Analizzato da: Clive Fuentebella   

 

a variant of Win32/ReImageRepair.K potentially unwanted application (NOD32)

 Piattaforma:

Windows

 Valutazione del rischio complessivo:
 Potenziale dannoso: :
 Potenziale di distribuzione: :
 Reported Infection:
 Informazioni esposizione: :
Basso
Medio
Alto
Critico

  • Tipo di minaccia informatica:
    Potentially Unwanted Application

  • Distruttivo?:
    No

  • Crittografato?:
    No

  • In the wild::

  Panoramica e descrizione

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  Dettagli tecnici

Dimensione file: 772,016 bytes
Tipo di file: EXE
Residente in memoria: No
Data di ricezione campioni iniziali: 17 settembre 2020

Detalles de entrada

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Instalación

Infiltra los archivos siguientes:

  • %Program Files%\Reimage\Reimage Repair\engine.dat
  • %Program Files%\Reimage\Reimage Repair\LZMA.EXE
  • %Program Files%\Reimage\Reimage Repair\msvcr120.dll
  • %Program Files%\Reimage\Reimage Repair\REI_AVIRA.exe
  • %Program Files%\Reimage\Reimage Repair\REI_Axcontrol.dll
  • %Program Files%\Reimage\Reimage Repair\REI_Axcontrol.lza
  • %Program Files%\Reimage\Reimage Repair\REI_Engine.dll
  • %Program Files%\Reimage\Reimage Repair\REI_Engine.lza
  • %Program Files%\Reimage\Reimage Repair\REI_SupportInfoTool.exe
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Help & Support.url
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Privacy Policy.url
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Terms of Use.url
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Uninstall Instructions.url
  • %Program Files%\Reimage\Reimage Repair\Reimage_SafeMode.ico
  • %Program Files%\Reimage\Reimage Repair\Reimage_uninstall.ico
  • %Program Files%\Reimage\Reimage Repair\Reimage_website.ico
  • %Program Files%\Reimage\Reimage Repair\reimage.dat
  • %Program Files%\Reimage\Reimage Repair\Reimage.exe
  • %Program Files%\Reimage\Reimage Repair\Reimageicon.ico
  • %Program Files%\Reimage\Reimage Repair\ReimageReminder.exe
  • %Program Files%\Reimage\Reimage Repair\ReimageRepair.exe
  • %Program Files%\Reimage\Reimage Repair\ReimageSafeMode.exe
  • %Program Files%\Reimage\Reimage Repair\savapi.dll
  • %Program Files%\Reimage\Reimage Repair\uninst.exe
  • %Program Files%\Reimage\Reimage Repair\version.rei
  • %Common Programs%\Reimage Repair\Help & Support.lnk
  • %Common Programs%\Reimage Repair\Privacy Policy.lnk
  • %Common Programs%\Reimage Repair\Reimage Repair.lnk
  • %Common Programs%\Reimage Repair\Run in safe mode.lnk
  • %Common Programs%\Reimage Repair\Terms of Use.lnk
  • %Common Programs%\Reimage Repair\Uninstall Instructions.lnk
  • %Common Programs%\Reimage Repair\Uninstall.lnk
  • %System Root%\{Random characters}\About.txt
  • %System Root%\{Random characters}\AV\avupdate_msg.avr
  • %System Root%\{Random characters}\AV\avupdate.exe
  • %System Root%\{Random characters}\AV\cacert.crt
  • %System Root%\{Random characters}\AV\HBEDV.KEY
  • %System Root%\{Random characters}\AV\msvcr120.dll
  • %System Root%\{Random characters}\AV\productname.dat
  • %System Root%\{Random characters}\AV\savapi_restart.exe
  • %System Root%\{Random characters}\AV\savapi_stub.exe
  • %System Root%\{Random characters}\AV\savapi.exe
  • %System Root%\{Random characters}\AV\xbvRei.vdf
  • %System Root%\{Random characters}\cfl.rei
  • %System Root%\{Random characters}\rpe1.rei
  • %System Root%\{Random characters}\SupportInfoTool.ini
  • %User Temp%\ack.txt
  • %User Temp%\cfl.rei
  • %User Temp%\Chrome.txt
  • %User Temp%\downloader log.txt
  • %User Temp%\downloader_version.xml
  • %User Temp%\FF.bat
  • %User Temp%\FF.txt
  • %User Temp%\InstallationPixel.txt
  • %User Temp%\IsProcessActive.txt
  • %User Temp%\ns{Random characters}.tmp
  • %User Temp%\ns{Random characters}.tmp\avg-seal.bmp
  • %User Temp%\ns{Random characters}.tmp\Banner.dll
  • %User Temp%\ns{Random characters}.tmp\DcryptDll.dll
  • %User Temp%\ns{Random characters}.tmp\ExecDos.dll
  • %User Temp%\ns{Random characters}.tmp\inetc.dll
  • %User Temp%\ns{Random characters}.tmp\installer-164x314.bmp
  • %User Temp%\ns{Random characters}.tmp\LogEx.dll
  • %User Temp%\ns{Random characters}.tmp\md5dll.dll
  • %User Temp%\ns{Random characters}.tmp\modern-header.bmp
  • %User Temp%\ns{Random characters}.tmp\nsDialogs.dll
  • %User Temp%\ns{Random characters}.tmp\nsExec.dll
  • %User Temp%\ns{Random characters}.tmp\ProtectorUpdater.exe
  • %User Temp%\ns{Random characters}.tmp\registry.dll
  • %User Temp%\ns{Random characters}.tmp\stack.dll
  • %User Temp%\ns{Random characters}.tmp\System.dll
  • %User Temp%\ns{Random characters}.tmp\UserInfo.dll
  • %User Temp%\ns{Random characters}.tmp\WmiInspector.dll
  • %User Temp%\ns{Random characters}.tmp\xml.dll
  • %User Temp%\ReimagePackage.exe
  • %User Temp%\ReimageRepair.exe
  • %User Temp%\repair setup log.txt
  • %User Temp%\repair_version.xml
  • %User Temp%\sqlite3.exe
  • %Desktop%\PC Scan & Repair by Reimage.lnk
  • %Desktop%\Resume Reimage Repair Installation.lnk
  • %Windows%\Reimage.ini

