Home / malwarePDF  

Worm:Win32/Brontok.DF@mm


First posted on 21 February 2012.
Source: Microsoft

Aliases :

There are no other names known for Worm:Win32/Brontok.DF@mm.

Explanation :

Worm:Win32/Brontok.DF@mm is a mass-mailing email worm that spreads by sending a copy of itself as an attachment to messages that are sent out to addresses gathered from files on the infected computer. Worm:Win32/Brontok.DF@mm can also copy itself to USB and removable drives. Worm:Win32/Brontok.DF@mm modifies certain computer settings, such as how hidden files are displayed, and disables registry editing.


Top

Worm:Win32/Brontok.DF@mm is a mass-mailing email worm that spreads by sending a copy of itself as an attachment to messages that are sent out to addresses gathered from files on the infected computer. Worm:Win32/Brontok.DF@mm can also copy itself to USB and removable drives. Worm:Win32/Brontok.DF@mm modifies certain computer settings, such as how hidden files are displayed, and disables registry editing.



Installation

Upon execution, Worm:Win32/Brontok.DF@mm opens a Windows Explorer window to the "My Documents" folder. This may mislead the user into thinking that the file is not malicious.

Worm:Win32/Brontok.DF@mm creates copies of itself as the following:

  • %AppData%\csrss.exe
  • %AppData%\inetinfo.exe
  • %AppData%\lsass.exe
  • %AppData%\services.exe
  • %AppData%\smss.exe
  • %UserProfile%\Start Menu\Programs\Startup\Empty.pif
  • %UserProfile%\Templates\Brengkolang.com
  • %UserProfile%\Templates\WowTumpeh.com
  • %windir%\eksplorasi.exe
  • %windir%\ShellNew\bronstab.exe
  • %WinDir%\system32\<user name> Setting.scr
  • %WinDir%\system32\drivers\etc\hosts-denied by-<user name>.com


Note that legitimate files named "csrss.exe", "inetinfo.exe", "lsass.exe", "services.exe", "smss.exe", and "winlogon.exe" exist by default in the Windows system folder.

Worm:Win32/Brontok.DF@mm also creates the following folders:

  • %AppData%\Bron.tok-9-10
  • %AppData%\loc.mail.bron.tok
  • %AppData%\Ok-SendMail-Bron-tok


It may also create the following files:

  • %AppData%\bronfoldnetdomlist.txt
  • %AppData%\bronnetdomlist.bat
  • %AppData%\bronnpath0.txt
  • %AppData%\Kosong.Bron.Tok.txt
  • %UserProfile%\My Documents\My Pictures\about.Brontok.A.html - contains the body of the email it sends out


It also modifies the system registry so that its copies run at every Windows start:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Tok-Cirrhatus"
With data: "%AppData%\smss.exe"

In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Bron-Spizaetus"
With data: "%windir%\shellnew\bronstab.exe"

In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Modifies value: "Shell"
From data: "explorer.exe" (default value)
To data: "explorer.exe "%windir%\eksplorasi.exe""

In most cases, Worm:Win32/Brontok uses the Windows "New folder" icon for the worm files. This may cause the file to appear as if it were a new folder rather than an executable file. Unsuspecting users clicking on what they perceive to be a folder to view its contents thereby inadvertently run the worm file.

Worm:Win32/Brontok.DF@mm also creates the following scheduled task, which ensures that the worm copy (either %UserProfile%\Templates\Brengkolang.com or %UserProfile%\Templates\WowTumpeh.com) runs every day:

%WinDir%\Tasks\At1.job

Spreads via...

Email messages

Worm:Win32/Brontok.DF@mm searches for email addresses in files with the following extensions:

.ASP
.CFM
.CSV
.DOC
.EML
.exe
.HTM
.HTML
.HTT
.PDF
.PHP
.PPT
.TXT
.WAB
.XLS

Gathered addresses are stored in a file in the folder "%AppData%\loc.mail.bron.tok". Worm:Win32/Brontok.DF@mm then sends out messages to these addresses.

The email messages may have the following format:

Subject: (no subject)
From: (any of the following)
Berita_<two numbers>@kafegaul.com
GaulNew_<two numbers>@kafegaul.com
HotNews_<two numbers>@playboy.com
Movie_<two numbers>@playboy.com
Attachment: (any of the following executable files)
rundll32.exe
Systray.exe
tskmgr.exe
winword.exe
xpshare.exe
Body: (stored in "%UserProfile%\My Documents\My Pictures\about.Brontok.A.html"; may be, but is not limited to the following:)
!!! Akan Kubuat Mereka (VM lokal yg cengeng & bodoh) Terkapar !!
( Go To HELL )
( Send to "NUSAKAMBANGAN")
-- Hentikan kebobrokan di negeri ini --
-- JowoBot #VM Community --
-- KIAMAT SUDAH DEKAT --
1. Penjarakan Koruptor, Penyelundup, Tukang Suap, & Bandar NARKOBA
2. Stop Free Sex, Aborsi, & Prostitusi
3. Stop pencemaran lingkungan, pembakaran hutan & perburuan liar.
4. SAY NO TO DRUGS !!!
[ By: HVM31 ]
BRONTOK.A[9]
Elang Brontok (Spizaetus Cirrhatus) yang hampir punah
Terinspirasi oleh:

Removable drives and shared folders

Worm:Win32/Brontok.DF@mm also attempts to spread by copying itself to available removable drives and the following shared folders:

  • My Data Sources
  • My Documents
  • My Ebooks
  • My Music
  • My Pictures
  • My Shapes
  • My Videos


The file names it uses for its copies vary.



Payload

Modifies system settings

Worm:Win32/Brontok.DF@mm modifies the following computer settings:

Changes the way hidden files are displayed in Windows Explorer:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "Hidden"
With data: "0"

Changes the way file display options are made available in Windows Explorer:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Sets value: "NoFolderOptions"
With data: "1"

Disables registry editing tools:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableRegistryTools"
With data: "1"

Modifies system files

Worm:Win32/Brontok.DF@mm may create the following file, or modify it if it exists:

autoexec.bat

by adding the command "pause" into it.

Connects to a remote server

Worm:Win32/Brontok.DF@mm checks if the computer is connected to the Internet by connecting to:

  • google.com
  • yahoo.com
Additional information

Worm:Win32/Brontok.DF@mm may create a file named "Ok-SendMail-Bron-tok" in the %AppData% folder.



Analysis by Hyun Choi

Last update 21 February 2012

 

TOP