Home / malware Worm:Win32/Taterf.gen!E
First posted on 04 April 2012.
Source: MicrosoftAliases :
Worm:Win32/Taterf.gen!E is also known as PWS-Lineage!by (McAfee), W32.Gammima.AG!gen4 (Symantec), W32/Frethog.AL (Norman), Trojan-GameThief.Win32.Magania.cweh (Kaspersky), W32/OnLineGames.CPS (Command), Win32/PSW.OnLineGames.OTM trojan (ESET), Trojan.PWS.Magania!nGGEthmFRMk (VirusBuster), Win-Trojan/Onlinegamehack5.Gen (AhnLab), Trojan.PWS.Wsgame.12661 (Dr.Web), Worm.Win32.Taterf (Ikarus).
Explanation :
Worm:Win32/Taterf.gen!E is generic detection for Win32/Taterf - a family of worms that spread via mapped drives in order to steal login and account details for popular online games.
Top
Worm:Win32/Taterf.gen!E is generic detection for Win32/Taterf - a family of worms that spread via mapped drives in order to steal login and account details for popular online games.
Installation
When executed, it deletes its executed copy, and copies itself to the %Temp% folder as a randomly-named file with hidden attributes. For example:
herss.exe
The worm modifies the registry so that its copy executes at each Windows start:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "cdoosoft"
With data: %temp%\herss.exe
The functionality to perform Taterf's password-stealing payload is contained in a DLL component, which is also dropped into the %Temp% folder using the following file name:
cvasds0.dll
Once dropped, the DLL is injected into explorer.exe or iexplore.exe.
Spreads via...
Mapped removable and network drives
The worm continually enumerates drives from C: - Z:, copying itself to the root of the drive, and creating an 'autorun.inf' file, which points to one of the copies that it creates. When the removable or networked drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically. This 'autorun.inf' file is detected as Worm:Win32/Taterf!inf.
The name that the worm uses to copy itself to in the root of the drive differs across variants, however, it usually consists of random letters and numbers with a '.com', 'cmd' or an '.exe' extension.
Payload
Steals online game data
Once injected, the DLL is used to obtain account information for one or more of the following Massively Multiplayer Online Games and affiliated products:
- Cabal OnlineUK
- Dungeon Fighter
- MapleStory
- Metin2 - Oriental Action MMORPG
- MU Online
Modifies system settings
Worm:Win32/Taterf.gen!E makes the following registry modifications, which specify how hidden folders and files are displayed using Windows Explorer:
- HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun
- HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden
- HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden
- HKLM\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue
Modifies system security settings
The worm attempts to circumvent security products by:
- Attempting to prevent AVP Antivirus from displaying notifications regarding changes made to the computer, by closing windows used by this product
- Attempting to terminate Ravmon.exe if it is found to be running on the affected computer
Analysis by Francis Allan Tan Seng
Last update 04 April 2012