TROJ_ZBOT.BAV

 Analysis by: Roland Marco Dela Paz

 ALIASES:

Microsoft : PWS:Win32/Zbot.PG; Kaspersky : Trojan-Spy.Win32.Zbot.alaw

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Spyware

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes


  TECHNICAL DETAILS

File Size:

88,064 bytes

File Type:

EXE

Memory Resident:

Yes

Initial Samples Received Date:

08 Jul 2010

Payload:

Creates files, Drops files

Installation

This spyware drops the following files:

  • %System%\lowsec\local.ds
  • %System%\lowsec\user.ds.lll
  • %System%\lowsec\user.ds

(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)

It drops the following copies of itself into the affected system:

  • %System%\sdra64.exe

(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)

It creates the following folders:

  • %System%\lowsec

(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)

Autostart Technique

This spyware modifies the following registry entry(ies) to enable its automatic execution at every system startup:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion\Winlogon
Userinit = %System%\userinit.exe,%System%\sdra64.exe,

(Note: The default value data of the said registry entry is %System%\userinit.exe,.)

Other System Modifications

This spyware adds the following registry entries:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile
EnableFirewall = "0"