Home / malware Worm:Win32/Nuqel.TB
First posted on 27 March 2015.
Source: MicrosoftAliases :
There are no other names known for Worm:Win32/Nuqel.TB.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
- %SystemRoot%\system3_.exe
\system3_.exe
It modifies the registry so that it runs each time you start your PC. For example:
- In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Yahoo Messengger"
With data: "\system3_.exe" - In subkey: HKLM\software\microsoft\windows nt\currentversion\winlogon
Sets value: "Shell"
With data: "explorer.exe system3_.exe"
It creates a schedule to automatically run files on your PC. This can include:
\system3_.exe
Payload
Changes web browser settings
It can change your Internet Explorer start page by modifying the following registry entry:
In subkey: HKCU\software\microsoft\internet explorer\main
Sets value: "Start Page"
With data: "http://www.mydreamworld.50webs.com"
Modifies system settings
This threat can make changes to the way your PC behaves. It can:
- Disable Task Manager
- Restrict File Explorer settings changes
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- www.balu001.0catch.com using port 80
- www.balu000.0catch.com using port 80
- www.balu002.0catch.com using port 80
- h1.ripway.com using port 80
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
We have seen this threat access online content, including:
- setting.ini
This malware description was published using automated analysis of file SHA1 2f723542685feeee14ad624140ffe4adc12bb6da.
Symptoms
The following can indicate that you have this threat on your PC:
- You see a file similar to:
- %SystemRoot%\system3_.exe
\system3_.exe
- You see registry modifications such as:
- In subkey: HKCU\software\microsoft\internet explorer\main
Sets value: "Start Page"
With data: "http://www.mydreamworld.50webs.com"
- In subkey: HKCU\software\microsoft\windows\currentversion\policies\explorer
Sets value: "NofolderOptions"
With data: "1"
- In subkey: HKCU\software\microsoft\windows\currentversion\policies\system
Sets value: "DisableTaskMgr"
With data: "1"
- In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Yahoo Messengger"
With data: "\system3_.exe"
- In subkey: HKLM\software\microsoft\windows nt\currentversion\winlogon
Sets value: "Shell"
With data: "explorer.exe system3_.exe"
Last update 27 March 2015