Home / malware Win32/Tracur
First posted on 12 July 2011.
Source: SecurityHomeAliases :
There are no other names known for Win32/Tracur.
Explanation :
Win32/Tracur is a detection for the trojan family Tracur that downloads and executes arbitrary files, redirects web search queries to a malicious URL and may also install other malware.
Top
Win32/Tracur is a detection for the trojan family Tracur that downloads and executes arbitrary files, redirects web search queries to a malicious URL and may also install other malware.
Installation
Win32/Tracur may drop several modified copies of itself as the following:
- <system folder>\<ExistingDLLName>32.exe
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
In the wild, we have observed the trojan using the following file names:
- hal32.dll
- olecli3232.dll
- olecli3232.exe
- authz32.dll
On rebooting, Win32/Tracur makes the following changes to the registry to ensure that the malware DLL is executed each time a specified parent-process is launched:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Sets value: "AppInit_Dlls"
With data: "<system folder>\<ExistingDLLName>32.dll"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\<Key>
Sets value: "DllName"
With data: "<system folder>\<ExistingDLLName>32.dll"
Where <key> is derived from the infected computer's volume serial number (for example, acc0e9de849 and acc0e9de1018).
Once the above registry entries have been created, the malware DLL loads.
The malware checks if the parent-process is one of the following:
- explorer.exe
- winlogon.exe
- iexplore.exe
- firefox.exe
- opera.exe
- chrome.exe
If the above are not identified as a parent-process, the malware will exit.
Win32/Tracur may create the following events and mutex to ensure that only one copy of the threat runs on infected the computer at any one time:
- 6003E92E5B1-D6FE-4804-9E28-FEF7FA8750A44592
- C21234D3-5CC2-4bdd-9BE7-82A34EF3FAE0
- F90C5025-8C4C-4605-84D2-C798A4BCD209849
The malware may install one of the dropped files as a Browser Helper Object (BHO) by adding the following registry entries:
In subkey: HKLM\SOFTWARE\Classes\CLSID\{<CLSID value>}\InProcServer32
Sets value: "(default)"
With data: "<system folder>\<ExistingDLLName>32.dll"
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{<CLSID value>}
Sets value: "NoExplorer"
With data: "1"
In the wild, we have observed <CLSID value> to have the value {05C378E0-9FB2-4EFD-985A-276C6C8C623b} or {55A59ADA-4ABD-99C6-4018-99A9B02C7123}. However, it may vary.
Payload
Drops other malware
Many variants of Win32/Tracur may drop other malware, detected as Win32/Dursg,as one of the following:
- %APPDATA%\syswin\lsass.exe
- %APPDATA%\systemproc\lsass.exe
- %APPDATA%\system\lsass.exe
Win32/Tracur will then make the following change to the registry to ensure that the Win32/Dursg variant executes at each Windows start:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
Sets value: "RTHDBPL"
With data: "%APPDATA%\syswin\lsass.exe"
For more details, please see the description for Win32/Dursg elsewhere in the encyclopedia.
Redirects web searches
Win32/Tracur monitors the user's web browsing and may redirect web searched to a malicious URL when one of the following search engines are used:
- Yahoo
- AOL
- Ask
- Bing
In addition to the search engines listed above, some variants may also redirect searchers for the following:
- Snap
- Hotbot
- Gigablast
- Lycos
- Altavista
- Alltheweb
- Netscape
- Youtube
Allows backdoor access and control
Win32/Tracur attempts to connect to a server via a random TCP port and wait for commands. Using this backdoor, an attacker can perform a number of actions on an affected computer. For example, an attacker may be able to perform the following actions:
- Download and execute arbitrary files
- Control the web browser redirection parameters
Modifies Windows Firewall settings
Win32/Tracur may use the <system folder>\netsh.exe Windows utility to add malware to the exceptions list by making the following changes to the registry:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List
Sets value: "<system folder>\<ExistingDLLName>32.exe"
With data: "<system folder>\<ExistingDLLName>32.exe:*:enabled:windows update service"
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "<system folder>\<ExistingDLLName>32.exe"
With data: "<system folder>\<ExistingDLLName>32.exe:*:enabled:windows update service"
Analysis by Rodel Finones
Last update 12 July 2011