This threat is a mass-mailing worm that changes security systems on the infected computer. It usually arrives through spam e-mail.
It also modifies certain computer settings, such as how hidden files are displayed, and disables registry editing. It can also modify the computer's HOSTS file.
Installation
Upon execution, Worm:Win32/Brontok.R@mm opens an Explorer window to the "My Documents" folder. This may mislead the user into thinking that the malware file is harmless.
It creates the following folder:
- %AppData%\Bron.tok-12-27
- %Windir%\ShellNew
It creates copies of itself as the following:
- %AppData%\csrss.exe
- %AppData%\inetinfo.exe
- %AppData%\lsass.exe
- %AppData%\services.exe
- %AppData%\smss.exe
- %AppData%\winlogon.exe
- %UserProfile%\Templates\Brengkolang.com or %UserProfile%\Templates\WowTumpeh.com
- %windir%\ShellNew\sempalong.exe
- %windir%\eksplorasi.pif
- <startup folder>\Empty.pif
- <system folder>\<current user>'s Setting.scr (for example, "<system folder>\user1's Settings.scr")
Users should take care not to confuse the file names "csrss.exe", "inetinfo.exe", "lsass.exe", "services.exe", "smss.exe", and "winlogon.exe" with legitimate system files using the same names. The legitimate system files located by default in the Windows system folder.
Note 1 - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
Note 2 - <startup folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the Startup folder for Windows 9x, Me, NT, 2000, XP and 2003 is '%USERPROFILE%\Start Menu\Programs\Startup'. For Windows Vista and 7, the default location is '%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'.
Worm:Win32/Brontok.R@mm creates and modifies the following registry entries so that it automatically runs every time Windows starts:
Adds value: "Tok-Cirrhatus"
With data: "%AppData%\smss.exe"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Adds value: "Bron-Spizaetus"
With data: "%windir%\ShellNew\sempalong.exe""
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Modifies value: "Shell"
From data: "explorer.exe" (default value)
To data: "explorer.exe "%windir%\eksplorasi.exe""
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
It also creates a job named "%windir%\Tasks\At1.job", which is designed to automatically run its copy "%UserProfile%\Templates\Brengkolang.com" at a specific schedule.
Spreads via...
Mass mailing
Worm:Win32/Brontok.R@mm searches for e-mail addresses in matching the following extensions:
- .ASP
- .CFM
- .CSV
- .DOC
- .EML
- .PHP
- .TXT
- .WAB
Gathered addresses are stored in a file in %AppData%, for example, "NetMailTmp.bin". Worm:Win32/Brontok.R@mm then sends out e-mail addresses to these addresses.
The e-mail messages may have the following format:
Subject: (no subject)
From: (either one of these)
Berita_<two numbers>@kafegaul.com
GaulNew_<two numbers>@kafegaul.com
HotNews_<two numbers>@playboy.com
Movie_<two numbers>@playboy.com
Attachment: (executable file)
Body: (may be, but is not limited to)
By: HVM31
-- JowoBot #VM Community --
Removable drives and shared folders
Worm:Win32/Brontok.R@mm also attempts to spread by copying itself to available removable drives and the following folders:
- My Data Sources
- My Ebooks
- My Music
- My Pictures
- My Shapes
- My Videos
- My Documents
The file names it uses for its copies vary.
Payload
Modifies system settings
Worm:Win32/Brontok.R@mm modifies the following computer settings:
- Changes the way hidden files are displayed in Windows Explorer:
Adds value: "Hidden"
With data: "0"
Adds value: "HideFileExt"
With data: "1"
Adds value: "ShowSuperHidden"
with data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
- Changes the way file display options are made available in Windows Explorer:
Adds value: "NoFolderOptions"
With data: "1"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Adds value: "DisableCMD"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
- Disables registry editing tools:
Adds value: "DisableRegistryTools"
With data: "1"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Modifies system files
Worm:Win32/Brontok.R@mm may create the following file, or modify it if it exists:
autoexec.bat
by adding the command "pause" into it.
Worm:Win32/Brontok.R@mm may also modify the HOSTS file.
Connects to a remote server
Worm:Win32/Brontok.R@mm checks if the computer is connected to the Internet by connecting to:
google.com
yahoo.com
If the computer is connected, it then attempts to download arbitrary files from the following subdomains:
- geocities.com/sblsji1/
- geocities.com/sbllro2/
- geocities.com/sbltlu3/
- geocities.com/sblppt4/
- geocities.com/sbllma5/
Additional information
Worm:Win32/Brontok.R@mm may create a file named "Ok-SendMail-Bron-tok" in the %AppData% folder.
Analysis by Patrik Vicol