PUA_DEXON
Win32/Dexon.A potentially unsafe (ESET)
Windows

Threat Type: Potentially Unwanted Application
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This potentially unwanted application arrives as a component bundled with malware/grayware packages.
TECHNICAL DETAILS
7,168 bytes
19 Aug 2015
Arrival Details
This potentially unwanted application arrives as a component bundled with malware/grayware packages.
Installation
This potentially unwanted application drops the following files:
- %System%\dat\Dexon\Agent\Agent.exe
- %System%\dat\Dexon\Agent\Agent_Distrib.exe
- %System%\dat\Dexon\Agent\dexon_browser.exe
- %System%\dat\Dexon\Agent\Dial_w.exe
- %System%\dat\Dexon\Agent\DynamicService.exe
- %System%\dat\Dexon\Agent\HD_Agent.exe
- %System%\dat\Dexon\Agent\logmessages.dll
- %System%\dat\Dexon\Agent\module01.dll
- %System%\dat\Dexon\Agent\module02.dll
- %System%\dat\Dexon\Agent\module04.dll
- %System%\dat\Dexon\Agent\module05.dll
- %System%\dat\Dexon\Agent\module09.dll
- %System%\dat\dxn\{random letters}.dat
- %User Profile%\Public\Documents\dat\dxn\{random letters}.dat
- %AppDataLocal%\VirtualStore\Windows\System32\dat\dxn\{random letters}.dat
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.. %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.. %AppDataLocal% is the Application Data folder found in Local Settings, where it is usually C:\Documents and Settings\{user name}\Local Settings\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
It drops the following copies of itself into the affected system:
- "%System%\dat\Dexon\Agent\dummy.exe"
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
It creates the following folders:
- %AppDataLocal%\VirtualStore\Windows\System32\dat\Dexon
- %AppDataLocal%\VirtualStore\Windows\System32\dat\Dexon\Agent
- %AppDataLocal%\VirtualStore\Windows\System32\dat\dxn
- %User Profile%\Public\Documents\dat\dxn
- %System%\dat\Dexon
- %System%\dat\Dexon\Agent
- %System%\dat\dxn
(Note: %AppDataLocal% is the Application Data folder found in Local Settings, where it is usually C:\Documents and Settings\{user name}\Local Settings\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.. %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.. %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
Autostart Technique
This potentially unwanted application registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
Type = "110"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
Start = "2"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
ErrorControl = "1"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
ImagePath = "%System%\dat\Dexon\Agent\dummy.exe"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
DisplayName = "DexonAgent"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
ObjectName = "LocalSystem"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
DelayedAutostart = "1"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
FailureActions = "{hex values}"
It adds the following registry entries to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
Dexon = "%System%\dat\Dexon\Agent\dummy.exe"
It registers as a system service to ensure its automatic execution at every system startup by adding the following registry keys:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\DexonAgent
Other System Modifications
This potentially unwanted application adds the following registry keys:
HKEY_CURRENT_USER\Software\Classes\
VirtualStore\MACHINE\SOFTWARE\
Dexon
HKEY_CURRENT_USER\Software\Classes\
VirtualStore\MACHINE\SOFTWARE\
Dexon\DAT
HKEY_CURRENT_USER\Software\Classes\
VirtualStore\MACHINE\SOFTWARE\
Dexon
HKEY_CURRENT_USER\Software\Classes\
VirtualStore\MACHINE\SOFTWARE\
Dexon\DAT
It adds the following registry entries:
HKEY_CURRENT_USER\Software\Classes\
VirtualStore\MACHINE\SOFTWARE\
Dexon\DAT
{random letters} = {random characters}
HKEY_CURRENT_USER\Software\Classes\
VirtualStore\MACHINE\SOFTWARE\
Dexon\DAT
{random letters} = {random characters}