Home / malware Win32/Sirefef
First posted on 25 April 2012.
Source: MicrosoftAliases :
There are no other names known for Win32/Sirefef.
Explanation :
Win32/Sirefef is a multi-component family of malware that uses stealth to hide its presence on an affected computer. Due to the nature of this threat, the payload may vary greatly from one infection to another, although common behavior includes:
- Downloading and executing of arbitrary files
- Contacting remote hosts
- Disabling of security features
Caution: Win32/Sirefef is a dangerous threat that uses advanced stealth techniques in order to hinder its detection and removal. Particular variants of Win32/Sirefef may also make lasting changes to your computer that will NOT be restored - some system files may be irrevocably corrupted and essential security services may be disabled.
Due to the severe consequences associated with this threat, you may need to reinstall your Windows operating system and other computer programs, and restore your files and data from backup if your computer is infected with any of the following Sirefef variants:
- Trojan:Win32/Sirefef.AA
- Trojan:Win32/Sirefef.AC
- Trojan:Win32/Sirefef.AH
Top
Win32/Sirefef is a multi-component family of malware that uses stealth to hide its presence on an affected computer. Due to the nature of this threat, the payload may vary greatly from one infection to another, although common behavior includes:
- Downloading and executing of arbitrary files
- Contacting remote hosts
- Disabling of security features
Installation
The dropper component of Win32/Sirefef has been observed to be distributed by exploits and programs that promote software-piracy, such as 'keygens' and 'cracks' (programs designed to bypass software licensing).
When executed, the malware attempts to replace a randomly-selected system driver with its own malicious copy. The replaced driver could be any of the following:
- afd.sys
- i8042prt.sys
- ipsec.sys
- mrxsmb.sys
- netbt.sys
- raspppoe.sys
- serial.sys
Note that this list is not comprehensive.
The replaced driver will load each time Windows starts. The replaced driver may be detected as a variant of Virus:Win32/Sirefef or as TrojanDropper:Win32/Sirefef.B.
Payload
Downloads and executes arbitrary files
Sirefef utilizes a peer-to-peer (P2P) protocol to download or update additional malware components from remote peers. The downloaded components are saved to the U\ directory in a hidden folder that it creates for this purpose. The downloaded components may:
- Moderate an affected user's Internet experience by modifying search results
- Generate pay-per-click advertising revenue for its controllers
- Run Bitcoin (digital currency) mining on the affected computer
Terminates security-related services
Sirefef attempts to stop and delete the following security-related services:
- Windows Defender Service (windefend)
- IP Helper Service (iphlpsvc)
- Windows Security Center Service (wscsvc)
- Windows Firewall Service (mpssvc)
- Base Filtering Engine Service (bfe)
Contacts remote hosts
Sirefef contacts a remote host to send information about the infected computer. This information may then be used to create a network of infected computers that the attacker may utilize for practically any purpose.
Turns off Windows Firewall
Sirefef attempts to turn off Windows Firewall to make sure its own traffic won't be blocked.
Additional information
Sirefef implements a disk-level hook to hide its own presence on the affected computer. If an attempt is made to read the replaced driver, Sirefef returns the original, clean driver. Any modifications that are made to this driver will have no impact on the computer, as the replacement, malicious driver will always run instead.
Sirefef includes a self-defense mechanism to protect against security related software; the malware attempts to terminate any process that attempts to access Sirefef.
Creates a folder in which to store other malware
Sirefef creates a special folder configured as a reparse point (a collection of user-defined data) in which to store additional malware components, as well as the original clean copy of the replaced driver.
The created folder uses the following format:
<system root>\$NtUninstallKB<number>$
where <number> is a randomly generated number.
Note: The files stored under this folder are encrypted, and are not generally accessible.
Analysis by Chun Feng
Last update 25 April 2012