Win32/Crossza [Threat Name] go to Threat
Win32/Crossza.A [Threat Variant Name]
Category | trojan |
Size | 269824 B |
Aliases | Trojan:Win32/Skeeyah.A!bit (Microsoft) |
Trojan-Spy.Win32.Zbot.zgqm (Kaspersky) |
Short description
Win32/Crossza.A is a trojan which tries to download other malware from the Internet.
Installation
The trojan may create the following files:
- %allusersprofile%\Application Data\DXDriver.dll (78848 B, Win32/Crossza.A)
- %temp%\cryptui.dll (158720 B, Win32/Crossza.A)
- %allusersprofile%\Application Data\~D7%variable1%_tmp_XDSFA_XVGVGGH.dmp (158720 B, Win32/Crossza.A)
- %temp%\CertMgr.Exe (70992 B)
The trojan creates the following file:
- %startup%\Internet Explorer.lnk
The file is a shortcut to a following file:
- %SystemRoot%\System32\rundll32.exe "%allusersprofile%\Application Data\DXDriver.dll",Flush {DFSWLMOJ-DSWD-XXDK-WQIS-XCKDKKSDLMKJ}
In order to be executed on every system start, the trojan sets the following Registry entries:
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "Microsoft Adobe Update" = "%SystemRoot%\System32\rundll32.exe "%allusersprofile%\Application Data\DXDriver.dll",Flush {DFSWLMOJ-DSWD-XXDK-WQIS-XCKDKKSDLMKJ}"
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "Rundll32.exe" = "%SystemRoot%\System32\rundll32.exe "%allusersprofile%\Application Data\DXDriver.dll",Flush {DFSWLMOJ-DSWD-XXDK-WQIS-XCKDKKSDLMKJ}"
The trojan may set the following Registry entries:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows Google Service]
- "START_DLL" = "%allusersprofile%\Application Data\~D7%variable%_tmp_XDSFA_XVGVGGH.dmp"
- "REG_1" = "****==7f7e7d007f007e4f0072377f2b7f2b7f2f7f427f177f0b007f007f007f007f007f007f7f7e7d=="
- "REG_2" = "****==7f7e7d007f007e4f0072377f2b7f2b7f2f7f427f177f0b007f007f007f007f007f007f7f7e7d=="
- "REG_3" = "****==7f7e7d007f007e4f0072377f2b7f2b7f2f7f427f177f0b007f007f007f007f007f007f7f7e7d=="
- "REG_4" = "####==7f7e7d004b170b0b0f4550504e474f514e4a4f514d4d49514e475032161c0d100c10190b502816111b10080c500d1a18160c0b1a0d510f170f007e4f0072377f2b7f2b7f2f7f427f177f0b007f007f007f007f007f007f7f7e7d=="
- "REG_5" = "####==7f7e7d007f007e4f0072377f2b7f2b7f2f7f427f177f0b007f007f007f007f007f007f7f7e7d=="
- "REG_6" = "####==7f7e7d007f007e4f0072377f2b7f2b7f2f7f427f177f0b007f007f007f007f007f007f7f7e7d=="
- "GID" = "MTgxMDA5VDAy="
- "GPWD" = "MTgxMDA5VDAy="
- "SYSDATE" = 01 01 01 01 01 ...
- "SLPTIME" = 5000
A string with variable content is used instead of %variable% .
Information stealing
The trojan collects the following information:
- computer name
- MAC address
- operating system version
- information about the operating system and system settings
The trojan attempts to send gathered information to a remote machine.
The trojan contains a URL address. The HTTP protocol is used.
Payload information
The trojan may attempt to download files from the Internet.
The file is stored in the following location:
- %common_appdata%\_Google_Cloud.TMP
The following Registry entry is set:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows Google Service]
- "SEC_COMP" = "%common_appdata%\_Google_Cloud.TMP"
The file is then executed.
Other information
The trojan behaves differently if it detects a running process containing one of the following strings in its name:
- avgui.exe
- avastSvc.exe
- bka.exe
- BkavSystemService.exe
- nis.exe
The trojan can create and run a new thread with its own program code within the following processes:
- bka.exe
The trojan may execute the following commands:
- %systemroot%\System32\Rundll32.exe "%allusersprofile%\Application Data\DXDriver.dll",Flush {DFSWLMOJ-DSWD-XXDK-WQIS-XCKDKKSDLMKJ}
- cmd.exe /c del /a /f "%malware_filepath%"
After the installation is complete, the trojan deletes the original executable file.