Home / malware Win32/Dircrypt
First posted on 28 April 2014.
Source: MicrosoftAliases :
There are no other names known for Win32/Dircrypt.
Explanation :
Threat behavior
Installation
Win32/Dircrypt can spread via spam emails, or by being downloaded by other malware. It can drop a few copies of itself into these folders using random file names:
- %ProgramFiles% \
- %APPDATA% \
- %TEMP%
For example:
- %ProgramFiles% \gnucleus\brcduejm.exe
- %APPDATA% \adobe\ankiybii.exe
\msnrurfv.exe - %TEMP% \iazkodqn.exe
It can also drop other files in your PC as part of its installation process:
- %APPDATA% \dirty\alertwall.jpg - which might look like this:
- %APPDATA% \dirty\dirtydecrypt.exe - which might be detected as Trojan:Win32/Dircrypt.A or Trojan:Win32/Dircrypt.B
- %APPDATA% \dirty\dirtydecrypt.exe
- %LOCALAPPDATA% \dirty\dirtydecrypt.exe
This threat also creates the following registry changes to that it runs automatically every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: ""
With data: "%APPDATA%\\ .exe"
In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value: "Userinit"
With data: "\userinit.exe,,%ProgramFiles%\ \ .exe"
It also makes these registry changes as part of its installation process:
In subkey: HKLM\SAM\SAM\DOMAINS\Account\Users\000003EB
Sets value: "F"
With data: ""
In subkey: HKLM\SAM\SAM\DOMAINS\Builtin\Aliases\00000220
Sets value: "C"
With data: ""
In subkey: HKLM\SAM\SAM\Domains\Builtin
Sets value: "F"
With data: ""
In subkeys: HKCU\Software\{} and HKLM\Software\{ }
Sets value: "PeriodDisabed"
With data: "1"
This threat injects itself into these legitimate processes:
- explorer.exe
- svchost.exe
- winlogon.exe
Payload
Lowers security settings
It makes your PC less secure by changing these settings:
Bypasses the proxy server, if you have one configured:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\
Sets value: "ProxyBypass"
With data: "1"
Disables notifications about Windows Firewall:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
Sets value: "DisableNotifications"
With data: "1"
Disables the Security Center service:
In subkey: HKLM\SYSTEM\ControlSet001\Services\wscsvc
Sets value: "Start"
With data: "4"
Disables the Windows Update service:
In subkey: HKLM\SYSTEM\ControlSet001\Services\wuauserv
Sets value: "Start"
With data: "4"
Disables the Security Center warning that you don't have an antivirus program installed:
In subkey: HKLM\SOFTWARE\Microsoft\Security Center
Sets value: "AntiVirusOverride"
With data: "1"
Disables Task Manager:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\policies\system
Sets value: "DisableTaskMgr"
With data: "1"
Disables Least user access (or LUA):
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\policies\system
Sets value: "EnableLUA"
With data: "0"
Encrypts files in your PC
This threat encrypts files in your PC. It then displays its dropped image to tell you how to recover your files by paying a ransom:
Analysis by Marianne Mallen
Symptoms
The following could indicate that you have this threat on your PC:
- You cannot access your files; instead you see an image like this:
- You see these entries or keys in your registry:
In subkey: HKLM\SAM\SAM\DOMAINS\Account\Users\000003EB
Value: "F"
With data: ""
In subkey: HKLM\SAM\SAM\DOMAINS\Builtin\Aliases\00000220
Value: "C"
With data: ""
In subkey: HKLM\SAM\SAM\Domains\Builtin
Value: "F"
With data: ""
- You can't run Task Manager
Last update 28 April 2014