Home / malwarePDF  

TrojanDropper:Win32/Broonject.B


First posted on 03 February 2012.
Source: Microsoft

Aliases :

TrojanDropper:Win32/Broonject.B is also known as Trojan.DownLoad2.39716 (Dr.Web).

Explanation :

TrojanDropper:Win32/Broonject.B is a trojan that installs TrojanSpy:Win32/Broonject.B, a trojan that communicates with certain remote servers. TrojanDropper:Win32/Broonject.B may be installed when opening a malicious PDF file that exploits an unspecified vulnerability in the U3D component in Adobe Reader and Acrobat, described in CVE-2011-2462. The malicious PDF may be identified as Exploit:Win32/Pdfjsc.Y and Exploit:Win32/CVE-2011-2462.


Top

TrojanDropper:Win32/Broonject.B is a trojan that installs TrojanSpy:Win32/Broonject.B, a trojan that communicates with certain remote servers.



Installation

TrojanDropper:Win32/Broonject.B may be installed when opening a malicious PDF file that exploits an unspecified vulnerability in the U3D component in Adobe Reader and Acrobat, described in CVE-2011-2462. The malicious PDF may be identified as Exploit:Win32/Pdfjsc.Y and Exploit:Win32/CVE-2011-2462.

When the PDF exploit is opened using a vulnerable version of Acrobat Reader, the JavaScript shellcode executes a heap-spray function to exploit the vulnerability, resulting in the malware dropping an executable file detected as TrojanDropper:Win32/Broonject.B. for example:

  • <system folder>\client.exe


When this trojan dropper is run, it installs TrojanSpy:Win32/Broonject.B by dropping the following files:

  • <system folder>\< file name>d.dll - TrojanSpy:Win32/Broonject.B
  • <system folder>\< file name>d.exe - TrojanSpy:Win32/Broonject.B


Where <file name> was observed to "wincfg" or "userdom" (e.g. "userdomd.exe").

TrojanDropper:Win32/Broonject.B launches a hidden instance of Internet Explorer and injects the dropped file DLL component (for example, "userdomd.dll") into that process.



Payload

Communicates with a remote host
TrojanDropper:Win32/Broonject.B attempts to connect with one of the following remote servers:

  • 66.<removed>.132.11
  • reg<removed>.puzzleofworld.com
  • inf<removed>.puzzleofworld.com
  • dat<removed>.puzzleofworld.com
Additional information

TrojanDropper:Win32/Broonject.B creates the following registry data.

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
Sets value: "SMJW"
With data: "<system folder>\client.exe"

For more information about TrojanSpy:Win32/Broonject.B, see the description elsewhere in the encyclopedia.



Analysis by Wei Li

Last update 03 February 2012

 

TOP