ADW_VOOTRA
Adware.Revealing (Symantec); PUP.Optional.Montera (Malwarebytes); PUA.Vonteera (Ikarus); a variant of Win32/AdWare.Vonteera.J (ESET-NOD32); Adware/Win32.Vonteera (AhnLab-V3);
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Adware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet
This adware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It modifies the user's Internet Explorer home page into a certain website. This action allows the malware to point to a website which may contain malware, putting the affected computer at greater risk of malware infection.
It connects to certain websites to send and receive information. It presents itself as a plugin/add-on/extension for certain applications. It deletes itself after execution.
TECHNICAL DETAILS
787,392 bytes
EXE
Yes
02 Jun 2014
Connects to URLs/IPs
Arrival Details
This adware may arrive bundled with malware packages as a malware component.
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This adware drops the following copies of itself into the affected system:
- %Application Data%\ARHome\uninstall.exe
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
It drops the following file(s)/component(s):
- %User Temp%\{random filename} ← old copy of Updater.exe
- %Application Data%\ARHome\qhnsjt.dat
- %Application Data%\ARHome\Updater.exe ← used to download update of itself
- %Application Data%\Popper\ChompUpd.exe ← used to download update of itself
- %Application Data%\rickos\SearchInstaller.exe ← use to change searchengine
- %Application Data%\SPK\SPK.exe ← use to change browser's homepage
- %Application Data%\VolIE\FoxPro_32.dll ← BHO - detected as ADW_VOOTRA.GBHO
- %Application Data%\VolIE\FoxPro_64.dll ← BHO - detected as ADW_VOOTRA.GBHO
- %Application Data%\VolIE\onload.js
- %Application Data%\miaul\RJFC.exe ← update components file
- %Application Data%\chrome-extension.localstorage
- %Application Data%\ext.crx
- %Application Data%\ext\background.html
- %Application Data%\ext\background.js
- %Application Data%\ext\bd_48.png
- %Application Data%\ext\buzzdock.js
- %Application Data%\ext\manifest.json
It drops the following non-malicious files:
- %Application Data%\Mozilla\Firefox\Profiles\{random}.default\searchPlugins\VenteeRo.xml
- %Application Data%\Mozilla\Firefox\Profiles\{random}.default\user.js
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\background.html
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\background.js
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\bd_48.png
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\buzzdock.js
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\manifest.json
- %AppDataLocal%\Google\Chrome\User Data\Default\Local Storage\chrome-extension__0.localstorage
- %Program Files%\Mozilla Firefox\distribution
- %Program Files%\Mozilla Firefox\distribution\bundles
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\filesrv.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\globals.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\main.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\main.xul
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\prefs.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\skin
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\skin\Vonteera-48-48.png
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\skin\vonteera.ico
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\tabs_listener.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome.manifest
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\install.rdf
It creates the following folders:
- %User Profile%\Application Data\ARHome
- %Application Data%\Popper
- %Application Data%\rickos
- %Application Data%\SPK
- %Application Data%\VolIE
- %Application Data%\miaul
(Note: %User Profile% is a user's profile folder, where it usually is C:\Documents and Settings\{user name} on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name} on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.. %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
Autostart Technique
This adware adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
ArHome = "\Application Data%\ARHome\Updater.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
Popper = "%\Application Data%\SPK\SPK.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
miaul = "%\Application Data%\miaul\RJFC.exe"
Other System Modifications
This adware adds the following registry keys:
HKEY_CURRENT_USER\Software\ARHome
HKEY_CURRENT_USER\Software\Vonteera Safe ads
HKEY_CURRENT_USER\SOFTWARE\NoVooITSet
HKEY_CURRENT_USER\Software\NoVooIT
HKEY_CURRENT_USER\Software\Popper
It adds the following registry entries:
