Websense® Security Labs™ ThreatSeeker™ Network has detected a type of trojan that uses the Windows input method editor (IME) to inject a system. An IME is an operating system component or program that allows users to enter characters and symbols not found on their input device. For example, it could allow a user of a 'Western' keyboard to input Chinese, Japanese, Korean, and Indic characters.
The trojan can install itself as an IME, then it kills any running antivirus processes and deletes the installed antivirus executable files. The original executable file of this trojan disguises itself as an antivirus update package.
When a user runs the trojan, it creates a file named winnea.ime under the system folder,The .ime file type is primarily associated with 'Global Input Method Editor' by Microsoft Corporation:
In the above example, winnea.ime is a Dynamic Link Library (DLL) file, but pretends to be an input method file and is installed as an input method. The input parameter "5Ah" was used by SystemParametersInfo Function(sub_131486C0) to change the user profile in the Windows registry to set the default IME:
When the user opens the default input method, the file winnea.ime loads and detects an antivirus list:
At the same time, winnea.ime releases a file named pcij.sys to the system folder and loads it as a driver process:
Then it calls DeviceIOControl to kill the running process of any antivirus in the list; the control code is sent to the driver process pcij.sys:
The pcij.sys file is used to find all running antivirus processes and kill them by calling the ObReferenceObjectByHandle function:
This quick analysis shows an interesting way that trojans can use to inject themselves into a system. The input method in Windows is now a popular way for hackers to inject malicious code.
Websense Messaging and Websense Web Security customers are protected against these attacks.
'IT 보안소식' 카테고리의 다른 글
[77DDoS]2010년 7월 7일 현재 DDoS 보안업체 대응 상황 (8) | 2010.07.08 |
---|---|
청와대 및 주요 5기관 DDoS 공격 발생!! (0) | 2010.07.07 |
플래쉬 플레이어 업데이트를 가장한 랜섬웨어(Russian ransomware and Flash Player update) (0) | 2010.07.07 |
트렌드마이크로(TrendMicro), ZeuS/ZBOT Targets Russian Banks (2) | 2010.07.06 |
네이트온 악성코드 사진변경(2010-07-05) (2) | 2010.07.05 |
댓글