(Nota: %Program Files% es la carpeta Archivos de programa predeterminada, que suele estar en C:\Archivos de programa).

. %System Root% es la carpeta raíz, normalmente C:\. También es la ubicación del sistema operativo).

. %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).

. %Desktop% es la carpeta Escritorio del usuario activo, que en el caso de Windows 98 y ME suele estar en C:\Windows\Profiles\{nombre de usuario}\Escritorio, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario}\Escritorio, en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) en C:\Documents and Settings\{nombre de usuario}\Escritorio y en el caso de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\Desktop).

. %Windows% es la carpeta de Windows, que suele estar en C:\Windows o C:\WINNT).

)

Agrega los procesos siguientes:

  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" "%User Temp%\FF.bat" > %User Temp%\FF.txt
  • cmd /c ""%User Temp%\FF.bat" > %User Temp%\FF.txt"
  • "%User Temp%\sqlite3.exe" "%AppDataLocal%\Google\Chrome\User Data\Default\Cookies" "select value, expires_utc from cookies where host_key like '%{BLOCKED}eplus.com' and name='_trackid'"
  • "%User Temp%\sqlite3.exe" "%AppDataLocal%\Google\Chrome\User Data\Default\Cookies" "select value, expires_utc from cookies where host_key like '%{BLOCKED}eplus.com' and name='_tracking'"
  • "%User Temp%\sqlite3.exe" "%AppDataLocal%\Google\Chrome\User Data\Default\Cookies" "select value, expires_utc from cookies where host_key like '%{BLOCKED}eplus.com' and name='_campaign'"
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq Reimage.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq Reimage.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq AVupdate.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq AVupdate.exe" > %User Temp%\IsProcessActive.txt
  • regsvr32 /s "%System%\jscript.dll"
  • "%User Temp%\ReimageRepair.exe" /update=1 /Language=1033 /tracking=0 /campaign=0 /adgroup=0 /Ads_Name=0 /Keyword=0 /ResumeInstall=2 /RunSilent=false /pxkp=Delete
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq avupdate.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq avupdate.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq ReimagePackage.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq ReimagePackage.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq HMA! Pro VPN.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq HMA! Pro VPN.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq GeoProxy.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq GeoProxy.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\sqlite3.exe" "%AppDataLocal%\Google\Chrome\User Data\Default\Cookies" "select value, expires_utc from cookies where host_key like '%{BLOCKED}eplus.com' and name='_country'"
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq Wireshark.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq Wireshark.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq Fiddler.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq Fiddler.exe" > %User Temp%\IsProcessActive.txt
  • "%User Temp%\ReimagePackage.exe" /GUI={URL}"/Location=%User Temp%\ReimageRepair.exe" /trackutil=7861158598 /CookieTracking=direct /CookieCampaign=no-referrer /EventUser=New /Update=1 /DownloaderVersion=1951 /RunSilent=false /SessionID=4b9c0f73-d893-4028-8e20-6b4821d64cbc /IDMinorSession=3e728f178ed646d488c163020f /pxkp=Delete /ScanSilent=0 /Close=0 /cil=DISABLED /ShowName=0 /Language=1033 /GuiLang=en /AgentStatus=DISABLED /StartScan=1 /VersionInfo=versionInfo /ShowSettings=true
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" "%Program Files%\Reimage\Reimage Repair\lzma.exe" "d" "%Program Files%\Reimage\Reimage Repair\REI_Axcontrol.lza" "%Program Files%\Reimage\Reimage Repair\REI_Axcontrol.dll"
  • "%Program Files%\Reimage\Reimage Repair\lzma.exe" "d" "%Program Files%\Reimage\Reimage Repair\REI_Axcontrol.lza" "%Program Files%\Reimage\Reimage Repair\REI_Axcontrol.dll"
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" "%Program Files%\Reimage\Reimage Repair\lzma.exe" "d" "%Program Files%\Reimage\Reimage Repair\REI_Engine.lza" "%Program Files%\Reimage\Reimage Repair\REI_Engine.dll"
  • "%Program Files%\Reimage\Reimage Repair\lzma.exe" "d" "%Program Files%\Reimage\Reimage Repair\REI_Engine.lza" "%Program Files%\Reimage\Reimage Repair\REI_Engine.dll"
  • "%User Temp%\ns{Random characters}.tmp\ns{Random characters}.tmp" cmd /C tasklist /FI "IMAGENAME eq REI_avira.exe" > %User Temp%\IsProcessActive.txt
  • cmd /C tasklist /FI "IMAGENAME eq REI_avira.exe" > %User Temp%\IsProcessActive.txt
  • regsvr32 /s "%Program Files%\Reimage\Reimage Repair\REI_Axcontrol.dll"
  • regsvr32 /s "%Program Files%\Reimage\Reimage Repair\REI_Engine.dll"

