
Dell Sonicwall UTM research team have discovered a new FakeAV malware in the wild called Win 8 Security System. FakeAV malware of this nature has been covered before in a previous sonicalert. However, this FakeAV malware is different in that it deploys a rootkit driver as part of its infection process. This makes the malware very difficult to remove.
Although the sample we obtained failed to show any pop-up dialogs we were able to gain information about its intentions through our analysis.
The Trojan uses the following icon:

Upon infection, the Trojan deletes itself. It then makes the following changes to the filesystem
It copies itself to:
It drops a rootkit to:
The file attributes of the rootkit are set to protect it from modification or deletion even in safe-mode.
It adds the following key to the Windows registry to enable startup after reboot:
A sample of keys added to register the rootkit driver:
The following HTML pages were extracted from the 72706355694bcd40.exe executable during analysis. The pages are used to hook into various browsers such as Internet Explorer and Google Chrome and produce a fake security alert:



We also extracted the following landing pages from the executable:
The following screenshot is from the payment landing page:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News