Win32/TrojanDownloader.Agent.PXO [Threat Name] go to Threat

Win32/TrojanDownloader.Agent.PXO [Threat Variant Name]

Category trojan
Size 262144 B
Detection created May 06, 2010
Detection database version 10430
Aliases Trojan.Win32.Jorik.Pirminay.akh (Kaspersky)
  Trojan.Milicenso (Symantec)
  TrojanDownloader:Win32/Ponmocup.A (Microsoft)
Short description

Win32/TrojanDownloader.Agent.PXO is a trojan which tries to download other malware from the Internet.

Installation

When executed, the trojan creates one of the following files:

  • %system%\­%random1%.exe
  • %programfiles%\­%existingfolder%\­%random1%.exe
  • %temp%\­%random1%.exe
  • %system%\­%random1%.dll
  • %programfiles%\­%existingfolder%\­%random1%.dll
  • %temp%\­%random1%.dll

The file is then executed.


The trojan may set the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­Run]
    • "%random2%" = "%malwarepath%"
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%random2%" = "%malwarepath%"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­Run]
    • "%random2%" = "%malwarepath%"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%random2%" = "%malwarepath%"
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­Run]
    • "%random2%" = "%system%\­rundll32.exe "%malwarepath%", %random3%"
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%random2%" = "%system%\­rundll32.exe "%malwarepath%", %random3%"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­Run]
    • "%random2%" = "%system%\­rundll32.exe "%malwarepath%", %random3%"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%random2%" = "%system%\­rundll32.exe "%malwarepath%", %random3%"

A string with variable content is used instead of %random1-3% .


This causes the trojan to be executed on every system start.


The trojan schedules a task that causes the following file to be executed repeatedly:

  • "%system%\­rundll32.exe "%malwarepath%", %random3%"

After the installation is complete, the trojan deletes the original executable file.

Information stealing

The trojan collects various information related to the operating system.


The trojan attempts to send gathered information to a remote machine.

Other information

The trojan keeps various information in the following Registry keys:

  • [HKEY_LOCAL_MACHINE\­Software\­%random4%]
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings]
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings]
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Multimedia]
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Multimedia]
  • [HKEY_LOCAL_MACHINE\­System\­CurrentControlSet]
  • [HKEY_CURRENT_USER\­System\­CurrentControlSet]

A string with variable content is used instead of %random4% .


The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (4) URLs. The HTTP protocol is used.


It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files
  • create a scheduled task that repeatedly executes the malicious file
  • disable System Restore
  • send gathered information

The trojan hooks the following Windows APIs:

  • NtQueryInformationProcess (ntdll.dll)

Please enable Javascript to ensure correct displaying of this content and refresh this page.