Otros detalles

It connects to the following possibly malicious URL:

  • http://cdnrep.{BLOCKED}e.com/downloader_version.xml
  • http://cdnrep.{BLOCKED}e.com/repair_version.xml
  • http://cdnrep.{BLOCKED}eplus.com/cfl/cfl1955.rei
  • http://cdnrep.{BLOCKED}eplus.com/rqy/ReimageRepair.exe
  • http://cdnrep.{BLOCKED}eplus.com/ver/ReimagePackage1955.exe
  • http://www.{BLOCKED}eplus.com/events4mem.php?version={Random number}&SessionID={Random characters}&MinorSessionID={Random characters}&id={Random characters}¶m=Downloader%20Started<*>New&trackutil={Random numbers}
  • http://www.{BLOCKED}eplus.com/includes/install_end.php?m_trackid={Random number}&m_tracking=direct&m_campaign=no-referrer&minorsessionid={Random characters}&sessionid={Random characters}

  Soluzioni

Motore di scansione minimo: 9.850
File di pattern SSAPI: 2.333.00
Data di pubblicazione del pattern SSAPI: 10 settembre 2020

Step 1

Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploración, deben comprobar que tienen desactivada la opción Restaurar sistema para permitir la exploración completa del equipo.

Step 2

Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.

Step 3

Buscar y eliminar este archivo

[ learnMore ]
Puede que algunos de los archivos del componente estén ocultos. Asegúrese de que tiene activada la casilla Buscar archivos y carpetas ocultos en la opción Más opciones avanzadas para que el resultado de la búsqueda incluya todos los archivos y carpetas ocultos.
  • %Program Files%\Reimage\Reimage Repair\engine.dat
  • %Program Files%\Reimage\Reimage Repair\LZMA.EXE
  • %Program Files%\Reimage\Reimage Repair\msvcr120.dll
  • %Program Files%\Reimage\Reimage Repair\REI_AVIRA.exe
  • %Program Files%\Reimage\Reimage Repair\REI_Axcontrol.dll
  • %Program Files%\Reimage\Reimage Repair\REI_Axcontrol.lza
  • %Program Files%\Reimage\Reimage Repair\REI_Engine.dll
  • %Program Files%\Reimage\Reimage Repair\REI_Engine.lza
  • %Program Files%\Reimage\Reimage Repair\REI_SupportInfoTool.exe
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Help & Support.url
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Privacy Policy.url
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Terms of Use.url
  • %Program Files%\Reimage\Reimage Repair\Reimage Repair Uninstall Instructions.url
  • %Program Files%\Reimage\Reimage Repair\Reimage_SafeMode.ico
  • %Program Files%\Reimage\Reimage Repair\Reimage_uninstall.ico
  • %Program Files%\Reimage\Reimage Repair\Reimage_website.ico
  • %Program Files%\Reimage\Reimage Repair\reimage.dat
  • %Program Files%\Reimage\Reimage Repair\Reimage.exe
  • %Program Files%\Reimage\Reimage Repair\Reimageicon.ico
  • %Program Files%\Reimage\Reimage Repair\ReimageReminder.exe
  • %Program Files%\Reimage\Reimage Repair\ReimageRepair.exe
  • %Program Files%\Reimage\Reimage Repair\ReimageSafeMode.exe
  • %Program Files%\Reimage\Reimage Repair\savapi.dll
  • %Program Files%\Reimage\Reimage Repair\uninst.exe
  • %Program Files%\Reimage\Reimage Repair\version.rei
