Home / malware Backdoor:Win32/Caphaw.D
First posted on 05 September 2012.
Source: MicrosoftAliases :
Backdoor:Win32/Caphaw.D is also known as BDS/Caphaw.D.66 (Avira), Backdoor.Win32.Caphaw (Ikarus).
Explanation :
Backdoor:Win32/Caphaw.D is a trojan that allows unauthorized access and control to your computer.
Installation
When executed, Backdoor:Win32/Caphaw.D makes a copy of itself in a variable location, such as one of the following:
- %AppData%\adobe
- %AppData%\adobe\acrobat\8.0\preferences
- %AppData%\adobe\acrobat\8.0\synchronizer\metadata
- %AppData%\adobe\linguistics\dictionaries
- %AppData%\adobe\linguistics\dictionaries\adobe custom dictionary\all
- %AppData%\adobe\linguistics\dictionaries\adobe custom dictionary\brt
- %AppData%\adobe\linguistics\dictionaries\adobe custom dictionary\eng
- %AppData%\limewire
- %AppData%\microsoft\excel\xlstart
- %AppData%\microsoft\templates
- %AppData%\shareaza
- %AppData%\winmx music
with a variable file name, such as any of the following:
- arp.exe
- cliconfg.exe
- dfrgfat.exe
- gdi.exe
- lsass.exe
- mshearts.exe
- qwinsta.exe
- sdbinst.exe
- slrundll.exe
- spoolsv.exe
- taskkill.exe
- taskman.exe
- taskmgr.exe
- winlogon.exe
- wpabaln.exe
Note that the following legitimate files exist by default in the Windows system folder:
- arp.exe
- cliconfg.exe
- lsass.exe
- qwinsta.exe
- sdbinst.exe
- spoolsv.exe
- taskkill.exe
- taskmgr.exe
- winlogon.exe
It modifies the registry to ensure it runs at each Windows restart:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random CLSID>" (for example, {81609907-FFED-EC46-7CA6-F8CF6C5B8516})
With data: "<full installation path>" (for example "%AppData%\adobe\linguistics\dictionaries\adobe custom dictionary\eng\taskman.exe")
The malware creates a mutex that matches the random CLSID (for example, 81609907FFEDEC467CA6F8CF6C5B851681609907F81609907). It may do this to ensure that only one copy of the malware is running on your computer at any one time.
It injects code into explorer.exe, then deletes itself after it has performed its malicious routine.
Backdoor:Win32/Caphaw.D injects itself into the following processes in an effort to hinder detection and removal:
- cmd.exe
- DW20.EXE
- ElementClient.exe
- explorer.exe
- fescom.exe
- fsav.exe
- game.exe
- inort.exe
- Kavstart.exe
- mrt.exe
- Persephone.exe
- QQgame.exe
- reader_sl.exe
Payload
Allows backdoor access and control
Backdoor:Win32/Caphaw.D attempts to communicate, using TCP port 443, to certain servers, such as the following:
- barclays-touchclarity.cc
- dig-services.su
- main-protec.at
- paragua-store.su
- plc-statistics.su
- some-system.cc
- struc-main.su
- upd-stat.cc
- worldwide-statistics.net
Using this backdoor, an attacker can perform any number of different actions on an affected computer, such as:
- Take control of your computer's desktop, which allows the attacker to see the desktop, and to gain control of the mouse and keyboard
- Access files and folders via an internal FTP server
- Redirect Internet traffic via a proxy server
- Send ICMP (Internet Control Message Protocol) packets that can be used in distributed denial-of-service (DDoS) attacks
- Log and redirect web traffic from Mozilla Firefox and Internet Explorer
- Update itself
- Shut down or restart your computer
Analysis by Hyun Choi
Last update 05 September 2012