W32/Stator.A@mm

description-logoAnalysis

  • Virus is ASPack compressed with a size of 62,464 bytes
  • When virus is executed, it writes the following files and copies itself as existing files; renaming original files of the same name to VXD extensions -

    C:\WINDOWS\TEMP\PHOTO1.JPG - 27Kb - cropped picture of young female posing with franchise icon Ronald McDonald

    C:\WINDOWS\MPLAYER.VXD - original EXE renamed
    C:\WINDOWS\MPLAYER.EXE - virus
    C:\WINDOWS\WINHLP32.VXD - original EXE renamed
    C:\WINDOWS\WINHLP32.EXE - virus
    C:\WINDOWS\NOTEPAD.VXD - original EXE renamed
    C:\WINDOWS\NOTEPAD.EXE - virus
    C:\WINDOWS\CONTROL.VXD - original EXE renamed
    C:\WINDOWS\CONTROL.EXE - virus
    C:\WINDOWS\SCANREGW.VXD - original EXE renamed
    C:\WINDOWS\SCANREGW.EXE - virus
    C:\WINDOWS\SYSTEM\SCANREGW.EXE - virus
    C:\WINDOWS\SYSTEM\LOADPE.COM - virus

  • Virus modifies the registry to run itself at Windows startup -

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\RunServices\
    ScanRegistry=c:\windows\system\scanregw.exe

  • Virus modifies the registry to run itself when any executable EXE file is run -

    HKEY_CLASSES_ROOT\exefile\shell\open\command\
    @ = "c:\windows\system\loadpe.com" "undefined1" undefined*

    * Original value here was
    @ = "undefined1" undefined*

  • Virus acts as a companion virus, copying existing EXE files as VXD files, then copying itself as the original file name and also assuming the icon of the original application

  • When LOADPE.COM executes, it writes three files to the local machine -

    C:\WINDOWS\SYSTEM\NDXAPI.OCX - contains string "PLICT01"
    C:\WINDOWS\SYSTEM\ODXAPI.OCX - contains string "PLICT01"
    C:\WINDOWS\IFNHLP.SYS - copy of virus

  • Every time a new executable is run, it is infected by the companion method of copying the original file as a .VXD and copying the virus as the original .EXE file name.

  • Virus attempts to hi-jack an email client named "The Bat!" and also use "smtp.mail.ru" as an SMTP server in order to distribute itself in emails as the file "Photo1.jpg.pif"

  • Virus attempts to capture credentials such as cached network passwords, CuteFTP info, Netscape and "TheBat!" email configurations, and store them in a file in order to send these to the virus author

  • Virus contains these strings in its code -

    undefinedADD_STAT stat.pgp
    Stat-generator v1.3

Telemetry logoTelemetry

Detection Availability

FortiClient
Extreme
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR

Version Updates

Date Version Detail
2021-04-27 85.00761
2021-02-08 83.89600 Sig Added
2020-09-01 80.05600 Sig Updated
2020-06-08 78.01900 Sig Added