Home / malware TrojanDownloader:Win32/Kepma.B
First posted on 01 March 2013.
Source: MicrosoftAliases :
TrojanDownloader:Win32/Kepma.B is also known as W32/Kraddare.UT (Norman), Adware/Kraddare.BP (Avira), Win32/Adware.Kraddare.GQ application (ESET).
Explanation :
TrojanDownloader:Win32/Kepma.B is a trojan that downloads potentially unwanted software.
Installation
TrojanDownloader:Win32/Kepma.B may have the file name "barocn.exe". It may be installed by a file named "Setup_brcr_h.exe". The installer is also detected as TrojanDownloader:Win32/Kepma.B.
When run, the installer creates the following folders:
- %ProgramFiles%\barocn
- %USERPROFILE%\Favorites\Links
Within which it creates the following files:
- %ProgramFiles%\barocn\barocn.exe - detected as TrojanDownloader:Win32/Kepma.B
- %ProgramFiles%\barocn\barosvc.exe
- %ProgramFiles%\barocn\uninst.exe4
- %USERPROFILE%\Favorites\Links\11¹Ã¸°¡.url - points to http://11st.baroicon.com
- %USERPROFILE%\Favorites\Links\¿Ã¼Ã‡.url - points to http://auction.baroicon.com
- %USERPROFILE%\Favorites\Links\ÃÂö¸¶Ã„ÃÂ.url - points to http://gmarket.baroicon.com
It may also create the following files:
- %windir%\1.ico
- %windir%\2.ico
- %windir%\3.ico
which are the icon files used in the dropped URL files, respectively.
TrojanDownloader:Win32/Kepma.B installs itself as a service with the name "barocn svc", by creating the following registry entries:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\barocn
Sets value: "Description"
With data: "barocn launcher"
Sets value: "DisplayName"
With data: "barocn svc"
Sets value: "ErrorControl"
With data: "0x00000001"
Sets value: "ImagePath"
With data: "%ProgramFiles%\barocn\barosvc.exe"
Sets value: "ObjectName"
With data: "LocalSystem"
Sets value: "Start"
With data: "0x00000002"
Sets value: "Type"
With data: "0x00000010"
In subkey: HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_BAROCN\0000
Sets value: "Class"
With data: "LegacyDriver"
Sets value: "ClassGUID"
With data: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
Sets value: "ConfigFlags"
With data: "0x00000000"
Sets value: "DeviceDesc"
With data: "barocn svc"
Sets value: "Legacy"
With data: "0x00000001"
Sets value: "Service"
With data: "barocn"
It also creates an uninstall entry for itself in the Uninstall or change a program list with the name "Windows barocon" by creating the following registry entries:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Windows barocon
Sets value: "DisplayIcon"
With data: "%ProgramFiles%\barocn\barocn.exe"
Sets value: "DisplayName"
With data: "Windows barocon"
Sets value: "DisplayVersion"
With data: ""
Sets value: "Publisher"
With data: "Baro, Inc."
Sets value: "UninstallString"
With data: "%ProgramFiles%\barocn\uninst.exe"
It also creates the following registry key as part of its installation routine:
HKCU\Software\barocn
Payload
Downloads malware or potentially unwanted software
TrojanDownloader:Win32/Kepma.B downloads files from the website "cnt.baroicon.com". In the wild, we have observed this trojan downloading files detected as the following:
- Rogue:Win32/Onescan
- Adware:Win32/Kraddare
It may also download the following file from the server:
%ProgramFiles%\barocn\cns.dat
Sends your information to a server
TrojanDownloader:Win32/Kepma.B connects to the same server to report its activities in your computer, for example, whether it was installed or uninstalled. It also sends your MAC address to the server.
It also checks if any of the following processes are running. These are programs used to manage your computer:
- gamedcup.exe
- gchartc.exe
- gcrawl.exe
- getotb.exe
- gtiexp.exe
- gtlexp.exe
- pcwc.exe
- pcwc_ag.exe
- picatoolsmgr.exe
- ptclient.exe
- qaagent.exe
- wmcounter.exe
Analysis by Patrik Vicol
Last update 01 March 2013