Počet zobrazení stránky

sobota 10. března 2012

Trojan:Win32/Kilonepag.A


Encyclopedia entry
Updated: Apr 17, 2011  |  Published: Jul 16, 2010

Aliases
  • W32/Downloader.AT.gen!Eldorado (Command)
  • TR/StartPage.jsp (Avira)
  • Trojan.StartPage.27322 (Dr.Web)
  • Trojan.Win32.StartPage.pqi (Rising AV)
  • Troj/Mdrop-CRG (Sophos)

Alert Level (?)
Severe

Antimalware protection details
Microsoft recommends that you download the latest definitions to get protected.
Detection last updated:
Definition: 1.121.1275.0
Released: Mar 10, 2012
Detection initially created:
Definition: 1.85.994.0
Released: Jun 28, 2010


 

Summary

Trojan:Win32/Kilonepag.A is a trojan that injects its malicious routines into the normal running process "svchost.exe" to enable it to drop several files in the system and modify registry settings. It can terminate certain processes and drop shortcuts to certain URLs on the user's desktop.


 

Symptoms

System changes
The following system changes may indicate the presence of this malware:
  • The presence of the following registry modification:
  • Added value: "Explorer.exe %ProgramFiles%\tdxe\ruhrrun.exe"
    With data: "Shell"
    In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
  • The presence of the following subkeys:
    • HKCR\CLSID\{7AF60DD2-4979-11D1-3333-00C04FC33566}
    • HKLM\SOFTWARE\Classes\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}
  • The presence of the following message box:


 

Technical Information (Analysis)

Trojan:Win32/Kilonepag.A is a trojan that injects its malicious routines into the normal running process "svchost.exe" to enable it to drop several files in the system and modify registry settings.
Installation
When run, this trojan injects its malicious code into the running "svchost.exe" process. It displays a message box and opens an instance of Internet Explorer pointing to the website "tc.v22.cc".
 
The message box appears similar to the following:
 
 
Trojan:Win32/Kilonepag.A creates a hidden, randomly-named folder under the Program Files folder, where it drops a randomly-named EXE file. It then modifies the registry to ensure that the dropped file is automatically run every time Windows starts:
 
Adds value: "Explorer.exe %ProgramFiles%\tdxe\ruhrrun.exe"
With data: "Shell"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
 
Trojan:Win32/Kilonepag.A also adds the following registry subkeys:
 
  • HKCR\CLSID\{7AF60DD2-4979-11D1-3333-00C04FC33566}
  • HKLM\SOFTWARE\Classes\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}
Payload
Drops URL shortcuts
Trojan:Win32/Kilonepag.A drops several URL shortcuts on the user's desktop. The URLs that these shortcuts connect to may be the following:
 
  • dy.v22.cc
  • m.v22.cc
  • music.v22.cc
  • v.v22.cc
 
Terminates processes
Trojan:Win32/Kilonepag.A terminates several processes that may be running in memory. These processes may be associated with antivirus programs:
 
  • 360sd.exe
  • 360tray.exe
  • avp.exe
  • kwstray.exe
  • QQDoctorRtp.exe
  • Rav.exe
  • wxCltAid.exe
 
Checks for TCP/IP connection                              
Trojan:Win32/Kilonepag.A checks if TCP/IP is bound and enabled on the network adapter of the machine. It does this creating and running a VBScript query.
 
Analysis by Marianne Mallen

Žádné komentáře:

Okomentovat