Home / malware Trojan:Win32/Tracur
First posted on 20 November 2013.
Source: MicrosoftAliases :
There are no other names known for Trojan:Win32/Tracur.
Explanation :
Threat behavior
Installation
Win32/Tracur can be distributed via exploit kits, like Blacole; downloaders, like TrojanDownloader:Win32/Karagany.A; or through social engineering.
Win32/Tracur drops a file with a randomly generated file name into one of the following locations:
- %USERPROFILE% \Local Settings\Application History\Identities\<random>.dll
- %USERPROFILE% \AppData Roaming\HP\<random>.dll
- %USERPROFILE% \Local Settings\Application Data\<already existing folder>\<random>.dll
We have seen the following file names used:
- qkhfyjds.dll
- sdifypfol.dll
- wkhnzka.dll
- yqpsrrxwz.dll
- ytcxc.dll
Win32/Tracur changes the following registry entry to ensure it runs each time you start your PC:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "(Default)"
With data: "rundll32.exe "<location and name of dropped file>",<export function>", for example "rundll32.exe "%USERPROFILE%\AppData Roaming\HP\qkhfyjds.dll",DllRegisterServerW"
Win32/Tracur can drop several changed copies of itself to these folders:
- <system folder> \<existing DLL name>32.exe
- <system folder> \<existing DLL name>32.dll
where <existing DLL name> refers to any existing Windows DLL file located in the system folder, for example C:\Windows\System32\olecli3232.exe.
In the wild, we have observed the trojan using the following file names:
- authz32.dll
- hal32.dll
- olecli3232.dll
- olecli3232.exe
The trojan may drop changed copies of itself as DLL files into a folder path that the trojan creates by combining the names of two folders in the %LOCALAPPDATA% or %APPDATA% folders, in the following format:
- %LOCALAPPDATA%\<first folder>\<second folder>\<random>.dll
- %APPDATA% \<second folder>\<first folder>\<random>.dll
For example, if %LOCALAPPDATA% contains a folder called Microsoft and a folder called Netscape, the DLL would be dropped in either one of the following folders:
- C:\Users\<user>\AppData\Local\Microsoft\Netscape\dwnxzmqxa.dll
- C:\Users\<user>\AppData\Local\Netscape\Microsoft\dwnxzmqxa.dll
In the wild , we have observed the DLL with the following random file names:
- dwnxzmqxa.dll
- egavp.dll
- goqkcl.dll
- hbpfdb.dll
- mvljo.dll
- onduhznwf.dll
- qseinzzqz.dll
- skorlmnjq.dll
- sshnkky.dll
Each time you start your PC, Win32/Tracur makes changes to the registry to ensure that the malware DLL is run each time one of these browsers is run as a parent=process:
- chrome.exe
- firefox.exe
- iexplore.exe
- opera.exe
If any one of the above are not identified as a running parent-process, the malware will exit.
The following are the changes that the malware makes to the registry to ensure the DLL is run:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Sets value: "AppInit_Dlls"
With data: "<system folder>\<existing DLL name>32.dll"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\<key>
Sets value: "DllName"
With data: "<system folder>\<existing DLL name>32.dll"
where <key> is derived from your PC's volume serial number (for example, acc0e9de849 and acc0e9de1018).
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware value>"
With data: "rundll32.exe "%LOCALAPPDATA%\<first folder>\<second folder>\<random>.dll",CreateInstance"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware value>"
With data: "rundll32.exe "%APPDATA%\<first folder>\<second folder>\<random>.dll",CreateInstance"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware value>"
With data: "rundll32.exe "%LOCALAPPDATA%\<first folder>\<second folder>\<random>.dll",DllRegisterServer"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware value>"
With data: "rundll32.exe "%APPDATA%\<first folder>\<second folder>\<random>.dll",DllRegisterServer"
where <malware value> is the same as <second folder>, for example:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Ares"
With data: "rundll32.exe "C:\Users\<user>\AppData\Local\Microsoft\Ares\dwnxzmqxa.dll",CreateInstance"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Ares"
With data: "rundll32.exe"C:\Users\<user>\AppData\Roaming\Microsoft\Ares\dwnxzmqxa.dll",DllRegisterServer"
The trojan also creates the following registry entry, possibly as an infection marker in order to prevent multiple instances of the malware from running and arousing suspicion:
In subkey: HKCU\Software\<mutex name>\CLSID, for example "HKCU\Software\bwukqmmsyf\CLSID"
Sets value: "(Default)"
With data: "<random globally unique identifier>", for example "{7d5b4281-35a1-4e0f-9c1d-cca2b6f45d50}"
Win32/Tracur can create the following events and mutexes with randomly generated names to ensure that only one copy of the threat runs on your PC at any one time:
- 6003E92E5B1-D6FE-4804-9E28-FEF7FA8750A44592
- bwukqmmsyf
- C21234D3-5CC2-4bdd-9BE7-82A34EF3FAE0
- dmxkwuuwjr
- F90C5025-8C4C-4605-84D2-C798A4BCD209849
The malware can install one of the dropped files as a Browser Helper Object (BHO) by adding the following registry entries:
In subkey: HKLM\SOFTWARE\Classes\CLSID\{<CLSID value>}\InProcServer32
Sets value: "<default>"
With data: "<system folder>\<existing DLL name>32.dll"
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{<CLSID value>}
Sets value: "NoExplorer"
With data: "1"
In the wild, we have observed <CLSID value> to have the value {05C378E0-9FB2-4EFD-985A-276C6C8C623b} or {55A59ADA-4ABD-99C6-4018-99A9B02C7123}. However, it may vary.
