Home / malware Win32/EyeStye
First posted on 10 May 2012.
Source: MicrosoftAliases :
Win32/EyeStye is also known as SpyEye (other).
Explanation :
Win32/EyeStye is a family of trojans that attempts to steal sensitive data, such as login credentials, and sends it to a remote attacker. In order to perform this payload it utilizes a method known as "form grabbing". Win32/EyeStye may also download and execute arbitrary files, such as updates of its components and may utilize a rootkit component in order to hide its malicious activity from the affected user.
Installation
This malware may be installed by TrojanDropper:Win32/EyeStye. When run, the trojan creates one of the following mutex names to ensure only one instance of the malware executes:
- __SPYNET__
- __CLEANSWEEP__
Recent variants have also been observed creating mutexes with a configurable, variable name.
In the wild, we have observed the trojan dropping files in the directory in which it is executed. It may create a hidden top-level directory, using the following format:
- \<file name>\<file name>.exe
Where <file name> may be, but is not limited to, the following:
- cleansweep.exe
- windowseep.exe
For example, cleansweep\cleansweep.exe.
The registry is modified to run the malware at each Windows start.
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<Win32/EyeStye file name>" (for example "syscheckrt.exe")
With data: "<path and file name of Win32/EyeStye>" (for example "c:\syscheckrt\syscheckrt.exe")
or
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random key>"
With data: "<path and file name of Win32/EyeStye>" (for example "c:\syscheckrt\syscheckrt.exe")
The configuration data file may also contain various "plug-ins" that are utilized to make up the malware's payload. This may include, the following:
- Backdoor functionality (either through RDP or a Socks5 proxy) allowing unauthorized access and control of the affected computer
- Jabber notification to the malware author of new infections
- Specific connections to use for transmission of stolen information to a remote attacker
- The ability to grab certificates from Firefox
- FTP functionality
The configuration file may contain the following files:
- config.dat
- screenshots.txt
- dns.txt
- <plug-in>.dll
- <plug-in>.cfg
Win32/EyeStye injects its payload into all currently running processes, while avoiding the following processes:
- smss.exe
- csrss.exe
- services.exe
- System
- <Win32/EyeStye process>
Payload
Lowers browser security zone settings
The malware modifies registry data that lowers browser security for Internet Explorer:
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
Sets value: "EnableHttp1_1"
With data: "1"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
Sets value: "1409"
With data: "3"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
Sets value: "1409"
With data: "3"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
Sets value: "1409"
With data: "3"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
Sets value: "1409"
With data: "3"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
Sets value: "1409"
With data: "3"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1
Sets value: "1406"
With data: "0"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2
Sets value: "1406"
With data: "0"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3
Sets value: "1406"
With data: "0"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4
Sets value: "1406"
With data: "0"
In subkey: HKCU\Software\Microsoft\Internet Explorer\PhishingFilter
Sets value: "EnabledV8"
With data: "0"
In subkey: HKCU\Software\Microsoft\Internet Explorer\Recovery
Sets value: "ClearBrowsingHistoryOnExit"
With data: "0"
Modifies Mozilla Firefox settings
The malware modifies the following settings for the web browser Mozilla Firefox:
- Disables safe browsing
- Disables malware blacklist check for downloads
- Disables alerts
- Disables clearing cookies and sessions
Uses stealth
Win32/EyeStye hooks the following APIs to prevent affected users from seeing malware files or system modifications with Windows Explorer, within a command prompt, or within the registry:
- NtEnumerateValueKey
- ZwEnumerateValueKey
- NtQueryDirectoryFile
- ZwQueryDirectoryFile
- NtVdmControl
- ZwVdmControl
Exports imported certificates
The malware hooks the "crypt32.dll" API "PFXImportCertStore" to make all imported certificates exportable.
Captures sensitive information
Win32/EyeStye hooks the following Windows APIs to steal authentication information and alter web content presented to the user:
- HttpAddRequestHeadersA
- HttpOpenRequestA
- HttpSendRequestW
- HttpQueryInfoA
- InternetQueryDataAvailable
- InternetReadFile
- InternetReadFileExA
- InternetCloseHandle
- InternetQueryOptionA
- InternetWriteFile
The following Firefox APIs are also hooked for the same purpose:
- PR_Read
- PR_Write
- PR_Close
- PR_OpenTCPSocket
- PR_GetSocketOption
- PR_SetSocketOption
- PR_GetError
- PR_SetError
It hooks the following APIs to take screenshots of the affected computer:
- GdipSaveImageToStream
- GdipSaveImageToFile
- GdipCreateBitmapFromHBITMAP
- GdiplusShutdown
- GdiplusStartup
Bypasses SSL
Win32/EyeStye hooks the API "CryptEncrypt" to intercept SSL traffic. If the security program Trusteer Rapport is running, the malware returns an error "NTE_NO_MEMORY" so that plain authentication is used.
Sends captured data to a remote server
The trojan attempts to send captured data via HTTP post to a remote server. In the wild, we have observed this trojan connecting to the following remote servers:
- microsoft-windows-security.com (not a Microsoft.com domain)
- vinodelam.net
- overclock.osa.pl
- qualitaetvorun.org
- svetodioduk.net
- rtjhteyjtyjtyj.orge.pl
- airiston.net
- superboy999.ru
- vertime.ru
- bettasbreed.co.cc
- nusofttechnologies.info
- svetodioduk2.com
- fieldsoflove.cc
- fightforce.cc
- totalhidden.cc
- feldmar.ru
- lyambosok.ru
- picomarkets.ru
- primedyl.com
- domain391.org
- securegateonline.com
- reg.kygalu.ru
- domain191.org
- black-hosting.ru
- hfhfhfhfee.com
It has been observed contacting the following remote server:
traxbax.<removed>/user/gate<removed>
While sending captured data, it may include the following additional information:
- "Bot guid" - unique identifier associated with the trojan
- User name
- Computer name
- Volume serial number
- Process name associated with captured data
- Name of hooked API function (for example PR_Write)
- Captured raw data
- Keys, logged keystrokes
- Other information specific to computer locale such as:
- Local time
- Time zone
- Operating system version
- Language
Analysis by Jaime WongLast update 10 May 2012