ADW_SEARCHPROT
Trj/OCJ.D(Panda), Win32/Conduit.SearchProtect.K application(NOD32), Downloader.Agent(VBA32), Downloader.NSIS.Agent.fq(Kaspersky)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)


Threat Type: Adware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.
TECHNICAL DETAILS
Arrival Details
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This adware drops the following files:
- %User Temp%\ns{random}.tmp
- %User Temp%\ns{random1}.tmp\inetc.dll
- %User Temp%\ns{random1}.tmp\nsisunz.dll
- %User Temp%\ns{random1}.tmp\System.dll
- %User Temp%\SP\GenericSS.exe
- %User Temp%\SP\SpeedyPC Pro Installer.exe
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
It creates the following folders:
- %User Temp%\SP
- %User Temp%\ns{random1}.tmp
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
Dropping Routine
This adware executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.
Other Details
This adware connects to the following possibly malicious URL:
- http://{BLOCKED}ychocolate.com/api/ResolveIP
- http://{BLOCKED}.{BLOCKED}ychocolate.com/installers/GenericSS.zip
