PeopleOnPage produces the Apropos family of spyware.
It uses the same ContextPlus engine as the public software POP!, made by PeopleOnPage. However, the Apropos branch uses a silent installer and rootkit techniques to hide itself from detection. When the client connects to the server, the name Apropos is used as the client name.
ContextPlus gathers an extensive amount of information from the user's computer. The application tracks which software is installed, what web sites are visited, and the user's browsing behavior. Each installation is given a unique ID, which is sent to the ContextPlus server to request a pop-up advertisement.
Apropos contains a kernel-mode rootkit that allows it to hide files, directories, registry keys, and processes. The rootkit is implemented by a kernel-mode driver which starts automatically early in the boot process. When the files and registry keys have been hidden, no user-mode process is allowed to access them.
Apropos installs itself into a randomly named directory under the Program Files folder.
Additional, it installs one randomly named executable file (.EXE) into the Windows\System32 folder and one randomly named driver (.SYS) into the Windows\System32\Drivers folder.
The following two log files generated by the F-Secure security product illustrate this behavior:
In addition to the randomly named files, Apropos uses several statically named files that reside in the installation directory, such as ace.dll, data.bin and WinGenerics.dll. Also, the log files and cache files are easy to recognize.
The kernel-mode driver patches the kernel at a very deep level. Important data structures and several Native API functions implemented by the kernel are modified. Specifically, the following functions are patched:
The operating system uses these functions to gain access to, and information about, files, directories, registry keys, and processes.
Apropos is not associated with Apropos Technologies, Inc (NASDAQ: APRS).