BKDR_INJECT.HBJ
Windows 2000, Windows XP, Windows Server 2003
Threat Type: Backdoor
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This backdoor may be unknowingly downloaded by a user while visiting malicious websites.
It bears the file icons of certain applications to avoid easy detection and consequent removal.
It opens a hidden Internet Explorer window.
TECHNICAL DETAILS
153,026 bytes
EXE
Yes
11 May 2011
Opens Internet Explorer window
Arrival Details
This backdoor may be unknowingly downloaded by a user while visiting malicious websites.
Installation
This backdoor drops the following files:
- %Windows%\adobeupdate.exe
- %Windows%\java\classes\ose.cer
- %User Temp%\ie.exe
- %User Temp%\loo.txt
- %User Temp%\winword.doc
- %Program Files%\Common Files\ODBC\Data Sources\Odbc.dat
(Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.. %Program Files% is the default Program Files folder, usually C:\Program Files.)
It bears the file icons of the following applications:
- Microsoft Word
Autostart Technique
This backdoor adds the following registry entries to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Active Setup\Installed Components\{8E12AADC-A55E-3FBE-4C6E-6B6EAC7CAFB5}
StubPath = %Windows%\adobeupdate.exe
Backdoor Routine
This backdoor opens a hidden Internet Explorer window.