Home / malwarePDF  

TrojanSpy:MSIL/Hakey.A


First posted on 23 April 2015.
Source: Microsoft

Aliases :

There are no other names known for TrojanSpy:MSIL/Hakey.A.

Explanation :

Threat behavior

Installation

This threat creates a copy of itself with hidden attributes in the following location:

  • \Important\svchost.exe


It changes the following registry entry so that it runs each time you start your PC:

In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "svchost"
With data: "\Important\svchost.exe"

The malware also modifies the following registry entries as a part of its malicious routine:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "Hidden"
With data: "dword:00000002"

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "HideFileExt"
With data: "dword:00000001"


Payload

Records your keystrokes

This threat can monitor and record what you do on your PC. This includes:

  • The keys you press
  • Your mouse clicks
  • The windows you open


The recorded information is saved to the log file %TEMP%\log.txt and is sent to a malicious hacker via email.

Additional information

This threat creates the mutex APName. This can be an infection marker to prevent more than one copy of the threat running on your PC.



Analysis by Ric Robielos

Symptoms

The following can indicate that you have this threat on your PC:

  • You have these files:

    \Important\svchost.exe
  • You see these entries or keys in your registry:

    In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    Sets value: "svchost"
    With data: "\Important\svchost.exe"

    In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
    Sets value: "Hidden"
    With data: "dword:00000002"

    In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
    Sets value: "HideFileExt"
    With data: "dword:00000000"

    In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
    Sets value: "HideFileExt"
    With data: "dword:00000001"

Last update 23 April 2015

 

TOP