  • %Common Programs%\Reimage Repair\Help & Support.lnk
  • %Common Programs%\Reimage Repair\Privacy Policy.lnk
  • %Common Programs%\Reimage Repair\Reimage Repair.lnk
  • %Common Programs%\Reimage Repair\Run in safe mode.lnk
  • %Common Programs%\Reimage Repair\Terms of Use.lnk
  • %Common Programs%\Reimage Repair\Uninstall Instructions.lnk
  • %Common Programs%\Reimage Repair\Uninstall.lnk
  • %System Root%\{Random characters}\About.txt
  • %System Root%\{Random characters}\AV\avupdate_msg.avr
  • %System Root%\{Random characters}\AV\avupdate.exe
  • %System Root%\{Random characters}\AV\cacert.crt
  • %System Root%\{Random characters}\AV\HBEDV.KEY
  • %System Root%\{Random characters}\AV\msvcr120.dll
  • %System Root%\{Random characters}\AV\productname.dat
  • %System Root%\{Random characters}\AV\savapi_restart.exe
  • %System Root%\{Random characters}\AV\savapi_stub.exe
  • %System Root%\{Random characters}\AV\savapi.exe
  • %System Root%\{Random characters}\AV\xbvRei.vdf
  • %System Root%\{Random characters}\cfl.rei
  • %System Root%\{Random characters}\rpe1.rei
  • %System Root%\{Random characters}\SupportInfoTool.ini
  • %User Temp%\ack.txt
  • %User Temp%\cfl.rei
  • %User Temp%\Chrome.txt
  • %User Temp%\downloader log.txt
  • %User Temp%\downloader_version.xml
  • %User Temp%\FF.bat
  • %User Temp%\FF.txt
  • %User Temp%\InstallationPixel.txt
  • %User Temp%\IsProcessActive.txt
  • %User Temp%\ns{Random characters}.tmp
  • %User Temp%\ns{Random characters}.tmp\avg-seal.bmp
  • %User Temp%\ns{Random characters}.tmp\Banner.dll
  • %User Temp%\ns{Random characters}.tmp\DcryptDll.dll
  • %User Temp%\ns{Random characters}.tmp\ExecDos.dll
  • %User Temp%\ns{Random characters}.tmp\inetc.dll
  • %User Temp%\ns{Random characters}.tmp\installer-164x314.bmp
  • %User Temp%\ns{Random characters}.tmp\LogEx.dll
  • %User Temp%\ns{Random characters}.tmp\md5dll.dll
  • %User Temp%\ns{Random characters}.tmp\modern-header.bmp
  • %User Temp%\ns{Random characters}.tmp\nsDialogs.dll
  • %User Temp%\ns{Random characters}.tmp\nsExec.dll
  • %User Temp%\ns{Random characters}.tmp\ProtectorUpdater.exe
  • %User Temp%\ns{Random characters}.tmp\registry.dll
  • %User Temp%\ns{Random characters}.tmp\stack.dll
  • %User Temp%\ns{Random characters}.tmp\System.dll
  • %User Temp%\ns{Random characters}.tmp\UserInfo.dll
  • %User Temp%\ns{Random characters}.tmp\WmiInspector.dll
  • %User Temp%\ns{Random characters}.tmp\xml.dll
  • %User Temp%\ReimagePackage.exe
  • %User Temp%\ReimageRepair.exe
  • %User Temp%\repair setup log.txt
  • %User Temp%\repair_version.xml
  • %User Temp%\sqlite3.exe
  • %Desktop%\PC Scan & Repair by Reimage.lnk
  • %Desktop%\Resume Reimage Repair Installation.lnk
  • %Windows%\Reimage.ini

Step 4

Explorar el equipo con su producto de Trend Micro para eliminar los archivos detectados como PUA.Win32.Reimage.D En caso de que el producto de Trend Micro ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta página de Base de conocimientos para obtener más información.


Sondaggio