Home / malware Worm:Win32/Rochap.A
First posted on 25 January 2012.
Source: MicrosoftAliases :
Worm:Win32/Rochap.A is also known as Trojan.Win32.Buzus (Ikarus), TROJ_SPNR.0CLI11 (Trend Micro).
Explanation :
Worm:Win32/Rochap.A is a worm that spreads by sending out copies of itself via Windows Live instant messages. It also sends the user's Windows Live credentials to a remote server. It also drops another file, which is detected as TrojanDownloader:Win32/Rochap.R.
Top
Worm:Win32/Rochap.A is a worm that spreads by sending out copies of itself via Windows Live instant messages. It also sends the user's Windows Live credentials to a remote server. It also drops another file, which is detected as TrojanDownloader:Win32/Rochap.R.
Installation
Worm:Win32/Rochap.A drops itself as the following file:
%APPDATA%\google_tool_bar_notification<3-digit random number>.exe
It injects its code into "iexplore.exe".
Worm:Win32/Rochap.A modifies the following registry entry to ensure that its copy executes at each Windows start:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Googlee Tooll Bar Notification Env"
With data: "%APPDATA%\google_tool_bar_notification<3-digit random number>.exe"
It creates a mutex, such as "enviador", to ensure that only one instance of itself is running in the computer.
Spreads via
Instant messages
Worm:Win32/Rochap.A attempts to look for Windows Live account credentials. If found, it uses the account to send instant messages to the user's contacts containing a link to a copy of itself.
Payload
Worm:Win32/Rochap.A drops an archived file named "%APPDATA%\*.zip" that contains a file named "<random alphanumeric characters>_DOC.SCR". This file is detected as TrojanDownloader:Win32/Rochap.R.
Steals information
Worm:Win32/Rochap.A can perform various HTTP transactions in which it checks if a certain server is online or not. If the server is offline, Worm:Win32/Rochap.A cancels the transaction. Otherwise, Worm:Win32/Rochap.A sends the stolen Windows Live credentials via its own SMTP server to a remote attacker.
Analysis by Marianne Mallen
Last update 25 January 2012