Home / malware Worm:Win32/Taterf.AA
First posted on 30 June 2009.
Source: SecurityHomeAliases :
Worm:Win32/Taterf.AA is also known as Also Known As:Worm.Win32.AutoRun.dni (Kaspersky), W32/AutoRun.DIW (Norman), Trojan horse PSW.OnlineGames.AO (AVG), Win32/Frethog.ATT (CA), PWS-Gamania.gen.a (McAfee).
Explanation :
Worm:Win32/Taterf.AA is a worm that spreads via mapped drives in order to steal login and account details for popular online games.
Symptoms
There are no obvious symptoms that indicate the presence of this malware on an affected machine.
Worm:Win32/Taterf.AA is a worm that spreads via mapped drives in order to steal login and account details for popular online games.Installation When executed, Taterf copies itself to the system directory as a hidden file using a file name with the following format:amvo<number>.exe The worm also drops a driver, wincab.sys, into the system directory. This driver is used to provide the worm with protection against particular security products. This driver is detected as VirTool:WinNT/Vanti.gen!A. Additionally, files are created in the %temp% directory using randomly generated file names - these are detected as variants of Win32/Vanti. The registry is modified to run the worm's copy at each Windows start (for example):
Adds value: "amva"
With data: "<system folder>amvo<number>.exe"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun
The functionality to perform Taterf's password-stealing payload is contained in a dll component.
The dll is injected into explorer.exe or iexplore.exe and detected as Worm:Win32/Taterf.A!dllSpreads via…Mapped drives
The worm continually enumerates drives from C- Z, copying itself to the root of the drive as 'n1deiect.com', and creating an 'autorun.inf' file. The autorun.inf is used to execute the worm whenever the drive is viewed with Windows Explorer. This file is detected as Worm:Win32/Taterf!inf.
Payload
Steals online game data
Once injected, the DLL is used to obtain account information for the following Massively Multiplayer Online Games and affiliated products:Lands of Aden Depardieu Ken Rauhel The captured details are sent to a remote server on the gamesrb.com domain
Modifies system settings
The following registry entries are modified in order to hinder detection and removal, and facilitate spreading:
HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerNoDriveTypeAutoRun
HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedShowSuperHidden
HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedHidden
HKLMSoftwareMicrosoftWindowsCurrentVersionexplorerAdvancedFolderHiddenSHOWALLCheckedValue
Downloads arbitrary files
The worm contacts the om7890.com domain in order to download files and update itself.
Modifies system security settings
The worm attempts to circumvent security products by:Attempting to prevent AVP Antivirus from displaying notifications regarding system changes by closing windows used by this product. Attempting to terminate Ravmon.exe if it is found to be running on the affected system.
Analysis by Matt McCormackLast update 30 June 2009