Home / malware Trojan:Win32/Balisdat.gen!C
First posted on 29 November 2011.
Source: SecurityHomeAliases :
There are no other names known for Trojan:Win32/Balisdat.gen!C.
Explanation :
Trojan:Win32/Balisdat.gen!C is a trojan that acts as a malicious component for Win32/Banker and Win32/Bancos variants. It can download other files or delete security-related files found in the affected computer.
Top
Trojan:Win32/Balisdat.gen!C is a trojan that acts as a malicious component for Win32/Banker and Win32/Bancos variants. It can download other files or delete security-related files found in the affected computer.
Installation
When executed, Trojan:Win32/Balisdat.gen!C may drop any of the following files:
- BoxFile.bcc
- DolbyAudio.exe
- DolbyAudio3D.exe
- DolbyAudioHD.exe
- Kernel32bits.dll
- bootstat.exe
- csrss.exe
Note that a legitimate file also named "csrss.exe" exists by default in the Windows system folder.
These files may be dropped in any of the following folders:
- %Public%\Favorites\
- %windir%\Media\
- D:\WINDOWS\Media\
- <system folder>
except for "csrss.exe", which can only be dropped in %windir%\Media\ or D:\WINDOWS\Media\.
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the Windows system folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
Other samples of this malware are dropped in the root folder with a random file name. In the wild, some of these observed file names have been the following:
- C:\gb_cnetproc.exe
- C:\gbnb_zxcv.exe
- C:\gbnb_zzcb.exe
- C:\gbtr_sentra.exe
- C:\gbtr_siltry.exe
- C:\gbty_salty.exe
- C:\gbutr_sec.exe
- C:\powerpointview.exe
- C:\proctraw.exe
- C:\ramynysys.exe
- C:\rawfriksys.exe
- C:\rengasys.exe
- C:\sysnetview32.exe
- C:\syssayoview32.exe
- C:\win_bulkatro.exe
- C:\win_gbterzcuzi.exe
- C:\win_gtermu.exe
- C:\win_nulqaxro.exe
- C:\win_nyltibits.exe
- C:\winsizenet32.exe
Some variants of Trojan:Win32/Balisdat.gen!C are also bundled within a self-extracting ZIP or RAR archive containing a PowerPoint Show (.pps) file wit the name "vazb0620px.pps" or "PowerPointViewer.pps".
Trojan:Win32/Balisdat.gen!C variants may display any of the following message boxes upon execution:
They may then create the following registry entry to execute itself every time Windows starts:
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<value>"
With data: "<malware path and file name>"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<value>"
With data: "<malware path and file name>"
where <value> is any of the following:
- Dolby® Audio Digital
- GBNB_ZXCV
- GBNB_ZZCB
- GBTR_SENTRA
- GBTR_SILTRY
- GBTY_SALTY
- GBUTR_SEC
- GB_CNETPROC
- PowerPointView
- ProctRaw
- RamynySyS
- RawFrikSys
- RengaSyS
- SysNetView32
- SysSayoView32
- WIN_BULKATRO
- WIN_GTERMU
- WIN_NULQAXRO
- WIN_NYLTIBITS
- WinSizeNet32
- Win_GbterZcuzi
- bootstat
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager
Sets value: "BootExecute"
With data: "autocheck autochk *<malware file name>"
Payload
Deletes or moves security-related folders
Trojan:Win32/Balisdat.gen!C attempts to delete or move any of the following subfolders into a different location. As a result, security-related applications may stop working.
- AntiVir PersonalEdition Classic\
- AntiVir\
- Arquivos comuns\Panda Security\
- Arquivos comuns\Symantec Shared\
- Avira\
- COMODO\
- ClamWin\
- Grisoft\
- Kaspersky Lab\
- McAfee\
- Microsoft Security Essentials\
- Norton AntiVirus\
- NortonInstaller\
- Panda Security\
- Panda Software\
- Rising\
- Scpad\
It searches for these subfolders in any of the following folders:
- C:\Arquivos de Programas (x86)\
- C:\Arquivos de programas
- C:\Program Files (x86)\
- C:\Program Files\
- D:\Arquivos de Programas (x86)\
- D:\Arquivos de programas\
- D:\Program Files (x86)\
- D:\Program Files\
Disables Task Manager
Some variants of Trojan:Win32/Balisdat.gen!C may disable the Windows Task Manager by modifying the following registry entry:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System Sets value = "DisableTaskMgr"
With data: "dword:00000001"
Modifies system security settings
Some variants of Trojan:Win32/Balisdat.gen!C disable the Least Privileged User Account (LUA) setting, also known as the "administrator in Admin Approval Mode" user type, by making the following registry modification:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "EnableLUA"
With data: "dword:00000000"
Lowers security settings
Trojan:Win32/Balisdat.gen!C may create and execute a .REG file named "RUaC.reg" containing the following:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:00000002
"ConsentPromptBehaviorUser"=dword:00000001
"EnableInstallerDetection"=dword:00000001
"EnableLUA"=dword:00000000
"EnableSecureUIAPaths"=dword:00000001
"EnableVirtualization"=dword:00000001
"PromptOnSecureDesktop"=dword:00000001
"ValidateAdminCodeSignatures"=dword:00000000
"dontdisplaylastusername"=dword:00000000
"legalnoticecaption"=""
"legalnoticetext"=""
"legalnoticetext"=""
"shutdownwithoutlogon"=dword:00000001
"undockwithoutlogon"=dword:00000001
"FilterAdministratorToken"=dword:00000000
"EnableUIADesktopToggle"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\UIPI]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\UIPI\Clipboard]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\UIPI\Clipboard\ExceptionFormats]
"CF_TEXT"=dword:00000001
"CF_BITMAP"=dword:00000002
"CF_OEMTEXT"=dword:00000007
"CF_DIB"=dword:00000008
"CF_PALETTE"=dword:00000009
"CF_UNICODETEXT"=dword:0000000d
"CF_DIBV5"=dword:00000011
Shuts down the computer automatically
Trojan:Win32/Balisdat.gen!C attempts to shut down the affected computer by executing the command "shutdown -r -f -t 00"
Downloads arbitrary files
Trojan:Win32/Balisdat.gen!C may download other possibly malicious files from certain servers. In the wild, it has been known to connect to any of the following servers:
Additional information
- 201.<removed>37.231
- alfa<removed>tauria.com
- alfa<removed>taurib.com
- baja<removed>va.com
- base<removed>lientes.com.br
- bras<removed>irocomorgulho.com
- brav<removed>ntebrasileira.com
- guet<removed>ralho.com.br
- host<removed>ts.com
- mysq<removed>eprotocolos.com.br
- phpf<removed>dido.com
Trojan:Win32/Balisdat.gen!C may create any of the following mutex names:
- GBIEHLASMUMAITOCACHA2011
- GBSTPROC2011
- GBTPROMOC2011
- GBTZEMONASLIES2011
- GBULELASNURMONAS2011
- GB_PROCESS_ZYX_2011
- GB_PROCZE_GBAL_2011
- GB_PROCZE_GHB_2011
- SYSNET2011PRIV8
- SYSSUN2011PROC
- WINNOVA2010PRIV8
- WINSEC2011PRIV8
Analysis by Ric Robielos
Last update 29 November 2011