TROJ_CRYPWALL.NE
Trojan-Ransom.Win32.Cryptodef.civ(Kaspersky);Ransom:Win32/Crowti.A(Microsoft);RDN/Spybot.bfr!p(McAfee)
Windows
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It deletes the initially executed copy of itself.
TECHNICAL DETAILS
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following copies of itself into the affected system:
- %System Root%\(8 random characters)\{8 random characters}.exe
- %Application Data%\(8 random characters).exe
- %User Startup%\(8 random characters).exe
(Note: %System Root% is the Windows root folder, where it usually is C:\ on all Windows operating system versions.. %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.. %User Startup% is the current user's Startup folder, which is usually C:\Windows\Profiles\{user name}\Start Menu\Programs\Startup on Windows 98 and ME, C:\WINNT\Profiles\{user name}\Start Menu\Programs\Startup on Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{8 random characters} = "%System Root%\(8 random characters)\{8 random characters}.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{9 random characters} = "%Application Data%\{8 random characters}.exe"
It drops the following file(s) in the Windows User Startup folder to enable its automatic execution at every system startup:
- %User Startup%\(8 random characters).exe
(Note: %User Startup% is the current user's Startup folder, which is usually C:\Windows\Profiles\{user name}\Start Menu\Programs\Startup on Windows 98 and ME, C:\WINNT\Profiles\{user name}\Start Menu\Programs\Startup on Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.)
Other System Modifications
This Trojan adds the following registry entries:
HKEY_CURRENT_USER\Software\{UID}
{random 2 characters} = "{RSA PUBLIC KEY} "
HKEY_CURRENT_USER\Software\{UID}
{random 2 characters} = {content of HELP_DECRYPT.TXT}
HKEY_CURRENT_USER\Software\{UID}
{random 2 characters} = {content of HELP_DECRYPT.HTML}
HKEY_CURRENT_USER\Software\{UID}
{random 2 characters} = {content of HELP_DECRYPT.URL}
HKEY_CURRENT_USER\Software\{UID}\
{random key}
{Full file path of encrypted file} = {data}
It modifies the following registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion\SystemRestore
DisableSR = 1
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\BITS
Start = 4
(Note: The default value data of the said registry entry is 3.)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\ERSvc
Start = 4
(Note: The default value data of the said registry entry is 2.)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\wscsvc
Start = 4
(Note: The default value data of the said registry entry is 2.)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\wuauserv
Start = 4
(Note: The default value data of the said registry entry is 2.)
Other Details
This Trojan connects to the following possibly malicious URL:
- {BLOCKED}9.com/img2.php
- {BLOCKED}.{BLOCKED}nd.info/img1.php
- {BLOCKED}an.com/img1.php
- {BLOCKED}muslim-online.com/img5.php
- {BLOCKED}m.com/img4.php
- {BLOCKED}zateonline.com/img3.php
- {BLOCKED}yber.com/img2.php
- {BLOCKED}et.com/img1.php
- {BLOCKED}-ng.com/img5.php
- {BLOCKED}8.com/img5.php
- {BLOCKED}an-guvenlik.com/img4.php
- {BLOCKED}a.com/img3.php
- {BLOCKED}de.com/img2.php
- {BLOCKED}wohnungen-diana.com/img1.php
- {BLOCKED}easset.com/img5.php
- {BLOCKED}c.us/img4.php
- {BLOCKED}dtile.net/img3.php
- {BLOCKED}bjx.com/img2.php
- {BLOCKED}talmd.com/img1.php
- {BLOCKED}alaria.org/img5.php
- {BLOCKED}hae.com/img4.php
- {BLOCKED}9.com/img3.php
- {BLOCKED}hon.com/img2.php
- {BLOCKED}oft.com/img1.php
- {BLOCKED}iaunited.com/img5.php
- {BLOCKED}oosphoto.com/img4.php
- {BLOCKED}orld.com/img3.php
- {BLOCKED}urch.com/img2.php
It deletes the initially executed copy of itself
NOTES:
It drops the following files in the folder where encrypted files are:
- HELP_DECRYPT.TXT
- HELP_DECRYPT.HTML
- HELP_DECRYPT.URL
- HELP_DECRYPT.PNG