ADW_SEARCHPROT


 ALIASES:

Trj/OCJ.D(Panda), Win32/Conduit.SearchProtect.K application(NOD32), Downloader.Agent(VBA32), Downloader.NSIS.Agent.fq(Kaspersky)

 PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Adware

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.

  TECHNICAL DETAILS

File Size:

7,681,656 bytes

File Type:

EXE

Initial Samples Received Date:

20 Feb 2014

Arrival Details

This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This adware drops the following files:

  • %User Temp%\ns{random}.tmp
  • %User Temp%\ns{random1}.tmp\inetc.dll
  • %User Temp%\ns{random1}.tmp\nsisunz.dll
  • %User Temp%\ns{random1}.tmp\System.dll
  • %User Temp%\SP\GenericSS.exe
  • %User Temp%\SP\SpeedyPC Pro Installer.exe

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)

It creates the following folders:

  • %User Temp%\SP
  • %User Temp%\ns{random1}.tmp

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)

Dropping Routine

This adware executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.

Other Details

This adware connects to the following possibly malicious URL:

  • http://{BLOCKED}ychocolate.com/api/ResolveIP
  • http://{BLOCKED}.{BLOCKED}ychocolate.com/installers/GenericSS.zip