PE_URSNIF.D-O
Worm:Win32/Tempedreve.A (MICROSOFT), a variant of Win32/Kryptik.CTYE trojan (NOD32)
Windows
![](/vinfo/imgFiles/legend.jpg)
Threat Type: Spyware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This spyware arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
249,344 bytes
EXE
Yes
06 Feb 2015
Arrival Details
This spyware arrives via removable drives.
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This spyware adds the following folders:
- %Application Data%\{random folder name 1}\
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
It drops the following copies of itself into the affected system:
- %Application Data%\{random folder name 1}\{random file name 1}.exe
- %System%\{random file name 2}.exe
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.. %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
Autostart Technique
This spyware registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Services\{random file name 2}
ImagePath = "%System%\{random file name 2}.exe -s"
HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Services\{random file name 2}
DisplayName = "{random file name 2}"
HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Services\{random file name 2}
Description = "{random file name 2}"
It adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{random value 1} = "%Application Data%\{random folder name 1}\{random file name 1}.exe"
It registers as a system service to ensure its automatic execution at every system startup by adding the following registry keys:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Services\{random file name 2}
Propagation
This spyware drops copies of itself in the following drives:
- removable drives
- network drives
It drops copies of itself in network drives such as the following:
- {drive letter}:\Temp.exe
It drops the following copy(ies) of itself in all removable drives:
- {drive letter}:\Temp.exe