Home / malwarePDF  

Backdoor:Win32/Warood.C


First posted on 07 October 2015.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Warood.C.

Explanation :

Threat behavior

Installation


This threat can be installed by TrojanDropper:Win32/Warood.A.

It can create the following file:

  • \Microsoft\Media\fpapi.dll


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
Sets value: "ServiceDll"
With data: "%CurrentFolder%\m?" In subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\6to4

Sets value: "Type"
Sets data: €œdword:00000010€

Sets value: "Start"
With data: "dword:00000002"

Sets value: "ErrorControl"
With data: "dword:00000001"

Sets value: "ImagePath"
With data: "%SystemRoot%\system32\svchost.exe -k netsvcs"

Sets value: "DisplayName"
With data: "Microsoft .NET Framework NGEN"

Sets value: "ObjectName"
With data: "LocalSystem"

Sets value: "Description"
With data: "Microsoft .NET Framework NGEN v4.0.30319_X86"

In subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\6to4\Parameters
Sets value: "ServiceDll"
With data: "%CommonAppData%\Microsoft\Media\fpapi.dll"




Payload

Loads other malware

This threat can run other malware on your PC, including Backdoor:Win32/Warood.B.



Allows backdoor access and control

This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, such as:

  • Deleting files
  • Downloading and running files
  • Logging your keystrokes or stealing your sensitive data
  • Modifying your system settings
  • Running or stopping applications
  • Spreading malware to other PCs
  • Uploading files


This malware description was published using automated analysis of file SHA1 4ddaa2ddbd3dc896d5c72fcdf8f2c40ff6d8849a.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see registry modifications such as:
    • In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
      Sets value: "ImagePath"
      With data: "%systemroot%\system32\svchost.exe -k malware"

    • In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
      Sets value: "ServiceDll"
      With data: "%CurrentFolder%\m?"

    • In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
      Sets value: "ServiceMain"
      With data: "servicemain"

Last update 07 October 2015

 

TOP