text
stringlengths
4
429
open an attachment. Don
t be click happy! All it takes is a moment of inattention.
2. Implement strong password. Refer to these Microsoft Tips for creating a strong password:
http://www.microsoft.com/protect/yourself/password/create.mspx
3. When conducting online banking or financial transaction, make sure your browser connection is
secure.
4. Encrypt online communication and confidential data.
5. Back up your important data. Keep a copy of all your files and store them separately.
6. Be cautious about instant messaging. Avoid chatting with people you don
t know, especially if
they ask for personal information such as photos or want you to do something for them.
7. Protect your identity while enjoying online social networking activities. Be wary of clicking links or
suspicious profiles. Double-check the integrity of the connection or friend request before adding
anyone to your network. Avoid installing extras such as third-party applications; they may lead to
malware infection, or attackers could use them to steal your identity.
8. Avoid piracy by downloading from secure sources.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
9. Avoid threats that use social engineering techniques by checking user feedback about a Web
site before visiting it, and reader feedback about an application before installing it.
10. If you are using Adobe PDF Reader, prevent your default browser from automatically opening
PDF document. Refer to our CA Security Advisor research blog entry at
http://community.ca.com/blogs/securityadvisor/archive/2009/02/24/attackers-love-zero-day.asp
11. Check for and install security updates regularly.
12. Be careful with search engine results. Read them carefully and check to ensure that the content relates to your subject before clicking the Web site link.
Make Internet computing safe report suspicious files and Web sites to [email protected]
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Appendix A - Other variant method of installation
1. Enumerates all services with the following characteristics:
ServiceType = SERVICE_WIN32
ServiceState = 3
2. Searches for services with the SERVICE_RUNNING state or the service name Brower [sic].
a.The malware checks the service configuration for the following ImagePatch value:
svchost.exe -k netsvcs
(It searches for services with this value as a command line parameter)
b. If the ImagePath value is found, it checks the registry key below and retrieves the
value of ServiceDll registry entry:
HKLM\SYSTEM\CurrentControlSet\Services\<service name>\Parameters
c. The malware modifies the service's configuration, modifying the service Start and Type
characteristics to the following:
Start - 2 SERVICE_AUTO_START
Type - 110
SERVICE_INTERACTIVE_PROCESS|SERVICE_WIN32_OWN_PROCESS
These service modifications enable the service to start automatically, interact with the desktop, and run in its own process.
3. If Step 2 is successful, the malware performs the following instructions:
a. Loads the resource file in memory and writes the resource's content to a file in "%USERPROFILE%\<service name>.dll".
This behavior drops the DLL component in the directory,
"%USERPROFILE%\<service name>.dll"
Note: %USERPROFILE% is "C:\Documents and Settings\<username>".
b. As part of its anti-forensic discovery, the malware modifies the DLL file time attributes to
be the same as kernel32.dll.
The date created, last accessed, and last modified will be modified in this case.
c. The Hydraq dropper modifies the registry key of the target service:
HKLM\SYSTEM\CurrentControlSet\Services\<service name>\Parameters\ServiceDll =
"%USERPROFILE%\<service name>.dll"
This automatically executes the DLL component on system start.
d.The malware starts the target service to execute the DLL component.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
4. If Step 2 is NOT successful, the malware performs the following instructions:
a. Loads the malware's resource file in memory and writes the resource's content to a file in
"%USERPROFILE%\<random name>.dll".
This behavior drops the DLL component file in the directory "%USERPROFILE%\<random
name>.dll"
Note:
%USERPROFILE% is "C:\Documents and Settings\<username>".
<random characters> is based on the result of GetTickCount API.
b. The malware creates a service with the same name as the generated filename of the
DLL component and with the following characteristics:
DesiredAccess = SERVICE_ALL_ACCESS
ServiceType = SERVICE_WIN32_OWN_PROCESS|SERVICE_INTERACTIVE_PROCESS
StartType = SERVICE_AUTO_START
ErrorControl = SERVICE_ERROR_NORMAL
BinaryPathName = "%SystemRoot%\System32\svchost.exe -k "random name""
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Type =
SERVICE_WIN32_OWN_PROCESS|SERVICE_INTERACTIVE_PROCESS
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Start = SERVICE_AUTO_START
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\ErrorControl = dword:00000001
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\ImagePath =
%SystemRoot%\System32\svchost.exe -k "<random name>"
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\DisplayName = "<random name>"
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\ObjectName = "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Description = "<random name>"
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Parameters\ServiceDll = "%USERPROFILE%\<random name>.dll"
HKLM\SYSTEM\CurrentControlSet\Services\<random name>\Parameters\StubPath = <dropper component filename>
It also adds the service name in the registry key below so the service will be executed on
start as a system service.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\<random name> = <random
name>
c. The malware starts the created service to execute the DLL component.
If the malware fails to create the service it adds the following registry entry:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<random name> = rundll32.exe
"%USERPROFILE%\<random name>.dll", Launch
It then executes the process with the parameters below. If this fails the malware will delete
the DLL component file.
rundll32.exe "%USERPROFILE%\<random name>.dll", Launch
Lastly the malware executes the file cmd.exe with the command line parameters below.
The purpose of this is to delete the dropper component.
"%system%\cmd.exe /c del "<dropper filename>" > nul"
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Appendix B - Initial Handshake
Appendix C - Customize Character Decoding