Link to home
Start Free TrialLog in
Avatar of E White
E WhiteFlag for United States of America

asked on

trojan.emotet/Artemis trojan - how to remove from network

A user was infected with the trojan.emotet and now my computers are constantly be hit wiht Artemis! Trojans through out the day.

I have the McAfee Endpoint Security, which catches and deletes it.

However, does anyone knows how I can get rid of this?

Any help in this will be most appreciated.User generated image
ASKER CERTIFIED SOLUTION
Avatar of John
John
Flag of Canada image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of E White

ASKER

John,  how do I identify who or where it's coming from?
The process will have the name or more likely an alphanumeric process name. That is the only way you can find it.

If well hidden, you may not be able to find it.
Avatar of E White

ASKER

John,

You mean if I go in to my Task manager and look at the Processes there?
No, I was suggesting Process Explorer for this. Better for this task.
Avatar of E White

ASKER

John,

I notice the 1st alert says the F7AE566F. exe was accessed from the remote system xxx.xxx.xxx.62.  The Trojan named Artemis!716293B3EB20 was detected and deleted.  Could this be the machine that is sending it out?  After that I'm go alerts that other machines also have been hit from remote systems, but have been deleted.
You need to check each machine with Process Explorer and make sure it is not running.

Also get Autoruns (Sysinternals) and make sure it is not trying to start on any machine.
Avatar of E White

ASKER

John,

When I run the Process Explorer I don't see any aphanumeric proccesses, but when I run the Autoruns, I'm seeing lots of alpha numeric stuff.

User generated image
In Autoruns, you see plain, red, and yellow areas. Delete all the yellow, close out, restart and test.
Avatar of E White

ASKER

Oh and it's located under HKLM\System\CurrentControlSet\Services
Avatar of E White

ASKER

John,

I did what was recommended on my computer.

How do I know if it worked?
Restart and see if the malware pops up again.

Also run Autoruns again and see if it Installed itself again
Avatar of E White

ASKER

John,

Upended back up Autoruns and didn't see the alpha numeric yellow processes running.

Do I continue to do this on all the other computers and do I have to logged on as that user of the computer or can I log on as myself on their computer to remove the items?
If you are admin, you can do the same thing at other computers
Avatar of E White

ASKER

I'm going to do it on the other computers .
Thanks - please keep us posted.
Avatar of Gerwin Jansen
Some generic advise: disconnect systems one by one from the network and observe when the hits stop. Then scan that PC (or better reinstall it).
How exactly is this network set up, and what permissions do users have on the systems?
Avatar of E White

ASKER

masnrock,

The users all are just regular users.  Non-Admin rights.
Avatar of E White

ASKER

Gerwin,

I've done as you instructed, but I still see hits happening.
If removal does not work, you are going to have to backup machines and reinstall Windows.

Put in a top notch Spam Filter first.
Are all of the systems patched properly, especially for WannaCry? Make sure that MS17-017 is installed on ALL of the systems. But also be sure that you haven't been missing other patches as well.
If you still get hits, install Wireshark to track down the source(s) - then go after them.

But if you disconnected all other machines from the network then you may face an outside, wireless or server source.
Avatar of E White

ASKER

masnrock,

All the PC's has the latest Windows Patch.
>> All the PC's has the latest Windows Patch.
You should never assume that you're safe when all patches have been installed. 0 day threats will use unpatched vulnerabilities and when they are detected, they are typically detected as heuristic or artemis in your case. Disconnecting devices from the network and trying to located the issue using some sort of network logger (like wireshark) is what I would do. You can use a passive network tap with a known good laptop to gather data.
Just curious on how did you solve the issue, can you share?