Home / malwarePDF  

Backdoor:Win32/Wkysol.C


First posted on 07 January 2012.
Source: Microsoft

Aliases :

Backdoor:Win32/Wkysol.C is also known as Trojan.Inject.55767 (Dr.Web), Backdoor.Win32.Sykipot.bv (Kaspersky), BackDoor-FDE (McAfee), Backdoor.Sykipot (Symantec), TROJ_SPNR.11JS11 (Trend Micro).

Explanation :

Backdoor:Win32/Wkysol.C is a trojan that allows unauthorized remote access and control of an affected computer. This trojan has been observed to be installed when opening certain malicious PDF files that exploit a vulnerability affecting Adobe Reader and Acrobat. This malicious exploit in PDF files is detailed as an unspecified vulnerability in the U3D component in Adobe Reader and Acrobat and is further discussed in CVE-2011-2462.


Top

Backdoor:Win32/Wkysol.C is a trojan that allows unauthorized remote access and control of an affected computer. This trojan has been observed to be installed when opening certain malicious PDF files that exploit a vulnerability affecting Adobe Reader and Acrobat. This malicious exploit in PDF files is detailed as an unspecified vulnerability in the U3D component in Adobe Reader and Acrobat and is further discussed in CVE-2011-2462.



Installation

When run, Backdoor:Win32/Wkysol.C drops a copy of the trojan as an executable file named "help.exe" into the "Local Settings" file folder, as in the following example:

  • C:\Documents and Settings\Administrator\Local Settings\help.exe


The registry is modified to run the dropped trojan copy at each Windows start, as in the following example modification:

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "start"
With data: "C:\Documents and Settings\Administrator\Local Settings\help.exe"



Payload

Drops other malware
On execution, Backdoor:Win32/Wkysol.C drops other malware as a DLL, also into the "Local Settings" file folder as "WSE4EF1.TMP", which is detected as Backdoor:Win32/Wkysol.B. This DLL is then injected into the following processes:

  • outlook.exe
  • iexplorer.exe
  • firefox.exe


Allows unauthorized remote access and control
Backdoor:Win32/Wkysol.C allows unauthorized remote access and control of an affected computer by connecting to a remote server and accepting commands from an attacker. This trojan has been observed connecting to the domain "racingfax.com" for this purpose. When connecting to the server, communicates using the following server-side script and parameter:

  • <server\path\>kys_allow_get.asp?name=getkys.kys


Using this backdoor, an attacker can perform a number of actions, including but not limited to the following:

  • Create a command shell
  • Run or terminate applications and processes
  • Reboot the computer
Additional information

This malware supports an uninstall action, when run with the parameter '-remove'. When run with this option, the malware attempts to perform the following actions:

  • Remove its malicious components from the affected computer
  • Terminate its own running process
  • Delete registry data that executes the trojan




Analysis by Patrick Estavillo

Last update 07 January 2012

 

TOP