HKEY_CURRENT_USER\Software\ARhome
Interval = "{hex values}"
HKEY_CURRENT_USER\Software\ARhome
Path = "%\Application Data%\ARHome"
HKEY_CURRENT_USER\Software\ARhome\
T
k = "{hex values}"
HKEY_CURRENT_USER\Software\ARhome\
T
t = "{hex values}"
HKEY_CURRENT_USER\Software\ARhome\
Data
Interval = "{hex values}"
HKEY_CURRENT_USER\Software\ARhome\
Data
CurrentVersion = "{version}"
HKEY_CURRENT_USER\Software\ARhome\
Data
Path = "%\Application Data%\NoVooITAddon"
HKEY_CURRENT_USER\Software\ARhome\
Data
LastUpdate = "{hex values}"
HKEY_CURRENT_USER\Software\ARhome\
Data
UpdateURL = "http://www.gamezerflash.info/ver.xml"
HKEY_CURRENT_USER\Software\NoVooIT
Lst = "{hex values}"
HKEY_CURRENT_USER\Software\NoVooITSet
default = "1"
HKEY_CURRENT_USER\Software\Popper
Interval = "{hex values}"
HKEY_CURRENT_USER\Software\Popper
Path = "%\Application Data%\Popper"
HKEY_CURRENT_USER\Software\Popper\
Data
Interval = "{hex values}"
HKEY_CURRENT_USER\Software\Popper\
Data
CurrentVersion = "{version}"
HKEY_CURRENT_USER\Software\Popper\
Data
Path = "%\Application Data%\Popper"
HKEY_CURRENT_USER\Software\Popper\
Data
LastUpdate = "{hex values}"
HKEY_CURRENT_USER\Software\Popper\
Data
UpdateURL = "https://s3.amazonaws.com/popper/ver.txt"
HKEY_CURRENT_USER\Software\Vonteera Safe ads
Path = "%\Application Data%\NoVooITAddon"
Web Browser Home Page and Search Page Modification
This adware modifies the user's Internet Explorer home page to the following websites:
- "http://www.arabyonline.com/?src=1000"
Download Routine
This adware connects to the following website(s) to download and execute a malicious file:
- http://www.{BLOCKED}e.info/a485885e/db393352.exe
- http://www.{BLOCKED}l.info/422785e5fddc4/b749ae4c22.exe
- http://www.{BLOCKED}l.info/422785e5fddc4/c7c095c8a7.exe
- http://www.{BLOCKED}ia.info/2f636d47b3d649a/4d45c13.exe
- http://www.{BLOCKED}e.info/a485885e/e08693.exe
It saves the files it downloads using the following names:
- %User Temp%\MS{random}.exe ← updated copy of itself
- %User Temp%\FH{random}.exe ← updated copy of itself
(Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
Other Details
This adware adds the following registry entries to add an uninstall option to the Control Panel:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Uninstall\
ARHome
DisplayName = "ArHome"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Uninstall\
ARHome
Publisher = "NoVooIT"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Uninstall\
ARHome
UninstallString = "%\Application Data%\ARHome\uninstall.exe /uninstall=uninst"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Uninstall\
ARHome
URLInfoAbout = "http://www.adnetwork100.info"
It connects to the following website to send and receive information:
- http://www.{BLOCKED}s.com/aff/thanks/updater-thanks.php?t={value}&wti=1000&s=1000&sta=1
- http://www.{BLOCKED}rflash.info/ver.php
- http://www.{BLOCKED}orkeu.com/srv1/serv.js
- http://www.{BLOCKED}s.com/Wow/file.php?
It presents itself as a plugin/add-on/extension for the following applications:
- Google Chrome
- Mozilla Firefox
- Internet Explorer
It deletes itself after execution.
NOTES:
This adware changes Google Chrome homepage and search engine by adding the following registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Google\Chrome
DefaultSearchProviderKeyword = "arabyonline"
HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Google\Chrome
DefaultSearchProviderName = "arabyonline"
HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Google\Chrome
DefaultSearchProviderSearchURL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Google\Chrome\Recommended
HomepageLocation = "http://www.arabyonline.com/?src=1000"
HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Google\Chrome\RestoreOnStartupURLs
1 = "http://www.arabyonline.com/?src=1000"
It changes Internet Explorer search engine by adding the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\SearchScopes
DefaultScope = "{GUID 1}"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\SearchScopes\{GUID 1}
DisplayName = "VenteeRo"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\SearchScopes\{GUID 1}
URL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\SearchScopes
DefaultScope = "{GUID 1}"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\SearchScopes\{GUID 1}
DisplayName = "VenteeRo"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\SearchScopes\{GUID 1}
URL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
SOLUTION
9.700
1.556.46
14 Oct 2014
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 3
Remove malware/grayware files dropped/downloaded by ADW_VOOTRA. (Note: Please skip this step if the threats listed below have already been removed.)
