Win32/Expiro [Threat Name] go to Threat
Win32/Expiro.NAU [Threat Variant Name]
Category | virus |
Size | 200704 B |
Aliases | Virus:Win32/Expiro.BJ (Microsoft) |
W32/Expiro.gen.o.virus (McAfee) | |
Win32/Expiro (AVG) |
Short description
Win32/Expiro.NAU is a polymorphic file infector.
Installation
The virus does not create any copies of itself.
The virus creates the following files:
- %appdata%\Mozilla\Firefox\Profiles\%profile%\{ec9032c7-c20a-464f-7b0e-13a3a9e97385}\chrome.manifest (522 B)
- %appdata%\Mozilla\Firefox\Profiles\%profile%\{ec9032c7-c20a-464f-7b0e-13a3a9e97385}\chrome\content.jar (8701 B, JS/Agent.NJF trojan)
- %appdata%\Mozilla\Firefox\Profiles\%profile%\{ec9032c7-c20a-464f-7b0e-13a3a9e97385}\component\red.js (4410 B, JS/Redirector.NBI trojan)
- %appdata%\Mozilla\Firefox\Profiles\%profile%\{ec9032c7-c20a-464f-7b0e-13a3a9e97385}\install.rdf (874 B)
- %localappdata%\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json (321 B)
- %localappdata%\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\content.js (1464 B)
- %localappdata%\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\background.js (6993 B)
The following Registry entries are set:
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
- "1406" = 0
- "2103" = 0
- "1609" = 0
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1]
- "1406" = 0
- "2103" = 0
- "1609" = 0
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2]
- "1406" = 0
- "2103" = 0
- "1609" = 0
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
- "1406" = 0
- "2103" = 0
- "1609" = 0
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4]
- "1406" = 0
- "2103" = 0
- "1609" = 0
- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\%variable%]
- "EnableNotifications" = 0
A string with variable content is used instead of %variable% .
File infection
Win32/Expiro.NAU is a polymorphic file infector.
The virus searches local drives for executable files to infect.
The virus searches for executables with one of the following extensions:
- .exe
Files are infected by adding a new section that contains the virus .
The size of the inserted code is 200704 B .
The host file is modified in a way that causes the virus to be executed prior to running the original code.
Information stealing
Win32/Expiro.NAU is a virus that steals passwords and other sensitive information.
The following information is collected:
- digital certificates
- login passwords for certain applications/services
- login user names for certain applications/services
- FTP account information
- Outlook Express account data
- operating system version
- volume serial number
- information about the operating system and system settings
- a list of recently visited URLs
The virus collects information used to access certain sites.
The programs affected include the following:
- FileZilla
- Internet Explorer
- Microsoft Outlook
The virus attempts to send gathered information to a remote machine.
Other information
The virus acquires data and commands from a remote computer or the Internet.
The virus contains a list of (61) URLs. The virus generates various URL addresses. The HTTP protocol is used.
It may perform the following actions:
- download files from a remote computer and/or the Internet
- run executable files
- execute shell commands
- modify network traffic
- modify the content of websites
- redirect network traffic
- monitor network traffic
- set up a proxy server
- perform DoS/DDoS attacks
The virus affects the behavior of the following applications:
- Internet Explorer
The virus may create the following files:
- %commonappdata%\%variable%27.nls
- %localappdata%\dfl27z32.dll
- %localappdata%\kf27lz32_dll
- %localappdata%\wsr27zt32_dll
- %localappdata%\%variable%27.nls
A string with variable content is used instead of %variable% .
The following services are disabled:
- MsMpSvc
- NisSrv
- WinDefend
- wscsvc
The following programs are terminated:
- MSASCui.exe
- msseces.exe
- Tcpview.exe