Home / malware TrojanDownloader:Win32/Tracur.AA
First posted on 22 March 2012.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Tracur.AA.
Explanation :
TrojanDownloader:Win32/Tracur.AA is a trojan that silently downloads and installs other programs without consent. It could install additional malware or malware components to an affected computer.
Top
TrojanDownloader:Win32/Tracur.AA is a trojan that silently downloads and installs other programs without consent. It could install additional malware or malware components to an affected computer.
Installation
TrojanDownloader:Win32/Tracur.AA drops the following files into randomly selected folders inside %LOCALAPPDATA% or %APPDATA% as the following:
- <folder>\wsusupdate\wsusupdate.dll - copy of itself
- <folder>\wsusupdate\wsusupdate.exe - non-malicious generic DLL loader, which loads the first file
It modifies the system registry so that its dropped copy runs every time Windows starts, via the DLL loader:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "WSUSUpdate"
With data: "%APPDATA%\<folder>\wsusupdate\wsusupdate.exe"
or: "%LOCALAPPDATA%\<folder>\wsusupdate\wsusupdate.exe"
Payload
Drops other malware
TrojanDownloader:Win32/Tracur.AA drops malicious a DLL component, detected as TrojanDownloader:Win32/Tracur.AI, in %LocalAppData% or %AppData% with the following name format:
<string 1><string 2>.dll
where <string 1> is one of the following:
- explorer
- hardware
- internet
- network
- security
- service
- shell
- system
- tcpip
- tray
and <string 2> is one of the following:
- admin
- codec
- ptr
- sys
- sys32
- user
- win32
- wmp
- wow64
- x86_x64
It may also drop the DLL component with any of the following hardcoded file names in %LocalAppData% and %AppData%:
- \adobeupdate\adobeup.dll
- \applicationhistory\applicationhistoryupdate\applicationhistoryup.dll
- \ares\aresupdate\aresup.dll
- \bittorrent dna\bittorrentupdate\bittorrentup.dll
- \shareaza\shareazaupdate\shareazaup.dll
- \shareazaupdate\shareazaup.dll
- appleprofileprofile.dll
- displayprofilepolicy.dll
- keyboardnotifierverifier.dll
- microsoftbackupverifier.dll
- microsoftverifierpolicy.dll
It modifies the system registry so that its dropped DLL file automatically runs every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value with any of the following:
Adobe Update
AppleProfileProfile
DisplayProfilePolicy
Intel Update
JavaNotifierProfile
Local Update
MicrosoftBackupVerifier
MicrosoftVerifierPolicy
Netscape Update
ODBC Update
Update
With data: "rundll32 "<dropped DLL file>", dllregisterserver"
TrojanDownloader:Win32/Tracur.AA may then register its dropped DLL file as a Browser Helper Object (BHO).
TrojanDownloader:Win32/Tracur.AA may also drop components in the Temporary Files folder as the following files:
- complete.dll
- dfenc.dll
- mvenc.dll
- quota.dll
- runner.dll
- stats.dll
- viewer.dll
Modifies Internet Explorer settings
TrojanDownloader:Win32/Tracur.AA modifies the registry to change the following Internet Explorer settings:
Disables warnings when trying to access an unsecured page from a secured one:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Sets value: "WarnonZoneCrossing"
With data: "0"
Disables opening Internet Explorer in Offline mode:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Sets value: "GlobalUserOffline"
With data: "0"
Enables setting First Run Customize settings for Internet Explorer:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "DisableFirstRunCustomize"
With data: "0"
Disable checking Internet Explorer is the default browser:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "Check_Associations"
With data: "0"
Contacts remote host
The malware may contact a remote host at 213.174.137.85 using port 80. Commonly, malware may contact a remote host for the following purposes:
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
Analysis by Rodel Finones
Last update 22 March 2012