{"id":4543,"date":"2011-06-17T08:12:24","date_gmt":"2011-06-17T15:12:24","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4543"},"modified":"2018-01-30T12:22:23","modified_gmt":"2018-01-30T19:22:23","slug":"fake-ups-document-installs-fake-microsoft-patch-payload","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/06\/17\/fake-ups-document-installs-fake-microsoft-patch-payload\/","title":{"rendered":"Fake UPS Document Installs Fake Microsoft Patch Payload"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2001.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/06\/16\/fake-ups-document-installs-fake-microsoft-patch-payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2011.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;title=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2021.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;title=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2031.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;title=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2041.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;title=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2051.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;Title=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2061.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Pa...+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2071.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/06\/16\/fake-ups-document-installs-fake-microsoft-patch-payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2081.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;headline=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2091.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F16%2Ffake-ups-document-installs-fake-microsoft-patch-payload&amp;h=Fake%20UPS%20Document%20Installs%20Fake%20Microsoft%20Patch%20Payload\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2101.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2111.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_installer-and-payloads_icons.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-4544\" title=\"20110615_fakeups_installer-and-payloads_icons\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_installer-and-payloads_icons.png\" width=\"166\" height=\"152\" \/><\/a>As if we didn&#8217;t have enough to deal with this week &#8212; after a Microsoft patch Tuesday that brought with it a boatload of security updates for <strong>Windows, Office, Silverlight, Visual Studio<\/strong>, and other programs &#8212; some enterprising malware distributor is emailing around bogus<em> tracking number<\/em> malware dressed up in the icon of a PDF document, and that malware is downloading payloads named after the updaters that Windows Update retrieves during an update.<\/p>\n<p>The malware arrived into one of our spam collection points with an attachment named <strong>UPS_document.zip<\/strong>. Way to be original there, criminals. Inside the Zip file was an executable downloader named <strong>UPS_Document.exe<\/strong>. Upon execution, it retrieves at least three payloads, including a copy of SpyEye (a password stealing Trojan), a tiny agent sending profiling information about the infected system, and a fraudulent &#8220;rogue system utility&#8221; called (on my XP testbed) Windows XP Restore.<\/p>\n<p>The rogue takes on much of the appearance of a previous Rogue of the Week, named <a href=\"http:\/\/blog.webroot.com\/2011\/05\/19\/rogue-of-the-week-windows-recovery\/\" target=\"_blank\">Windows Recovery<\/a>. In fact, Windows XP Restore looks to be a very slightly modified duplicate of that software. If you&#8217;ve been hit with either rogue, there are some cool free tools for you to download that will repair some of the damage; Read on for details.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_spamemail.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4546\" title=\"20110615_fakeups_spamemail_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_spamemail_crop.png\" width=\"396\" height=\"338\" \/><\/a><br \/>\nThe message with the attachment looked slightly better than these sorts of spam usually do. The creators went to the trouble of generating an HTML mail message, though I don&#8217;t know why they bothered, because it&#8217;s not as if pretty formatting makes poor spelling look any better. It says:<\/p>\n<blockquote>\n<pre>United Parcel Service\r\nTracking number #89946\r\nThe parcel was sent to your home <strong>adress<\/strong>.\r\nAnd it will arrive within 3 <strong>buisness<\/strong> days.\r\nMore information and the parcel tracking number are attached in document below.\r\nThank you\r\nUnited Parcel Service of America (c)\r\n153 James Street, Suite 100, Long Beach CA, <strong>90000<\/strong><\/pre>\n<\/blockquote>\n<p>When you execute the UPS_Document program, it starts the ball rolling on a fairly serious infection.<\/p>\n<p>The first thing the installer does is pull down an 8704-byte downloader with the filename <strong>trol.exe<\/strong>, which we classify to the definition<strong> Trojan-Downloader-Tukpat<\/strong>. That downloader always renames itself svchost.exe initially, and copies itself into the Windows directory, but this file is not the same as the legitimate (much larger) svchost.exe that Windows uses to launch services.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_procexp_hililte.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4550\" title=\"20110615_fakeups_procexp_hililte_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_procexp_hililte_crop.png\" width=\"220\" height=\"165\" \/><\/a><\/p>\n<p>After I rebooted the system, I noticed that the same downloader had made yet another copy of itself named <strong>KB171818.exe<\/strong>, which, when it&#8217;s listed alongside all the other running apps on the system, looks a lot like one of those Windows Update applications that patches your system. The number next to &#8220;KB&#8221; is always six digits, but randomizes each time you run it on a different machine.<\/p>\n<p>The Tukpat downloader then retrieves at least three other payloads from the Web site <strong>miliardov.com<\/strong>. One of the payloads is always an installer for another downloader we call <strong>Hiloti<\/strong>; The other two are installers for <strong>SpyEye<\/strong> and the rogue. After executing each payload, one of the files triggers a bluescreen by crashing a Windows driver. When you reboot the box, it has been owned by the malware.