Payload
Redirects web searches
Win32/Tracur monitors your web browsing and may redirect web searches to a malicious URL when one of the following search engines is used:
- Alltheweb
- Altavista
- AOL
- Ask
- Bing
- Gigablast
- Hotbot
- Lycos
- Netscape
- Snap
- Yahoo
- Youtube
Members of the Win32/Tracur do this redirection by sending the keywords you entered into the search site to another server (called a "command and control" or "C&C" server). This server sends the URL it wants your browser to go to back to your PC. The sites themselves vary, and you may experience one of the following situations:
- You are redirected to where you intended to go
- You are redirected to a site that is very similar to where you intended to go
- You go to a "landing page" which has a number of links that you can click on, that may then take you to where you intended to go
- You are redirected to a random site that is not at all where you were intending to go
- You are redirected to a broken link and end up at an error page
To aid in its search-redirection payload, some variants install a Firefox browser extension by dropping a JAR archive file, with an .xpi extension, as follows:
<Firefox profile>\<profile name>\extensions\<random>@<random>.org.xpi
Notes:
- <Firefox profile> is taken from the profile paths of different user accounts that the trojan retrieves from the following registry entry:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\<user ID>\ProfileImagePath
where <user ID> refers to your account identifier, for example "S-15-18"
- <profile name> refers to the name of your Firefox profile, and may consist of letters and numbers
- <random> contains ten randomly generated characters, for example "idirktvriu@idirktvriu.org.xpi"
The Firefox browser extension contains another JAR archive file, for example printing.jar or doance.jar, that contains a malicious JavaScript file overlay.xul, detected as Trojan:JS/Tracur.E.
Win32/Tracur also installs an extension into the Google Chrome browser by dropping a file into a randomly named folder in the Chrome profile folder, for example:
%LOCALAPPDATA% \Google\Chrome\user data\Default\Default\aadhdhdjgddbdfddgcdjggdededagbdf\contentscript.js
lets backdoor access and control
Variants of Win32/Tracur try to connect to a server via a random TCP port and wait for commands. Using this backdoor, an attacker can do a number of actions on your PC, including the following:
- Download and run arbitrary files
- Control how the redirection payload happens
We have observed it trying to connect to the server 184.173.<removed>.54.
Drops other malware
Older variants of Win32/Tracur may also drop other malware, detected as a variant of the Win32/Dursg family, as one of the following:
- %APPDATA% \system\lsass.exe
- %APPDATA% \systemproc\lsass.exe
- %APPDATA% \syswin\lsass.exe
Note that lsass.exe is also the name used by a legitimate Windows file. It is located by default in <system folder> so if you find a file named lsass.exe elsewhere, that file might be malware.
Win32/Tracur will then make the following change to the registry to ensure that the Win32/Dursg variant runs at each Windows start:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
Sets value: "RTHDBPL"
With data: "%APPDATA%\syswin\lsass.exe"
Changes Windows Firewall settings
Variants may use the <system folder>\netsh.exe Windows utility to add malware to the Windows Firewall exceptions list by making the following changes to the registry:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List
Sets value: "<system folder>\<existing DLL name>32.exe"
With data: "<system folder>\<existing DLL name>32.exe:*:enabled:windows update service"
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "<system folder>\<existing DLL name>32.exe"
With data: "<system folder>\<existing DLL name>32.exe:*:enabled:windows update service"
Further reading
- July MSRT on web redirector malware http://blogs.technet.com/b/mmpc/archive/2011/07/28/july-msrt-on-web-redirector-malware.aspx
- MSRT July 2011: Targeting web redirector malware http://blogs.technet.com/b/mmpc/archive/2011/07/12/msrt-july-2011-targeting-web-redirector-malware.aspx
Related encyclopedia entries
Win32/Dursg
Trojan:JS/Tracur.E
TrojanDownloader:Win32/Karagany.A
Analysis by Rodel Finones and Nikola Livic
Symptoms
The following could indicate that you have this threat on your PC:
- After clicking on search results, you are taken to a site you were not expecting or intending to go to
Last update 20 November 2013