This is a Trojan that simulates a human clicking on ads to increase the click-through rates. The Trojan is spread under the name Ad Expert Browser by the partner program Installmonster (also known as Zipmonster).
After Trojan.Click3.9243 is successfully installed and launched, it creates a hidden desktop, named mntdesktop55, and then starts its own process on this desktop:
Desktop: mntdesktop55
X=0,Y=0,WIDTH=1024,HIGHT=768
------------------------------------------------
hwnd: 0001017C
title: ""
class: "tooltips_class32"
exstype: 000000A8 WS_EX_TOPMOST WS_EX_TRANSPARENT WS_EX_TOOLWINDOW
style: 84800002 WS_POPUP WS_CLIPSIBLINGS WS_CAPTION WS_BORDER
pid: 00000938 aeb.exe
x=0,y=0,width=132,hight=38
------------------------------------------------
hwnd: 00030180
title: ".NET-BroadcastEventWindow.4.0.0.0.9c43c1.0"
class: ".NET-BroadcastEventWindow.4.0.0.0.9c43c1.0"
exstype: 00000000
style: 84000000 WS_POPUP WS_CLIPSIBLINGS
pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
------------------------------------------------
hwnd: 0003016C
title: ""
class: "Chrome_SystemMessageWindow"
exstype: 00000100 WS_EX_WINDOWEDGE
style: 04C00000 WS_CLIPSIBLINGS WS_CAPTION WS_BORDER WS_DLGFRAME
pid: 00000938 aeb.exe
x=0,y=0,width=132,hight=38
------------------------------------------------
hwnd: 00020158
title: "Ads Expert Browser"
class: "HwndWrapper[aeb.exe;;635cae48-2fd5-4c19-b97b-7812d5dca4d7]"
exstype: 00000180 WS_EX_TOOLWINDOW WS_EX_WINDOWEDGE
style: 26CF0000 WS_MINIMIZE WS_CLIPSIBLINGS WS_CLIPCHILDREN WS_CAPTION
WS_BORDER WS_DLGFRAME WS_SYSMENU WS_THICKFRAME WS_GROUP WS_TABSTOP
WS_MINIMIZEBOX WS_MAXIMIZEBOX
pid: 00000938 aeb.exe
x=0,y=701,width=160,hight=27
------------------------------------------------
hwnd: 0002013A
title: "Hidden Window"
class: "HwndWrapper[aeb.exe;;4ed1725d-405f-47a5-bdde-785d013e0b65]"
exstype: 00000100 WS_EX_WINDOWEDGE
style: 06CF0000 WS_CLIPSIBLINGS WS_CLIPCHILDREN WS_CAPTION WS_BORDER
WS_DLGFRAME WS_SYSMENU WS_THICKFRAME WS_GROUP WS_TABSTOP WS_MINIMIZEBOX
WS_MAXIMIZEBOX
pid: 00000938 aeb.exe
x=25,y=25,width=768,hight=526
------------------------------------------------
hwnd: 00040136
title: "SystemResourceNotifyWindow"
class: "HwndWrapper[aeb.exe;;c7e6d7e4-37fe-4f1e-93bf-315d897ceec3]"
exstype: 00000000
style: 8C000000 WS_POPUP WS_DISABLED WS_CLIPSIBLINGS
pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
------------------------------------------------
hwnd: 00050134
title: "MediaContextNotificationWindow"
class: "HwndWrapper[aeb.exe;;acb0ad30-c08a-4059-9835-bb0a141092cb]"
exstype: 00000000
style: 84000000 WS_POPUP WS_CLIPSIBLINGS
pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
------------------------------------------------
hwnd: 00010178
title: ""
class: "HwndWrapper[aeb.exe;;e4d0e45d-c3f1-4cbd-a399-6d92ae6c18df]"
exstype: 00000100 WS_EX_WINDOWEDGE
style: 04C00000 WS_CLIPSIBLINGS WS_CAPTION WS_BORDER WS_DLGFRAME
pid: 00000938 aeb.exe
x=0,y=0,width=132,hight=38
------------------------------------------------
hwnd: 0001017A
title: "Default IME"
class: "IME"
exstype: 00000000
style: 8C000000 WS_POPUP WS_DISABLED WS_CLIPSIBLINGS
pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
Launched off the screen, the Trojan imitates user actions by moving the mouse pointer and clicking advertising banners, scrolling webpages, downloading video clips (using the implemented set of codecs). It contains the following set of user-agent values:
namespace Ads_Expert_Browser
{
public class MainWindow : Window, IResourceInterceptor, IComponentConnector
{
private static bool IsMainWindow = false;
private static string subid = "";
public static RegistryKey softwareKey = Registry.CurrentUser.OpenSubKey("Software", true);
public static readonly ILog log = LogManager.GetLogger(typeof (MainWindow));
private string[] user_7 = new string[4]
{
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.114 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1870.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1862.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.86 Safari/537.36"
};
private string[] user_7_64 = new string[5]
{
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.114 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1862.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1870.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.27 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.47 Safari/537.36"
};
private string[] user_8 = new string[3]
{
"Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.114 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1862.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1870.2 Safari/537.36"
};
private string[] user_8_64 = new string[4]
{
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.114 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1870.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1897.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1862.2 Safari/537.36"
};
private string[] user_8_1 = new string[4]
{
"Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.114 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1862.2 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.69 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.27 Safari/537.36"
};
private string[] user_8_1_64 = new string[4]
{
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.114 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.27 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1916.69 Safari/537.36",
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko)
Chrome/35.0.1862.2 Safari/537.36"
};
private string[] urls_list = new string[35]
{
"Google.com",
"Facebook.com",
"Youtube.com",
"Yahoo.com",
"Wikipedia.org",
"Twitter.com",
"Amazon.com",
"Live.com",
"Linkedin.com",
"Tmall.com",
"Bing.com",
"Wordpress.com",
"Pinterest.com",
"Ebay.com",
"Instagram.com",
"Ask.com",
"Imdb.com",
"Craigslist.org",
"Reddit.com",
"Blogger.com",
"Aliexpress.com",
"Cnn.com",
"Vube.com",
"Fifa.com",
"Booking.com",
"Vimeo.com",
"Weather.com",
"Forbes.com",
"Businessinsider.com",
"Chase.com",
"Walmart.com",
"Indeed.com",
"Foxnews.com",
"Tripadvisor.com",
"Ikea.com"
};
private int TimeForRestart = 60;
private int repeat = 5;
private int clickCount = 5;
private int repeatAtPage = 5;
private int time = 360;
private string startURL = "http://www.grimfullarop.com/";
private int WaitForLoad = 120;
private string id = "";
public string s_date = "";
private object TimeLocker = new object();
private object ErrorLocker = new object();
private const string app = "Awesomium Renderer";
private ulong number_s;
private Thread thr;
private Thread Thr_download_page;
private int number_strartN;
private Thread thr_control;
private Thread thr_check;
private int number;
private bool debug;
private int tickClick;
private static XDocument doc;
public static RegistryKey hkMine;
private bool isTimefromMoveExit;
internal Grid grid;
internal WebControl webControl1;
private bool _contentLoaded;
Trojan.Click3.9243 sends the list of processes that are running on the infected computer and information on processor load. Files of the Trojan are digitally signed.
Signers:
Mayris Corporation
COMODO Code Signing CA 2
UTN-USERFirst-Object
AddTrust External CA Root
Signing date: 18:37 01.07.2014