Agent.AUM is a Themida packed trojan that arrives on the system with the filename of Windows Genuine Advantage Patch.exe.
Upon execution, it drops the following files in the Windows System directory:
- ldapi32.exe (17 KB) - Detected as Backdoor.Win32.Cakl.a
- ntcvx32.dll (22 KB) - Detected as Trojan-Spy.Win32.Delf.qb
- ntswrl32.dll (9 KB) - Detected as Backdoor.Win32.Cakl.a
- vssms32.exe (1,696 KB) - A copy of itself
It checks the existence of the following mutex to ensure that there's only one instance of itself running in memory:
In creates the following autostart registry entry:
- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]vssms32 = "{systemdir}\vssms32.exe"
It also creates the following registry entry to allow itself to bypass the Windows Firewall:
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] {systemdir}\vssms32.exe = "{systemdir}\vssms32.exe:*:Enabled:Dnode"
It modifies the following registry keys:
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal]
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network]
- and changes them it to:
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\minimal.xxx]
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\network.xxx]
This is done in order to prevent the user from successfully booting into Safe Mode.
This trojan tries to steal user account names and passwords of the following known applications:
- Firefox
- ICQ
- Internet Explorer
- MSN Messenger
- Outlook
- RAS
It also tries to get system information such as:
- CapsLock State
- Computer Name
- CPU Name
- CPU Speed
- Free Disk Space
- Local Host Name
- NumLock State
- Operating System
- Resolution
- Screen Captures of the System
- ScrollLock State
- Temporary and System Folders Location
- User Name
- Windows Language
Agent.AUM also attempts to log keystroke events and saves them to the following file located at the Windows folder:
Below is an example of the HKR32.ASM file. It shows the user's logged keystrokes: