Home / malware PWS:Win32/Zbot.gen!AJ
First posted on 12 September 2012.
Source: MicrosoftAliases :
PWS:Win32/Zbot.gen!AJ is also known as Win32/Kryptik.AKUL (ESET), Mal/NecursDrp-A (Sophos), Spyware/Win32.Zbot (AhnLab), TR/PSW.Zbot.AJ.286 (Avira), Trojan.PWS.Panda.1949 (Dr.Web), Trojan-PWS.Win32.Zbot (Ikarus), Trojan-Spy.Win32.Zbot.eqmz (Kaspersky), TSPY_ZBOT.SD (Trend Micro).
Explanation :
PWS:Win32/Zbot.gen!AJ is a password-stealing trojan that also allows backdoor access and control of your computer. It belongs to the PWS:Win32/Zbot family of trojans.
Also known as "Zeus", this trojan can:
- Lower the security of your Internet browser
- Steal sensitive information about you and your computer
- Allow unauthorized access and control of an affected computer
The trojan is usually distributed via spam emails or through compromised websites.
Installation
When run, PWS:Win32/Zbot.gen!AJ drops a copy of itself as a randomly named file, in the following format:
%APPDATA%\<random letters>\<random letters>.exe
Note: %APPDATA% refers to a variable location that is determined by the malware by querying the operating system. The default location for the Application Data folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\<user>\Application Data". For Windows Vista and 7, the default location is "C:\Users\<user>\AppData\Roaming".
For example:
C:\Documents and Settings\Administrator\Application Data\iciz\uxqug.exe
The copy is modified with extra, meaningless data to distinguish it from the original file.
PWS:Win32/Zbot.gen!AJ modifies the following registry entry to ensure that its copy runs at each Windows start:
In subkey: HKCU\Software\Microsoft\Windows\Currentversion\Run
Sets value: "<random letters>", for example "Ryatper"
With data: "%APPDATA%\<random letters>\<random letters>.exe", for example "C:\Documents and Settings\Administrator\Application Data\iciz\uxqug.exe"
PWS:Win32/Zbot.gen!AJ injects code into certain, targeted running processes that match your current user privileges.
Additionally, the trojan will inject its code into all user-level processes (such as "explorer.exe" and "iexplore.exe").
This behavior is intended to hide the trojan from security applications.
Payload
Captures sensitive information
PWS:Win32/Zbot.gen!AJ hooks APIs used by Internet Explorer and Mozilla Firefox to steal sensitive data, such as online banking, shopping, email and network credentials and information when you visit certain websites. For a list of the APIs please see the Additional information section in this entry.
The trojan also steals the following sensitive information from your computer:
- Digital certificates
- Internet Explorer cookies
- Stored passwords
It uses a configuration file to determine the websites that it will steal from when you visit them.
The trojan also logs keystrokes and obtains a screenshot of your computer.
Captured data is sent to a predefined FTP or email server, specified in the configuration file, for collection by a remote attacker.
Contacts remote host
PWS:Win32/Zbot.gen!AJ attempts to connect to the following addresses to report its infection and download the configuration file:
- gabgraph.com/sopelka1/file.php
- rafaywa.com/sopelka1/file.php
- viernon.com/sopelka1/file.php
Lowers Internet browser security
PWS:Win32/Zbot lowers Internet Explorer Internet zone security settings by making the following changes to the registry:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
Sets value: "1609"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
Sets value: "1406"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
Sets value: "1609"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
Sets value: "1406"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
Sets value: "1406"
With data: "0"
Additional information
PWS:Win32/Zbot.gen!AJ hooks the following Windows system APIs:
- advapi32.dll:
- CreateProcessAsUserA
- CreateProcessAsUserW
- crypt32.dll:
- PFXImportCertStore
- gdi32.dll:
- CallWindowProcA
- CallWindowProcW
- DefDlgProcA
- DefDlgProcW
- DefFrameProcA
- DefFrameProcW
- DefMDIChildProcA
- DefMDIChildProcW
- DefWindowProcA
- DefWindowProcW
- OpenInputDesktop
- RegisterClassA
- RegisterClassExA
- RegisterClassExW
- RegisterClassW
- SwitchDesktop
- kernel32.dll:
- ExitProcess
- GetFileAttributesExW
- nspr.dll:
- PR_Close
- PR_OpenTCPSocket
- PR_Read
- PR_Write
- PR_GetNameForIdentity
- ntdll.dll:
- LdrLoadDll
- ZwCreateThread
- user32.dll:
- BeginPaint
- CallWindowProcA
- CallWindowProcW
- DefDlgProcA
- DefDlgProcW
- DefFrameProcA
- DefFrameProcW
- DefMDIChildProcA
- DefMDIChildProcW
- DefWindowProcA
- DefWindowProcW
- EndPaint
- GetCapture
- GetClipboardData
- GetCursorPos
- GetDC
- GetDCEx
- GetMessageA
- GetMessagePos
- GetMessageW
- GetUpdateRect
- GetUpdateRgn
- GetWindowDC
- OpenInputDesktop
- PeekMessageA
- PeekMessageW
- RegisterClassA
- RegisterClassExA
- RegisterClassExW
- RegisterClassW
- ReleaseCapture
- ReleaseDC
- SetCapture
- SetCursorPos
- SwitchDesktop
- TranslateMessage
- winmm.dll:
- PlaySoundA
- PlaySoundW
- wininet.dll:
- HttpEndRequestA
- HttpEndRequestW
- HttpOpenRequestA
- HttpOpenRequestW
- HttpQueryInfoA
- HttpSendRequestA
- HttpSendRequestExA
- HttpSendRequestExW
- HttpSendRequestW
- InternetCloseHandle
- InternetQueryDataAvailable
- InternetReadFile
- InternetReadFileExA
- InternetSetFilePointer
- InternetSetOptionA
- InternetSetStatusCallbackA
- InternetSetStatusCallbackW
- ws2_32.dll:
- closesocket
- getaddrinfo
- gethostbyname
- send
- WSASend
In the wild, we have observed this malware leaving messages to infected users in its code.
Related encyclopedia entries
PWS:Win32/Zbot
Analysis by Zarestel Ferrer
Last update 12 September 2012