MISLEADAPP
FakeScanti
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet
MISLEADAPP is rogue antivirus software installed as usually as WireShark Antivirus. It lures users into paying a registration fee to be protected from malware. Similar to FAKEAV, it also displays fake scanning results.
TECHNICAL DETAILS
Yes
Displays fake scan results, Downloads files
Installation
This Trojan drops the following files:
- %User Temp%\win3.tmp
- %Windows%\ab7498d3.lg
- %Windows%\trkwksa.dll
- %Windows%\trkwksa.exe
(Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.. %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.)
It drops the following copies of itself into the affected system:
- %Program Files%\qtime8_32.exe
- %User Temp%\winupd64x.exe
(Note: %Program Files% is the Program Files folder, where it usually is C:\Program Files on all Windows operating system versions; C:\Program Files (x86) for 32-bit applications running on Windows 64-bit operating systems.. %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
Quick Time Updater = "%Program Files%\qtime8_32.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
winupd64x.exe = "%User Temp%\winupd64x.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
trkwksa = "%Windows%\trkwksa.exe"
Other System Modifications
This Trojan adds the following registry entries as part of its installation routine:
HKEY_CURRENT_USER\Software
fcb39e92-5c9b-4f6f-9765-77b959568acb =
HKEY_LOCAL_MACHINE\SOFTWARE\Antivirus
ID = "mmb"
HKEY_CURRENT_USER\Software\hycg\
hycg
lld = "{month-day of execution}"
HKEY_CURRENT_USER\Software\hycg\
hycg
pddc = "{month-day of execution}"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
kwsg
DisplayName = "Addendum Sidebar"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
kwsg
UninstallString = "%Windows%\trkwksa.exe" /dels"
It adds the following registry keys as part of its installation routine:
HKEY_LOCAL_MACHINE\SOFTWARE\Antivirus
HKEY_CURRENT_USER\Software\hycg
HKEY_CURRENT_USER\Software\hycg\
hycg
HKEY_CURRENT_USER\Software\Microsoft\
ab7498d3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
kwsg
Other Details
This Trojan connects to the following possibly malicious URL:
- http://{BLOCKED}.{BLOCKED}.11.165/admin/cgi-bin/check_update.php?type=site
- http://config.{BLOCKED}chguide.com/rep/lect.php
- http://config.{BLOCKED}chguide.com/sb_conf.php?ovt=
- http://config.{BLOCKED}chguide.com/xmlup/urls.php?ovt=
- http://down.{BLOCKED}h.kr/old/pogej.dll
- http://down.{BLOCKED}h.kr/old/pogej.exe
- http://log.{BLOCKED}guide.com/log-bin/alive.php?ovt=
- http://log.{BLOCKED}guide.com/log-bin/statics.php?maddr={mac address}&ipaddr={ip address}&ovt=&action=update
- http://log.{BLOCKED}guide.com/log-bin/statics.php?maddr={mac address}&ipaddr={ip address}&ovt=&verno=&action=load
- http://{BLOCKED}5.{BLOCKED}urceforyou.com/stget2.cgi?host=host&id=2955
- http://{BLOCKED}9.{BLOCKED}oolonline.com/stget2.cgi?host=host&id=3019
- http://{BLOCKED}9.{BLOCKED}klibrary.com/stget2.cgi?host=host&id=3019
- http://{BLOCKED}9.{BLOCKED}eeforyou.com/stget2.cgi?host=host&id=3019
- http://ww38.{BLOCKED}55.freesourceforyou.com/stget2.cgi?host=host&id=2955