JS_PALEVO.ARJ
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website.
It modifies the Internet Explorer Zone Settings.
TECHNICAL DETAILS
2,095 bytes
JS, Script
02 Oct 2013
Arrival Details
This Trojan may arrive bundled with malware packages as a malware component.
It may be hosted on a website and run when a user accesses the said website.
Installation
This Trojan drops the following file(s)/component(s):
- c:\users\public\12.vbs
- c:\users\public\t.exe
It searches for the following folders where it can drop/create files:
- c:\users\public
Other System Modifications
This Trojan adds the following registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes
MJ = ""
HKEY_CURRENT_USER\Software
Local AppWizard-Generated Applications = ""
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications
PJM = ""
It adds the following registry entries:
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\
PJM
Recent File List = "(Default Value)"
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\
PJM
Settings = "(Default Value)"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\ShellNoRoam\MUICache\
c:\users\public
t.exe = "Microsoft"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
MJ
CLSID = "{Random Hex Values}"
Web Browser Home Page and Search Page Modification
This Trojan modifies the Internet Explorer Zone Settings.
Other Details
This Trojan connects to the following possibly malicious URL:
- http://{BLOCKED}.150.85/update?id=000f9b48
- http://{BLOCKED}.150.85:443/update?id=000f9b48
- http://{BLOCKED}.150.85:54/update?id=000f9b48
- http://{BLOCKED}.150.85:12345/update?id=000f9b48
- http://{BLOCKED}kyotofukai.com/css/FH.rar
SOLUTION
9.300
10.318.05
04 Oct 2013
10.319.00
05 Oct 2013
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
Close all opened browser windows
Step 3
Delete this registry value
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
- In HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\PJM
- Recent File List = "(Default Value)"
- Recent File List = "(Default Value)"
- In HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\PJM
- Settings = "(Default Value)"
- Settings = "(Default Value)"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\MUICache\c:\users\public
- t.exe = "Microsoft"
- t.exe = "Microsoft"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MJ
- CLSID = "{Random Hex Values}"
- CLSID = "{Random Hex Values}"
Step 4
Delete this registry key
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
- In HKEY_CURRENT_USER\Software
- Local AppWizard-Generated Applications = ""
- Local AppWizard-Generated Applications = ""
- In HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications
- PJM = ""
- PJM = ""
- In HKEY_LOCAL_MACHINE\SOFTWARE\Classes
- MJ = ""
- MJ = ""
Step 5
Search and delete these files
- c:\users\public\12.vbs
- c:\users\public\t.exe
Step 6
Reset Internet security settings
Step 7
Scan your computer with your Trend Micro product to delete files detected as JS_PALEVO.ARJ. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.