text
stringlengths 4
429
|
---|
open an attachment. Don
|
t be click happy! All it takes is a moment of inattention.
|
2. Implement strong password. Refer to these Microsoft Tips for creating a strong password:
|
http://www.microsoft.com/protect/yourself/password/create.mspx
|
3. When conducting online banking or financial transaction, make sure your browser connection is
|
secure.
|
4. Encrypt online communication and confidential data.
|
5. Back up your important data. Keep a copy of all your files and store them separately.
|
6. Be cautious about instant messaging. Avoid chatting with people you don
|
t know, especially if
|
they ask for personal information such as photos or want you to do something for them.
|
7. Protect your identity while enjoying online social networking activities. Be wary of clicking links or
|
suspicious profiles. Double-check the integrity of the connection or friend request before adding
|
anyone to your network. Avoid installing extras such as third-party applications; they may lead to
|
malware infection, or attackers could use them to steal your identity.
|
8. Avoid piracy by downloading from secure sources.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
9. Avoid threats that use social engineering techniques by checking user feedback about a Web
|
site before visiting it, and reader feedback about an application before installing it.
|
10. If you are using Adobe PDF Reader, prevent your default browser from automatically opening
|
PDF document. Refer to our CA Security Advisor research blog entry at
|
http://community.ca.com/blogs/securityadvisor/archive/2009/02/24/attackers-love-zero-day.asp
|
11. Check for and install security updates regularly.
|
12. Be careful with search engine results. Read them carefully and check to ensure that the content relates to your subject before clicking the Web site link.
|
Make Internet computing safe report suspicious files and Web sites to [email protected]
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Appendix A - Other variant method of installation
|
1. Enumerates all services with the following characteristics:
|
ServiceType = SERVICE_WIN32
|
ServiceState = 3
|
2. Searches for services with the SERVICE_RUNNING state or the service name Brower [sic].
|
a.The malware checks the service configuration for the following ImagePatch value:
|
svchost.exe -k netsvcs
|
(It searches for services with this value as a command line parameter)
|
b. If the ImagePath value is found, it checks the registry key below and retrieves the
|
value of ServiceDll registry entry:
|
HKLM\SYSTEM\CurrentControlSet\Services\<service name>\Parameters
|
c. The malware modifies the service's configuration, modifying the service Start and Type
|
characteristics to the following:
|
Start - 2 SERVICE_AUTO_START
|
Type - 110
|
SERVICE_INTERACTIVE_PROCESS|SERVICE_WIN32_OWN_PROCESS
|
These service modifications enable the service to start automatically, interact with the desktop, and run in its own process.
|
3. If Step 2 is successful, the malware performs the following instructions:
|
a. Loads the resource file in memory and writes the resource's content to a file in "%USERPROFILE%\<service name>.dll".
|
This behavior drops the DLL component in the directory,
|
"%USERPROFILE%\<service name>.dll"
|
Note: %USERPROFILE% is "C:\Documents and Settings\<username>".
|
b. As part of its anti-forensic discovery, the malware modifies the DLL file time attributes to
|
be the same as kernel32.dll.
|
The date created, last accessed, and last modified will be modified in this case.
|
c. The Hydraq dropper modifies the registry key of the target service:
|
HKLM\SYSTEM\CurrentControlSet\Services\<service name>\Parameters\ServiceDll =
|
"%USERPROFILE%\<service name>.dll"
|
This automatically executes the DLL component on system start.
|
d.The malware starts the target service to execute the DLL component.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
4. If Step 2 is NOT successful, the malware performs the following instructions:
|
a. Loads the malware's resource file in memory and writes the resource's content to a file in
|
"%USERPROFILE%\<random name>.dll".
|
This behavior drops the DLL component file in the directory "%USERPROFILE%\<random
|
name>.dll"
|
Note:
|
%USERPROFILE% is "C:\Documents and Settings\<username>".
|
<random characters> is based on the result of GetTickCount API.
|
b. The malware creates a service with the same name as the generated filename of the
|
DLL component and with the following characteristics:
|
DesiredAccess = SERVICE_ALL_ACCESS
|
ServiceType = SERVICE_WIN32_OWN_PROCESS|SERVICE_INTERACTIVE_PROCESS
|
StartType = SERVICE_AUTO_START
|
ErrorControl = SERVICE_ERROR_NORMAL
|
BinaryPathName = "%SystemRoot%\System32\svchost.exe -k "random name""
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Type =
|
SERVICE_WIN32_OWN_PROCESS|SERVICE_INTERACTIVE_PROCESS
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Start = SERVICE_AUTO_START
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\ErrorControl = dword:00000001
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\ImagePath =
|
%SystemRoot%\System32\svchost.exe -k "<random name>"
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\DisplayName = "<random name>"
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\ObjectName = "LocalSystem"
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Description = "<random name>"
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Parameters\ServiceDll = "%USERPROFILE%\<random name>.dll"
|
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Parameters\StubPath = <dropper component filename>
|
It also adds the service name in the registry key below so the service will be executed on
|
start as a system service.
|
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\<random name> = <random
|
name>
|
c. The malware starts the created service to execute the DLL component.
|
If the malware fails to create the service it adds the following registry entry:
|
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<random name> = rundll32.exe
|
"%USERPROFILE%\<random name>.dll", Launch
|
It then executes the process with the parameters below. If this fails the malware will delete
|
the DLL component file.
|
rundll32.exe "%USERPROFILE%\<random name>.dll", Launch
|
Lastly the malware executes the file cmd.exe with the command line parameters below.
|
The purpose of this is to delete the dropper component.
|
"%system%\cmd.exe /c del "<dropper filename>" > nul"
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Appendix B - Initial Handshake
|
Appendix C - Customize Character Decoding
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.