{"id":2698,"date":"2010-05-20T13:42:33","date_gmt":"2010-05-20T20:42:33","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2698"},"modified":"2018-01-30T12:23:48","modified_gmt":"2018-01-30T19:23:48","slug":"game-phishing-trojan-uses-directx-to-launch-itself","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/05\/20\/game-phishing-trojan-uses-directx-to-launch-itself\/","title":{"rendered":"Game Phishing Trojan Uses DirectX to Launch Itself"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2004.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/05\/20\/game-phishing-trojan-uses-directx-to-launch-itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2014.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;title=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2024.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;title=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2034.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;title=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2044.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;title=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2054.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;Title=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2064.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2074.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2084.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;t=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2094.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F05%2F20%2Fgame-phishing-trojan-uses-directx-to-launch-itself&amp;h=Game%20Phishing%20Trojan%20Uses%20DirectX%20to%20Launch%20Itself\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2104.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2114.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_dxdiag.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2704\" title=\"20100519_ddrawpws_dxdiag_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_dxdiag_crop.jpg\" width=\"358\" height=\"178\" \/><\/a>PC gamers have a new threat to contend with, one that has your personal information in its crosshairs and you can&#8217;t dispatch with a sniper rifle or <em>BFG9000<\/em>: A Trojan designed to steal game passwords that uses Microsoft&#8217;s own graphics engine, <strong>DirectX<\/strong>, against you.<\/p>\n<p>The Trojan, which appears to have originated in China, modifies one or more of the DirectX driver files &#8212; such as DirectSound, Direct3D, or DirectDraw &#8212; so it only loads when Windows fires up the modified DirectX driver. Because DirectX is typically used by games, it means this <em>sleeper cell<\/em> Trojan activates when you fire up a PC game, then terminates when you stop playing. As a result of using this unusual load point to start itself up, instead of a more typical Run key or Services entry in the Windows Registry, the Trojan is unusually low key.<\/p>\n<p>In our tests, the installer drops one or more randomly named DLLs (the keylogger component) in the <em>c:windowssystem<\/em> directory, then modifies one or more DirectX files. Each modified DirectX file is used to load one keylogger payload, so if the installer happens to drop four keyloggers, it will also modify four DirectX files. It also adds instructions that call functions from another, unmodified, legitimate system file named <strong>mscat32.dll<\/strong>. MSCAT32 is completely benign: Windows uses mscat32.dll to create Microsoft Cabinet .cab files, which are similar to .zip archive files. We&#8217;ve named this <em>aide-du-vol<\/em> <strong>Trojan-PWS-Cashcab <\/strong>(though some of our competitors call it <strong>Kykymber<\/strong>).<\/p>\n<p>As a result of the modifications, the keylogger component loads whenever any program initializes the modified DirectX driver file. Fortunately, it also loads when you run the DirectX Diagnostics program included with DirectX, <strong>DxDiag <\/strong>(click <em>Start<\/em>, <em>Run<\/em>, then type <strong>dxdiag <\/strong>and click <em>OK <\/em>to start it up). That&#8217;s also the easiest way to determine if your PC is infected.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_mscat32_diff_croplg_captions.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2705\" title=\"20100519_ddrawpws_mscat32_diff_croplg_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_mscat32_diff_croplg_crop.jpg\" width=\"303\" height=\"125\" \/><\/a><\/p>\n<p>It appears the Trojan steals not only keystrokes but also takes screenshots of whatever happens to be on the player&#8217;s screen at the time the Trojan activates, packages everything up as a .cab, then submits the collection to a server. Strings within the Cashcab keylogger indicate it targets a range of popular MMO titles, including Blizzard&#8217;s <strong>World of Warcraft<\/strong> and NCSoft&#8217;s <strong>Aion<\/strong>.<\/p>\n<p>The Cashcab installer appends less than 2000 bytes of malicious code to the DirectX files, which it replaces in both the <em>system32 <\/em>and <em>dllcache <\/em>folders, which prevents the <em>System File Checker<\/em> from replacing the modified version with a clean file. It also, helpfully, keeps copies of the original, unmodified file in both those locations, appending a <strong>.bak <\/strong>extension to the filename.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_filebackup.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2711\" title=\"20100519_ddrawpws_filebackup_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_filebackup_crop.jpg\" width=\"364\" height=\"98\" \/><\/a><\/p>\n<p>Removing the Trojan is a piece of cake, but even without any antivirus program on your computer anyone can effectively identify if their computer has been affected, and neutralize the threat. DxDiag (from version 9 onward) can check the digital signature of all DirectX drivers and rapidly identifies any component files that have been modified. When you run the DxDiag tool, fill in the little checkbox at the bottom.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_dxdiag-whql.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-2708\" title=\"20100519_ddrawpws_dxdiag-WHQL\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_dxdiag-whql.jpg?w=300\" width=\"300\" height=\"107\" \/><\/a><\/p>\n<p>If any of the digital sigs don&#8217;t match up, simply reinstalling <a href=\"http:\/\/www.microsoft.com\/downloads\/en\/resultsForProduct.aspx?displaylang=en&amp;productID=9C954C37-1ED1-4846-8A7D-85FC422D1388\" target=\"_blank\">the latest version of DirectX<\/a> over the top of any existing installation will restore the modified driver file(s) to their unmolested forms, which prevents the keylogger from activating even if its files are present on the system. DxDiag also, sometimes, reports errors when DirectX files have been modified in this way.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_dxdiag-error.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2710\" title=\"20100519_ddrawpws_dxdiag-error_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/05\/20100519_ddrawpws_dxdiag-error_crop.jpg\" width=\"447\" height=\"108\" \/><\/a><\/p>\n<p>The aftermath of a game phishing attempt is typically that a victimized player logs into the game only to discover that his or her character, dressed only in skivvies, is penniless and weaponless. Criminals use the stolen credentials to loot the player&#8217;s character of valuable items or in-game currency, passing it along to an accomplice who then fences the stolen goods on various &#8220;Buy Gold Cheap&#8221; Web sites. So, yes, it&#8217;s all about the money.<\/p>\n<p>Because the grey market for buying gold\/credits\/ducats not only supports these criminals but motivates the creation of new tools for theft, gamers need to <strong>stop buying game-gold<\/strong> on the Web: Keeping the grey market alive just feeds the problem. Just stop now. Please.<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n<p><em>Tip of the white hat to Threat Research Analyst Travis Newton for his assistance.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PC gamers have a new threat to contend with, one that has your personal information in its crosshairs and you can&#8217;t dispatch with a sniper rifle or BFG9000: A Trojan designed to steal game passwords that uses Microsoft&#8217;s own graphics engine, DirectX, against you. The Trojan, which appears to have originated in China, modifies one [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[7403,7405,7401,7421,7419,3619,3483,4379,7413,7417,7411,7415,7407,7399,4247,4137,4657,4143,7409,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2698"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2698"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2698\/revisions"}],"predecessor-version":[{"id":23709,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2698\/revisions\/23709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2698"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2698"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}