Home / malwarePDF  

Trojan:W32/Monderd.gen


First posted on 26 February 2009.
Source: SecurityHome

Aliases :

There are no other names known for Trojan:W32/Monderd.gen.

Explanation :

Trojan.Win32.Monderd.gen is a generic detection for the Vundo trojan family.

right]While active, Vundo trojans displays pop-up advertisements. Some variants may also download and execute arbitrary files from remote sites.

The Vundo family is often distributed as DLL files. It is known to be bundled with adware and/or spyware programs.


Installation

Malware in the Vundo family are installed without the user's consent as a Browser Helper Objects (BHOs). During installation, the DLL file is dropped in Windows system directory. The file name is randomly generated using 8 alphabetic characters:

  • C:WINDOWSsystem32{8_random_alpha_char}.dll

Upon execution, the DLL is injected into 2 running processes:

  • Explorer.exe
  • Winlogon.exe

In some variants, several data files are created in the same location as the DLL file's execution. The data files' attributes are set as system file and hidden. The files use random names and the following extensions:

  • ini
  • ini2

Registry

During installation, malware in the Vundo family create a registry launch point with a unique Class ID. This launch point automatically starts the DLL when system is restarted.

To find this launch point, navigate to the following registry and look for the malicious file pointed by "InprocServer32" registry key:

  • [HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{unique_CLSID}InprocServer32]
  • @="C:WINDOWSsystem32{8_random_alpha_char}.dll"

The program will also make further modifications to load itself at startup:

  • [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks]
  • {unique_CLSID}

For some variants, the following registry keys are also created to load the program whenever the user logs on or off. The keys will use the same DLL file name as its key:

  • [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotify{DLL_file_name}]
  • Asynchronous=dword:00000001 DllName="{DLL_file_name}"
    Impersonate=dword:00000000
    Logon="o"
    Logoff="f"



Activity

Once installed, the trojan modifies Microsoft Internet Explorer's security setting to trust cookie content created by the trojan:

  • [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{unique_CLSID}]
  • [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settingsones3]
  • {unique_CLSID}="malware_hex_value"

Some variants may also attempt to download and execute arbitrary files from remote websites such as:

  • http://childhe.com/[..]/apstpldr.dll.html

The program runs hidden from the user.

Last update 26 February 2009

 

TOP