Home / malwarePDF  

Worm:Win32/Babonock.A


First posted on 17 October 2014.
Source: Microsoft

Aliases :

There are no other names known for Worm:Win32/Babonock.A.

Explanation :

Threat behavior

Installation

TrojanSpy:Win32/Babonock.A drops itself as the following file:

%AppData%\Microsoft\Office\rundll32.exe

It creates the following registry entry so that it runs every time Windows starts:

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "Microsoft Windows"
With data: "%AppData%\Microsoft\Office\rundll32.exe"

It also creates the following registry entry to keep track of what version of itself is installed in your computer:

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "Msversion"
With data: ""

Payload

Hides files and folders

TrojanSpy:Win32/Babonock.A makes the following registry changes to prevent you from choosing to display hidden files and folders using Windows Explorer:

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "ShowSuperHidden"
With data: "0"

It also hides known file extensions when files are viewed in Windows Explorer by setting the following registry entry:

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "HideFileExt"
With data: "1"

Connects to a remote server

TrojanSpy:Win32/Babonock.A connects to an FTP server such as:

  • bytehost10com
  • bytehost6com
  • drivehqcom


It may do this for the following purposes:

  • Download and update itself
  • Download other files
  • Upload files including logged keystrokes and open window count
  • Create folders




Analysis by Elda Dimakiling

Symptoms

System changes


The following system changes may indicate the presence of this malware:

  • The presence of the following file:
    %AppData%\Microsoft\Office\rundll32.exe
  • The presence of the following registry modifications:

    In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    Sets value: "Microsoft Windows"
    With data: "%AppData%\Microsoft\Office\rundll32.exe"

Last update 17 October 2014

 

TOP