Home / malwarePDF  

Worm:Win32/Nuqel.AE


First posted on 06 March 2019.
Source: Microsoft

Aliases :

Worm:Win32/Nuqel.AE is also known as Win32/Autoit.worm.678913, Trojan.Win32.Autoit.eg, Sohanad.gen5, Trojan.Autoit.DX, Worm/Autoit.ELU, TR/Autorun.617473, Win32/Armax.I, Win32.HLLW.Autoruner.11962, Win32/Autoit.DB, Trojan.Win32.Autoit, W32/Autorun.worm.g, W32/Sohanat.IZ, W32/Tiotua-R, Ardamax, W32.Imaut more.

Explanation :

Worm:Win32/Nuqel.AE is a worm that spreads via removable drives, shared drives and via messages sent using Yahoo! Messenger. It can terminate certain processes, modify certain system settings and disable registry editing. Installation Upon execution, Worm:Win32/Nuqel.AE checks if it has full administrative access to the computer it is running in.   If Worm:Win32/Nuqel.AE is running with full administrative privileges, it deletes the following files, if they exist:  setup.ini
egsvr.exe winhelp.exe %windir%
egsvr.exe %windir%winhelp.exe   It then drops copies of itself in the computer as the following:  
egsvr.exe svchost .exe %windir%
egsvr.exe  Note that refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP, Vista, and 7 is C:WindowsSystem32.  Note also that a legitimate Windows file named "svchost.exe" (without the space between "svchost" and the extension ".exe") exists in the same folder.  It also drops the following file:   28463svchost.exe - detected as MonitoringTool:Win32/Ardamax   It modifies the system registry so that its dropped copies are run every time Windows starts:   Adds value: "Msn Messsenger" With data: "
egsvr.exe" To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun   Modifes value: "Shell" From data: "Explorer.exe" (default value) To data: "Explorer.exe regsvr.exe" In subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon   It also creates a job to execute one of its copies every day at 09:00.   If Worm:Win32/Nuqel.AE is running without full administrative privileges, it copies itself in the computer as:   %APPDATA%
egsvr.exe %APPDATA%setup.ini   It also drops the following file:   %APPDATA%supportsvchost.exe - detected as MonitoringTool:Win32/Ardamax   It modifies the system registry so that its dropped copies are run every time Windows starts:   Adds value: "Msn Messsenger" With data: "%APPDATA%
egsvr.exe" To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun   Adds value: "Yahoo Messsenger" With data: "%APPDATA%support
egsvr.exe" To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun Spreads Via... Removable and shared folders For each shared path found in the registry subkey "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerWorkgroupCrawlerShares", Worm:Win32/Nuqel.AE copies itself as the following files:   "New folder.exe" "
egsvr.exe"   It also copies itself in all folders as " .exe". For example, if a folder named "folder" exists, the worm copy has the name "folder.exe".   It also copies its dropped file "setup.ini" as "autorun.inf" in the shared or removable folder to allow automatic execution of the worm copy "regsvr.exe" if Autorun is enabled.   It also adds a registry entry so that a path containing a worm copy is shared in the network:   Adds value: "shared" With data: "New folder.exe" To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerWorkgroupCrawlerShares   Yahoo! Messenger Worm:Win32/Nuqel.AE attempts to send an instant message containing a URL to all contacts every 30 minutes.   The URL is determined using a previously-downloaded configuration file (see Payload section below). If the information cannot be located in the configuration file, or if the file cannot be located, this worm sends out an instant message with the following link:   ftp://tlpoeil:yahoogoogle@ftp.members.lycos.co.uk/selfextract.exe   The message is randomly chosen from messages stored in the configuration file. However, if no message data stored in the configuration file, or if the file cannot be located, the message is randomly chosen from any of the following: "Aishwarya Rai videos " "cyber cafe scandal visit " "Free mobile games " "Latest video shot of infosys girl " "Nfs carbon download " "Nse going to crash for more " "Regular monthly income by wearing your shorts at the comfort of your home for more info " "stream Video of Nayanthara and Simbu  " "World Business news broadcaster " Payloads Downloads arbitrary files Worm:Win32/Nuqel.AE checks the domain "yahoo.com" every two hours for the following configuration files: setting.doc setting.xls   Once any of these files is found, it saves the file as "setting.ini". It then attempts to retrieve files from a URL specified from these configuration files. If a file is found, it is downloaded as a hidden, system, and read-only file and run in the Windows system folder.   Terminates processes Worm:Win32/Nuqel.AE looks for open windows with the following string on their titles and attempts to close them: "[FireLion]" "Bkav2006" "Registry" (registry editors) "System Configuration" (msconfig.exe) "Windows mask"   Modifies the system registry Worm:Win32/Nuqel.AE deletes the following autorun registry entries: Deletes autorun entry for the Bkav2006 program: Deletes values "BkavFw" In subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun   Deletes autorun entry for the FireLion program: Deletes value: "IEProtection" In subkey: HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun   It also attempts to terminate the process "game_y.exe", which may be used by other malware if it is found running in the computer.   Modifies system settings Worm:Win32/Nuqel.AE makes a number of changes to system settings by changing the following registry entries: Removes the limit on how long scheduled tasks are active when set by the AT command of the Scheduler service: Adds value: "AtTaskMaxHours" With data: "0" To subkey: HKLMSYSTEMCurrentControlSetServicesSchedule   Disable Windows registry tools such as Registry Editor: Adds value: "DisableRegistryTools" With data: "1" To subkey: HKCUSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem   Analysis by Rodel Finones

Last update 06 March 2019

 

TOP