PUA_BUNDLER.GB
WebToolbar.Win32.Asparnet.dnq (Kaspersky); Win32/Bundled.Toolbar.Ask.G (NOD32)
Windows
Threat Type: Potentially Unwanted Application
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
TECHNICAL DETAILS
5,243,904 bytes
Other
No
27 Jun 2018
Arrival Details
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may be manually installed by a user.
Installation
This Potentially Unwanted Application drops the following files:
- %User Temp%\WZSE0.TMP\Setup.exe
- %User Temp%\APN-Stub\St{Random Name}.log
- %User Temp%\APNLogs\ic.log
- %User Temp%\AskSLib.dll
- %Common Programs%\CutePDF\PDF Writer\Readme.lnk
- %Program Files%\Acro Software\CutePDF Writer\CPWSave.exe.manifest
- %Program Files%\Acro Software\CutePDF Writer\CPWSave.exe
- %Program Files%\Acro Software\CutePDF Writer\PDFWrite.rsp
- %Program Files%\Acro Software\CutePDF Writer\README.HTM
- %Program Files%\Acro Software\CutePDF Writer\uninscpw.exe
- %System%\cpwmon2k.dll
- %System%\spool\drivers\w32x86\CUTEPDFW.PPD
- %System%\spool\drivers\w32x86\PS5UI.DLL
- %System%\spool\drivers\w32x86\PSCRIPT.HLP
- %System%\spool\drivers\w32x86\PSCRIPT.NTF
- %System%\spool\drivers\w32x86\PSCRIPT5.DLL
- %User Temp%\converter.exe
- %User Temp%\is-{Random Name}.tmp\ApnIC.dll
- %User Temp%\is-{Random Name}.tmp\ApnStub.exe
- %User Temp%\is-{Random Name}.tmp\Ask_Logo.bmp
- %User Temp%\is-{Random Name}.tmp\Ask_Toolbar.bmp
- %User Temp%\is-{Random Name}.tmp\cpwmon2k.dll
- %User Temp%\is-{Random Name}.tmp\Driver\is-{Random Name}.tmp
- %User Temp%\is-{Random Name}.tmp\Driver\x64\is-{Random Name}.tmp
- %User Temp%\is-{Random Name}.tmp\is-{Random Name}.tmp
- %User Temp%\is-{Random Name}.tmp\UNINSCPW.exe
- %User Temp%\is-{Random Name}.tmp\WizModernSmallImage-IS.bmp
- %User Temp%\is-{Random Name}.tmp\_isetup\_RegDLL.tmp
- %User Temp%\is-{Random Name}.tmp\_isetup\_shfoldr.dll
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista, 7, and 8.. %Common Programs% is the folder that contains common program groups for all users, which is usually C:\Documents and Settings\All Users\Start Menu\Programs on Windows 2000, XP, and Server 2003, or C:\ProgramData\Microsoft\Windows\Start Menu\Programs on Windows Vista, 7, and 8.. %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), 7 (32-bit), and 8 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), 7 (64-bit), and 8 (64-bit).. %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
It creates the following folders:
- %User Temp%\APNLogs
- %User Temp%\WZSE0.TMP
- %User Temp%\APN-Stub
- %User Temp%\is-{Random Name}.tmp
- %Common Programs%\CutePDF
- %Program Files%\Acro Software
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista, 7, and 8.. %Common Programs% is the folder that contains common program groups for all users, which is usually C:\Documents and Settings\All Users\Start Menu\Programs on Windows 2000, XP, and Server 2003, or C:\ProgramData\Microsoft\Windows\Start Menu\Programs on Windows Vista, 7, and 8.. %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), 7 (32-bit), and 8 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), 7 (64-bit), and 8 (64-bit).)
