Analysis by: David John Agni

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Adware

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This adware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size: 259,901 bytes
File Type: EXE
Memory Resident: No
Initial Samples Received Date: 07 Apr 2011

Arrival Details

This adware may arrive bundled with malware packages as a malware component.

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This adware drops the following files:

  • %ProgramData%\Fla\f.bak
  • %ProgramData%\Fla\flaclean.exe
  • %ProgramData%\Fla\Flacpy_inst.exe
  • %ProgramData%\Fla\Fla.dll
  • %ProgramData%\Common Files\Java\flaclean.exe
  • %ProgramData%\Common Files\Java\flacpy.exe
  • %ProgramData%\Common Files\Java\flacpy.cfg

(Note: %ProgramData% is the Program Data folder, where it usually is C:\Program Files in Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\ProgramData in Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)

It creates the following folders:

  • %ProgramData%\Fla
  • %ProgramData%\Common Files\Java

(Note: %ProgramData% is the Program Data folder, where it usually is C:\Program Files in Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\ProgramData in Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)

Other System Modifications

This adware adds the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\fla

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
UnawareObj.UnawareObj

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
UnawareObj.UnawareObj.1

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\"{CLSID}"

It adds the following registry entries as part of its installation routine:

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
UnawareObj.UnawareObj\CurVer
(Default) = "FlashEnhancer.FlashEnhancer.1"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
UnawareObj.UnawareObj.1\CLSID
(Default) = "{CLSID}"

HKEY_LOCAL_MACHINE\SOFTWARE\fla
INSTALLDIR = "%ProgramData%\Fla"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\"{CLSID}"
(Default) = "FlashEnhancer Ext"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\RunOnce
f = "%ProgramData%\Fla\flaclean.exe"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\RunOnce
fla = "%ProgramData%\Common Files\Java\flaclean.exe"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
FlaCPY = "%ProgramData%\Common Files\Java\flacpy.exe"