Step 4
Restart in Safe Mode
Step 5
Delete this registry key
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
- In HKEY_CURRENT_USER\Software
- ARhome
- ARhome
- In HKEY_CURRENT_USER\Software
- Popper
- Popper
- In HKEY_CURRENT_USER\Software
- NoVooIT
- NoVooIT
- In HKEY_CURRENT_USER\Software
- NoVooITSet
- NoVooITSet
- In HKEY_CURRENT_USER\Software
- Vonteera Safe ads
- Vonteera Safe ads
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall
- ARHome
- ARHome
Step 6
Delete this registry value
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes
- DefaultScope = "{GUID 1}"
- DefaultScope = "{GUID 1}"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{GUID 1}
- DisplayName = "VenteeRo"
- DisplayName = "VenteeRo"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{GUID 1}
- URL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
- URL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
- DefaultScope = "{GUID 1}"
- DefaultScope = "{GUID 1}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{GUID 1}
- DisplayName = "VenteeRo"
- DisplayName = "VenteeRo"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{GUID 1}
- URL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
- URL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome
- DefaultSearchProviderKeyword = "arabyonline"
- DefaultSearchProviderKeyword = "arabyonline"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome
- DefaultSearchProviderName = "arabyonline"
- DefaultSearchProviderName = "arabyonline"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome
- DefaultSearchProviderSearchURL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
- DefaultSearchProviderSearchURL = "http://www.arabyonline.com/search.php?src=1000&q={searchTerms}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\Recommended
- HomepageLocation = "http://www.arabyonline.com/?src=1000"
- HomepageLocation = "http://www.arabyonline.com/?src=1000"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\RestoreOnStartupURLs
- 1 = "http://www.arabyonline.com/?src=1000"
- 1 = "http://www.arabyonline.com/?src=1000"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- ArHome = "%\Application Data%\ARHome\Updater.exe"
- ArHome = "%\Application Data%\ARHome\Updater.exe"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- Popper = "%\Application Data%\SPK\SPK.exe"
- Popper = "%\Application Data%\SPK\SPK.exe"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- miaul = "%\Application Data%\miaul\RJFC.exe"
- miaul = "%\Application Data%\miaul\RJFC.exe"
Step 7
Search and delete this folder
- %Application Data%\ARHome
- %Application Data%\Popper
- %Application Data%\rickos
- %Application Data%\SPK
- %Application Data%\VolIE
- %Application Data%\miaul
- %Application Data%\ext
Step 8
Search and delete these files
- %Application Data%\chrome-extension.localstorage
- %Application Data%\ext.crx
- %Application Data%\Mozilla\Firefox\Profiles\{random}.default\searchPlugins\VenteeRo.xml
- %Application Data%\Mozilla\Firefox\Profiles\{random}.default\user.js
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\background.html
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\background.js
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\bd_48.png
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\buzzdock.js
- %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{random}\2.0.2_0\manifest.json
- %AppDataLocal%\Google\Chrome\User Data\Default\Local Storage\chrome-extension__0.localstorage
- %Program Files%\Mozilla Firefox\distribution
- %Program Files%\Mozilla Firefox\distribution\bundles
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\filesrv.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\globals.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\main.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\main.xul
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\prefs.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\skin
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\skin\Vonteera-48-48.png
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\skin\vonteera.ico
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome\content\tabs_listener.js
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\chrome.manifest
- %Program Files%\Mozilla Firefox\distribution\bundles\addon@Vonteera.com\install.rdf
Step 9
Reset the Internet Explorer Home and Search pages
Step 10
Restart in normal mode and scan your computer with your Trend Micro product for files detected as ADW_VOOTRA. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.