Other System Modifications
This Potentially Unwanted Application adds the following registry keys:
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
CutePDF Writer Installation
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\
CutePDF Writer
It adds the following registry entries:
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
dot = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
dt = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
dtid = ^YYYYYY^YY^PH
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
ff-max-version = 13.*
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
fflu = -2
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
fv = 3.5.7 (en-US)
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
guid = {Users GUID}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
harch = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
hloc = en-US
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
homepageurl = http://www.search.ask.com/?l=dis&o=15087
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
hos = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
iedis = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
ielu = -2
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
iev = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
inst = 200
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
iv = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
1 = dis
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
locale = en_US
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
location = {Users Location}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
make-offer = 1
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
nthp = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
o = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
oi = nop
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
qsrc = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
repurl = http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^AG^YYYYYY^YY^PH&encb={incbid}&chk={ic_chk}&ts={random}&guid=
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
saguid = {Users GUID}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
same-partner = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
slwo = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
tb = ARS
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
tb-installer-path = http://apnmedia.ask.com/media/toolbar/supertoolbar/profile-ask/wrapper/2.3.0/EverestWrapper.exe
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
tb-version = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
to =
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
wft = remote
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
cr-homepageurl = http://www.search.ask.com/?l=dis&o=15087cr
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
crif = 1
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
ff-max-version = 13.*
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
guid = {Users GUID}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
homepageurl = http://www.search.ask.com/?l=dis&o=15087
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
make-offer = 1
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
nthp = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
oi = nop
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Installer
repurl = http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^AG^YYYYYY^YY^PH&encb={incbid}&chk={ic_chk}&ts={random}&guid=
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
cbid = ^AG
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
cr-o = {Random Numbers}cr
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
crumb = {Date}+{Time}-{Random Text}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
dtid = ^YYYYYY^YY^PH
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
1 = dis
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
locale = en_US
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
location = {Users Location}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
o = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
qsrc = {Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
slwo = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\Macro
to =
HKEY_CURRENT_USER\.DEFAULT\Printers\
DevModes2
CutePDF Writer = {Hex Values}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
CutePDF Writer Installation
DisplayName = CutePDF Writer 3.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
CutePDF Writer Installation
UninstallString = C:\Program Files\Acro Software\CutePDF Writer\uninscpw.exe
HKEY_CURRENT_USER\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Internet Settings
ProxyEnable = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Internet Settings\Connections
SavedLegacySettings = {Hex Values}
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\
CutePDF Writer
Destination Folder = C:\Program Files\Acro Software\CutePDF Writer
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\
CutePDF Writer
"" = C:\Program Files\GNUGS
HKEY_CURRENT_USER\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Internet Settings
ProxyEnable = 0
HKEY_CURRENT_USER\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Internet Settings\Connections
SavedLegacySettings = {Hex Values}
HKEY_CURRENT_USER\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Internet Settings\Connections
DefaultConnectionSettings = {Hex Values}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
apn_dbr = ie_{Random Numbers}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
cbid = ^AG
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
client = ic
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
clientv = 9.9.9.9
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
cr = 1
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
cr-homepageurl = http://www.search.ask.com/?l=dis&o=15087cr
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
cr-o = {Random Numbers}cr
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
crif = 1
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
crumb = {Date}+{Time}-{Random Text}
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
crx-path = http://apnmedia.ask.com/media/toolbar/supertoolbar/chrome/ARS/1.17.7.0/aaaappmhgaaggeoepicjahnbofmjacog_7.17.7.0.crx
HKEY_CURRENT_USER\.DEFAULT\Software\
Ask.com.tmp\General
dbr = {Random Numbers}
Other Details
This Potentially Unwanted Application connects to the following possibly malicious URL:
- http://apnmedia.{BLOCKED}k.com/media/toolbar/stub/1.0.0.0/ApnIC.dll?tb=ARS&version=1.0.0.0
- http://websearch.{BLOCKED}k.com/installed?client=ic&tb=ARS&dtid=&id=4afcb82e-a41d-4e59-9f92-e117768a0d02&ipid=&iev=8.0.7601.17514&iedis=0&ielu=-2&fflu=-2&iv=&nv=&clientv=9.9.9.9&said=6c268d7c-11c4-4968-bb72-cf587d3d5bd7&browser-lang=en&apn_dbr=ie_8.0.7601.17514&cr=1
- http://img.{BLOCKED}lytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^AG^YYYYYY^YY^PH&encb=&chk=sucof&ts=syhAI&guid=4afcb82e-a41d-4e59-9f92-e117768a0d02&dt=14913&wft=remote&inst=200&tb=ARS&hos=6.1.1.sp1.x86&harch=32&hloc=en-US&iv=8.0.7601.17514&fv=3.5.7%20(en-US)&dbr=132&vb=&msi=&dot=6
- http://download.{BLOCKED}ftware.com/download/converter.asp?V=W3
- http://download.{BLOCKED}ftware.com/download/gplgs.exe
SOLUTION
9.850
1.995.00
06 Sep 2018
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 3
Delete this registry key
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
- In HKEY_CURRENT_USER\.DEFAULT\Software
- Ask.com.tmp
- Ask.com.tmp
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
- CutePDF Writer Installation
- CutePDF Writer Installation
- In HKEY_LOCAL_MACHINE\SOFTWARE
- Acro Software Inc
- Acro Software Inc
Step 4
Search and delete these folders
- %User Temp%\WZSE0.TMP
- %User Temp%\APN-Stub
- %User Temp%\is-{Random Name}.tmp
- %Common Programs%\CutePDF
- %Program Files%\Acro Software
- %User Temp%\APNLogs
Step 5
Search and delete files detected as PUA_BUNDLER.GB
- %User Temp%\AskSLib.dll
- %Temporary Internet Files%\Content.IE5\NVUI4L47\gplgs[1].exe
- %System%\cpwmon2k.dll
- %System%\spool\drivers\w32x86\CUTEPDFW.PPD
- %System%\spool\drivers\w32x86\PS5UI.DLL
- %System%\spool\drivers\w32x86\PSCRIPT.HLP
- %System%\spool\drivers\w32x86\PSCRIPT.NTF
- %System%\spool\drivers\w32x86\PSCRIPT5.DLL
- %User Temp%\converter.exe
Step 6
Scan your computer with your Trend Micro product to delete files detected as PUA_BUNDLER.GB. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.