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_domains.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4551\" title=\"20110615_fakeups_domains\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_domains.png\" width=\"206\" height=\"227\" \/><\/a><\/p>\n<p>The SpyEye payload periodically (about three times an hour) sends an HTTP GET request to one of more than a dozen Web sites; The query string typically includes the IP address of the infected computer, as well as an &#8220;affiliate ID&#8221; and several other encoded parameters. The Web sites it contacts &#8212; with names like <strong>findsmell.org, findstation.org, searchbreeze.org,<\/strong> and <strong>clickcareful.org<\/strong> &#8212; redirect you to Google when you visit them directly.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_cnc-domains.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4552\" title=\"20110615_fakeups_cnc-domains\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_cnc-domains.png\" width=\"635\" height=\"400\" \/><\/a><\/p>\n<p>The <strong>Windows XP Restore<\/strong> rogue immediately pulls the same stunts that Windows Recovery does, including:<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue_windows-xp-restore_scanwindow.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4553\" title=\"20110615_fakeups_rogue_windows-xp-restore_scanwindow\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue_windows-xp-restore_scanwindow.png?w=300\" width=\"300\" height=\"177\" \/><\/a><\/p>\n<ul>\n<li>A fake &#8220;scan&#8221; of the computer for &#8220;problems&#8221;<\/li>\n<li>hiding the desktop shortcuts and contents of the Start menu inside a subfolder of the %temp% folder (Got this problem? <a href=\"http:\/\/download.webroot.com\/Desktop_Fix.exe\" target=\"_blank\">Use this tool to fix it<\/a>)<\/li>\n<li>changing the attributes to the logged-in user&#8217;s profile folders as &#8220;super hidden&#8221;<\/li>\n<li>adding a registry key to prevent the user viewing &#8220;super hidden&#8221; files (Got this problem? <a href=\"http:\/\/download.webroot.com\/unhide.exe\" target=\"_blank\">Use this other tool to fix it<\/a>)<\/li>\n<li>hijacks the system with a program that forces itself to be on top of all other windows on the desktop.<\/li>\n<\/ul>\n<p>One wonders why they bother, until you see the price tag they stick on all this baloney. <em>Eighty four point five dollars.<\/em> Yeesh.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue_windows-xp-restore_bogus-payment-window.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4555\" title=\"20110615_fakeups_rogue_windows-xp-restore_bogus-payment-window_price\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue_windows-xp-restore_bogus-payment-window_price.png\" width=\"337\" height=\"59\" \/><\/a><\/p>\n<p>But at least it fixes this problem. Whew, what a relief. I guess this software really blows, after all.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_windows-xp-restore_error-report.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4568\" title=\"20110615_fakeups_windows-xp-restore_error-report_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_windows-xp-restore_error-report_crop.png\" width=\"531\" height=\"102\" \/><\/a><\/p>\n<p>Also of note, the fake IE window in which the order form appears displays one URL:<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_fake-payment-domain.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4556\" title=\"20110615_fakeups_fake-payment-domain\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_fake-payment-domain.png\" width=\"426\" height=\"133\" \/><\/a><\/p>\n<p>But this is the real domain name of the payment processing service &#8212; the place where the credit card numbers go.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue_windows-xp-restore_paymentsadd-com.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4557\" title=\"20110615_fakeups_rogue_windows-xp-restore_paymentsadd.com\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue_windows-xp-restore_paymentsadd-com.png\" width=\"694\" height=\"98\" \/><\/a><\/p>\n<p>Does the rogue use Plimus or SecurePay, both legitimate payment processing companies, as clearinghouses for fraudulent purchases? I&#8217;m not sure, but I&#8217;m curious because the Plimus URL and SecurePay&#8217;s name appear inside the rogue application. I sent a message to Plimus earlier in the week, but they never responded.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue-plimus-string.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4559\" title=\"20110615_fakeups_rogue-plimus-string-crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_rogue-plimus-string-crop.png\" width=\"227\" height=\"73\" \/><\/a><\/p>\n<p>The <strong>Paymentsadd.com<\/strong> domain used for the transaction above was registered using a domain registrar based in China, and this is Google&#8217;s streetview of the &#8220;corporate headquarters&#8221; for this payment processor.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_fake-whois-address-streetview.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4561\" title=\"20110615_fakeups_fake-whois-address-streetview\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110615_fakeups_fake-whois-address-streetview.png?w=300\" width=\"300\" height=\"193\" \/><\/a><\/p>\n<p>Yeah, I&#8217;m not buying it, either.<a title=\"Webroot blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"Webroot blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As if we didn&#8217;t have enough to deal with this week &#8212; after a Microsoft patch Tuesday that brought with it a boatload of security updates for Windows, Office, Silverlight, Visual Studio, and other programs &#8212; some enterprising malware distributor is emailing around bogus tracking number malware dressed up in the icon of a PDF [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,4421,8615,8287,8621,4893,8619,3819,8613,8609,8285,8283,3471,6089,3951,8617,7297,5743,8607,8611],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4543"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4543"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4543\/revisions"}],"predecessor-version":[{"id":23697,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4543\/revisions\/23697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4543"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4543"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}