Analysis by: Abraham Latimer Camba

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.

  TECHNICAL DETAILS

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan creates the following folders:

  • %System Root%\ProgramData
  • %System Root%\ProgramData\Microsoft
  • %System Root%\ProgramData\Microsoft\Windows
  • %System Root%\ProgramData\Microsoft\Windows\Common

(Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.)

Autostart Technique

This Trojan registers as a system service to ensure its automatic execution at every system startup by adding the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Security

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\DHCPSrv

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\NetLog0n

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\RegSysapp

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SessionService

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SystemSvc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\UDPMon

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\UPNPUpdate

Other System Modifications

This Trojan modifies the following registry entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings\
Cache\Paths
Directory = "%System Root%\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5"

(Note: The default value data of the said registry entry is %Temporary Internet Files%\Content.IE5.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings\
Cache\Paths\path1
CachePath = "%System Root%\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

(Note: The default value data of the said registry entry is %Temporary Internet Files%\Content.IE5\Cache1.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings\
Cache\Paths\path2
CachePath = "%System Root%\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

(Note: The default value data of the said registry entry is %Temporary Internet Files%\Content.IE5\Cache2.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings\
Cache\Paths\path3
CachePath = "%System Root%\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

(Note: The default value data of the said registry entry is %Temporary Internet Files%\Content.IE5\Cache3.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings\
Cache\Paths\path4
CachePath = "%System Root%\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

(Note: The default value data of the said registry entry is %Temporary Internet Files%\Content.IE5\Cache4.)

Dropping Routine

This Trojan drops the following files:

  • %System Root%\ProgramData\Microsoft\Windows\NetCC{number}.dll
  • %System Root%\ProgramData\Microsoft\Windows\QQlive.exe

(Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.)

It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.

Other Details

This Trojan connects to the following possibly malicious URL:

  • http://{BLOCKED}kynx.tuita.com/
  • http://hi.{BLOCKED}u.com/belheiwqiu/rss
  • http://hi.{BLOCKED}u.com/bwhrpbe/rss
  • http://hi.{BLOCKED}u.com/gpocoi55/rss
  • http://hi.{BLOCKED}u.com/gqpgemc/rss
  • http://hi.{BLOCKED}u.com/gqpgemcuwd/rss
  • http://hi.{BLOCKED}u.com/heiwqiu/rss
  • http://hi.{BLOCKED}u.com/ihnv2386/rss
  • http://hi.{BLOCKED}u.com/iwaxsxg/rss
  • http://hi.{BLOCKED}u.com/ocoijxnwkg/rss
  • http://hi.{BLOCKED}u.com/wdxiw894/rss
  • http://hi.{BLOCKED}u.com/wkgbbw73/rss
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/1f0ac9effbedab6430adfd66f736afc378311e56.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/295d531db3de9c82242fba386c81800a18d843dd.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/398e240aa8d3fd1fc6f6679b304e251f94ca5faa.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/398e240aa8d3fd1fc6f6679b304e251f94ca5faa.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/398e240aa8d3fd1fc6f6679b304e251f94ca5faa.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/6651d45a9258d109db8e9d0ed158ccbf6c814d32.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/7614f09f4710b91247873e45c3fdfc03934522e5.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/7614f09f4710b91247873e45c3fdfc03934522e5.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/8204a32bb80e7bec062cc75c2f2eb9389a506bb7.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/82de34e95266d0168e92b18f972bd40734fa35a3.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/c8882b633912b31bf89d7d8f8618367adbb4e1b9.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/ec2993cba9ec8a1313d61c46f703918fa1ecc066.jpg
  • http://hiphotos.{BLOCKED}u.com/upupupqw/pic/item/f2518b37dd54564ed3cdf798b3de9c82d0584f84.jpg
  • http://{BLOCKED}ahpqh.tuita.com/
  • http://{BLOCKED}rruym.tuita.com/
  • http://{BLOCKED}bdzzr.tuita.com/
  • http://t.{BLOCKED}e.com.cn/fxqpzokynx
  • http://t.{BLOCKED}e.com.cn/ifakcyahpqh
  • http://www.{BLOCKED}o.com/microblog/profile/url.htm?domain=fxqpzokynx
  • http://www.{BLOCKED}o.com/microblog/profile/url.htm?domain=ifakcyahpqh
  • http://www.{BLOCKED}o.com/microblog/profile/url.htm?domain=jkmxyarruym
  • http://www.{BLOCKED}o.com/microblog/profile/url.htm?domain=ybvjw135
  • http://www.{BLOCKED}o.com/microblog/pub/index.htm
  • http://{BLOCKED}35.tuita.com/