BKDR_KRYPTIK.NT
Windows 2000, Windows XP, Windows Server 2003

Threat Type: Backdoor
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It requires its main component to successfully perform its intended routine.
TECHNICAL DETAILS
Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Other System Modifications
This backdoor adds the following registry keys:
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}\
InprocServer32
HKEY_CLASSES_ROOT\Qjvuhsdv
HKEY_CLASSES_ROOT\Qjvuhsdv\CLSID
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}\
ProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{60972418-8A4B-B5CC-3C3D-0587F39623FF}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
ShellIconOverlayIdentifiers\Enhanced Storage
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom\Parameters
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion\SvcHost\
netsvcs
It adds the following registry entries:
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}\
InprocServer32
@ = "{malware path and filename}"
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}\
InprocServer32
ThreadingModel = "Apartment"
HKEY_CLASSES_ROOT\Qjvuhsdv\CLSID
@ = "{60972418-8A4B-B5CC-3C3D-0587F39623FF}"
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}\
ProgID
@ = "Qjvuhsdv"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
ShellIconOverlayIdentifiers\Enhanced Storage
@ = "{60972418-8A4B-B5CC-3C3D-0587F39623FF}"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
ImagePath = "%System%\svchost.exe -k netsvcs"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
Description = "Support for Microsoft AC Adapter"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
DisplayName = "Microsoft AC Adapter Support"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
ErrorControl = "1"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
ObjectName = "LocalSystem"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
Start = "2"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom
Type = "20"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom\Parameters
ServiceDll = "{malware path and filename}"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\qearydom\Parameters
ServiceMain = "DllRegisterServer"
HKEY_CLASSES_ROOT\CLSID\{60972418-8A4B-B5CC-3C3D-0587F39623FF}
Version = "64"
Other Details
This backdoor requires its main component to successfully perform its intended routine.
SOLUTION
Step 1
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Step 2
Restart in Safe Mode
Step 3
Delete this registry key
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
- In HKEY_CLASSES_ROOT\CLSID
- {60972418-8A4B-B5CC-3C3D-0587F39623FF}
- {60972418-8A4B-B5CC-3C3D-0587F39623FF}
- In HKEY_CLASSES_ROOT
- Qjvuhsdv
- Qjvuhsdv
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
- {60972418-8A4B-B5CC-3C3D-0587F39623FF}
- {60972418-8A4B-B5CC-3C3D-0587F39623FF}
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers
- Enhanced Storage
- Enhanced Storage
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services
- qearydom
- qearydom
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
- netsvcs
- netsvcs
Step 4
Restart in normal mode and scan your computer with your Trend Micro product for files detected as BKDR_KRYPTIK.NT. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.