Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:ADSPY/ISearch.d.2
Date discovered:22/11/2005
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:852.566 Bytes
MD5 checksum:f822ce94e5bfa827143a8457c70F9210
VDF version:6.32.00.207

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: Adware-Isearch.dr.
   •  VirusBuster: trojan Adware.DR.CommAd.A
   •  Bitdefender: Trojan.Proxy.493


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification

 Files The following files are created:

Non malicious files:
   • %appdata%\NetMon\domains.txt
   • %appdata%\NetMon\log.txt

%WINDIR%\TmFtZQ\asappsrv.dll
%WINDIR%\TmFtZQ\command.exe
%WINDIR%\TmFtZQ\nAIQtk.vbs
%PROGRAM FILES%\Network Monitor\netmon.exe
%WINDIR%\uninstall_nmon.vbs

The location is the following:
   • http://command.adservs.com/binaries/**********
It is saved on the local hard drive under: %SYSDIR%\atmtd.dll Further investigation pointed out that this file is malware, too.

 Registry The following registry keys are added in order to load the services after reboot:

HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor
   • "Type"=dword:00000010
   • "Start"=dword:00000002
   • "ErrorControl"=dword:00000001
   • "ImagePath"=%hex values%
   • "DisplayName"="Network Monitor"
   • "ObjectName"="LocalSystem"

HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Security
   • "Security"=%hex values%

HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum
   • "0"="Root\\LEGACY_NETWORK_MONITOR\\0000"
   • "Count"=dword:00000001
   • "NextInstance"=dword:00000001

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
   • "NextInstance"=dword:00000001

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
   • "Service"="Network Monitor"
   • "Legacy"=dword:00000001
   • "ConfigFlags"=dword:00000000
   • "Class"="LegacyDriver"
   • "ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
   • "DeviceDesc"="Network Monitor"

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000\
   Control
   • "*NewlyCreated*"=dword:00000000
   • "ActiveService"="Network Monitor"

HKLM\SYSTEM\CurrentControlSet\Services\cmdService
   • "Type"=dword:00000110
   • "Start"=dword:00000002
   • "ErrorControl"=dword:00000000
   • "ImagePath"=%hex values%
   • "DisplayName"="Command Service"
   • "ObjectName"="LocalSystem"

HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security
   • "Security"=%hex values%

HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum
   • "0"="Root\LEGACY_CMDSERVICE\0000"
   • "Count"=dword:00000001
   • "NextInstance"=dword:00000001

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
   • "Service"="cmdService"
   • "Legacy"=dword:00000001
   • "ConfigFlags"=dword:00000000
   • "Class"="LegacyDriver"
   • "ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
   • "DeviceDesc"="Command Service"

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000\
   Control
   • "*NewlyCreated*"=dword:00000000
   • "ActiveService"="cmdService"



The following registry keys are added:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
   {3877C2CD-F137-4144-BDB2-0A811492F920}
   • "Contact"="Customer Support Department"
   • "DisplayName"="Command"
   • "DisplayVersion"="1.0.1"
   • "NoModify"=dword:00000001
   • "NoRemove"=dword:00000000
   • "NoRepair"=dword:00000001
   • "UninstallString"="wscript "%WINDIR%\TmFtZQ\nAIQtk.vbs""

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
   {A394E835-C8D6-4B4B-884B-D2709059F3BE}
   • "Contact"="Customer Support Department"
   • "DisplayName"="Network Monitor"
   • "DisplayVersion"="6.0.1"
   • "NoModify"=dword:00000001
   • "NoRemove"=dword:00000000
   • "NoRepair"=dword:00000001
   • "UninstallString"="wscript "%WINDIR%\uninstall_nmon.vbs""

 Backdoor Contact server:
One of the following:
   • http://80gw6ry3i3x3qbrkwhxhw.032439.com/client.php?str=/**********
   • http://u9zqi6cq.124365.com/**********

This is done via the HTTP GET request on a PHP script.


Remote control capabilities:
     Download file
     Visit a website

 File details Programming language:
The malware program was written in Delphi.

Description inserted by Ionut Slaveanu on Wednesday, May 24, 2006
Description updated by Andrei Gherman on Wednesday, June 7, 2006

Back . . . .