Home / malwarePDF  

Worm:Win32/Brontok.GA@mm


First posted on 29 March 2013.
Source: Microsoft

Aliases :

Worm:Win32/Brontok.GA@mm is also known as Worm/Win32.Brontok (AhnLab), W32/Brontok.C.gen!Eldorado (Command), W32/Ircbot.CMCM (Norman), I-Worm/Brontok.A (AVG), Win32.Brontok.AP@mm (BitDefender), Win32.Virut.56 (Dr.Web), Win32/Brontok.B worm (ESET), Email-Worm.Win32.Brontok (Ikarus), Virus.Win32.Virut.ce (Kaspersky), W32/Rontokbro@MM (McAfee), Worm.Brontok!2A60 (Rising AV), W32.Virut.CF (Symantec), PE_VIRUX.R-3 (Trend Micro).

Explanation :



Installation

When run, it drops several copies of itself as the following:

  • %LOCALAPPDATA%\csrss.exe
  • %LOCALAPPDATA%\inetinfo.exe
  • %LOCALAPPDATA%\lsass.exe
  • %LOCALAPPDATA%\services.exe
  • %LOCALAPPDATA%\smss.exe
  • %LOCALAPPDATA%\winlogon.exe
  • <startup folder>\Empty.pif
  • %HOMEPATH%\Templates\A.kotnorB.com
  • %windir%\inf\norBtok.exe
  • %windir%\system32\3D Animation.scr


It creates a folder with the name format "Bron.tok-<M>-<D>", where <M> is the month and <D> is the day of the month. For example:

%LOCALAPPDATA%\Bron.tok-3-20

To make sure it automatically runs every time Windows starts, it creates a scheduled task to run the copy named "%TEMPLATES%\A.kotnorB.com" every day at 17:08. The task is stored in the file "%windir%\Tasks\At1.job".

It also adds entries to the system registry so that its copies automatically run every time Windows starts:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Tok-Cirrhatus"
With data: "%LOCALAPPDATA%\smss.exe"

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "Bron-Spizaetus"
With data: "%windir%\INF\norBtok.exe"

Spreads via...

Email

It gathers email addresses from files with the following extensions on all local drives from C to Y:

  • .asp
  • .cfm
  • .csv
  • .doc
  • .eml
  • .htm
  • .html
  • .php
  • .txt
  • .wab
  • .xls


It may use the following prefixes to search for domain names of SMTP servers:

  • smtp.
  • mail.
  • ns1.


It then uses its own SMTP engine to spread. It does this by sending a copy of itself as an attachment to all harvested e-mail addresses from the infected computer.

The emails sent out are made to appear as if they are from the following accounts:

  • Berita_<number>@kafegaul.com
  • GaulNews_<number>@kafegaul.com
  • Movie_<number>@pornstargals.com
  • HotNews_<number>@pornstargals.com


where <number> is a random number.

The email details may vary. Some emails have a blank subject line and an empty message. Others have messages that have English and Indonesian texts that might contain political messages or pictures. Some possible attachment file names are:

  • kangen.exe
  • Sample Picture.zip
  • photo.zip


Network shares

It may copy itself to writeable network shares. It scans your network for writeable shares, and copies itself to subfolders in these shares, if found. It uses either a random file name or the subfolder's name for the copy. For example, if it finds the writeable folder "foo" in the share Z:, it might copy itself as "Z:\foo\foo.exe".



Payload

Lowers your computer's security settings

Worm:Win32/Brontok.GA@mm tries to lower your computer's security settings by changing one or more of following registry entries:

  • Stops you from using the Registry Editor:
    In subkey: HKU\Software\Microsoft\Windows\CurrentVersion\Policies\System
    Sets value: "DisableRegistryTools"
    With data: "1"
  • Disables the command prompt:
    In subkey: HKU\Software\Microsoft\Windows\CurrentVersion\Policies\System
    Sets value: "DisableCMD"
    With data: "0"
  • Disables folder options in Windows Explorer:
    In subkey: HKU\Software\Microsoft\Windows\CurrentVersion\Policies\System
    Sets value: "NoFolderOptions"
    With data: "1"
  • Prevents the display of executable file extensions:
    In subkey: HKU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
    Sets value: "HideFileExt"
    With data: "1"


Overwrites files

It overwrites the file "C:\Autoexec.bat", if it exists in your computer, with line "pause".

Additional resources

Click here for more information about the Win32/Brontok malware family.



Analysis by Rex Plantado

Last update 29 March 2013

 

TOP