resolve the FQDNs identified in the VirusTotal Report to a local web server or loopback address.

Enforce rules at your firewall to prevent your internal DNS servers from being bypassed: All local hosts configured to use local DNS servers.  Firewall blocks all outbound DNS requests from all hosts except your local DNS servers.  Configure your internal DNS servers to use OpenDNS servers as their forwarders.

I've created an OpenDNS enhancement requested based on your report here:
https://support.opendns.com/entries/23001279-Site-Checker-Vote-On-Domains-Improvements
0
 
FutureTechSysDOTcomCommented:
Here is an expert's exchange article I wrote:

http://www.experts-exchange.com/Software/Internet_Email/Email/Anti_Spam/A_12391-How-To-Speed-Up-Your-Computer-Remove-Spyware-Viruses-and-PUA-Potentially-Unwanted-Applications.html

I'd run through this process on the machines on your network.  Worst case scenario, they all run a bit better and are virus free :-)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now