Home Malware Programs Malware Exp/20124792-B

Exp/20124792-B

Posted: January 8, 2013

Threat Metric

Ranking: 6,504
Threat Level: 2/10
Infected PCs: 4,640
First Seen: January 8, 2013
Last Seen: October 9, 2023
OS(es) Affected: Windows

Exp/20124792-B is a PC threat that's associated with websites hosting a zero-day exploit that attacks Internet Explorer-using PCs. By referencing an object that is either deleted or referenced improperly, Exp/20124792-B can execute arbitrary and malicious code, typically for the purpose of installing malicious software onto the target computer. Exp/20124792-B has been associated with two compromised websites in the wild and, at this time, does not have a patch to correct its corresponding IE vulnerability. For the time being, SpywareRemove.com malware researchers suggest that you avoid any and all potentially dangerous websites and keep anti-malware software on-hand for deflecting any vulnerability-exploiting attacks like Exp/20124792-B.

Exp/20124792-B: the Web Page that Chooses Your PC's Software for You

Exp/20124792-B and other PC threats that are related to Internet Explorer's CVE-2012-4792 vulnerability have been noted in two separate sites so far that appear to have been hacked and forced to host the attack. These sites, which SpywareRemove.com malware analysts have confirmed as an Iranian oil company's page and a news site for the Uyghurs of East Turkestan, display all their usual (harmless) content, but also have been modified to include triggers for IE-based attacks.

These 'trigger' HTML pages are denoted by the label of Exp/20124792-B, and Internet Explorer versions 6 through 8 are at risk for Exp/20124792-B's corresponding vulnerability, but other brands of web browsers are unaffected. As is standard for drive-by-download attacks, there aren't any visual symptoms of their occurrence, and you may be unable to detect them at all without anti-malware protection.

The exact structure of the attack can vary, as Exp/20124792-B has been seen in conjunction with both malicious JavaScript content and malicious Flash content. If Exp/20124792-B gains access to a PC that's running Internet Explorer, Exp/20124792-B will install malware such as Troj/Agent-ZMC, compromising the security and privacy of your PC.

Keeping Your Computer Armored Against Exp/20124792-B

Like all new or zero-day exploits, Exp/20124792-B can't be defended against by patching your computer, although Microsoft is expected to announce a security patch in a reasonable time frame. Until then, SpywareRemove.com malware experts strongly encourage the usage of anti-malware software with web-protection features to protect your web-browsing experience. Other common-sense safety measures, such as avoiding sites with a history of serving malware and disabling exploitable features (a la Flash or Java) when they're unnecessary also should be used regularly.

One of Exp/20124792-B's eventual payloads, Troj/Agent-ZMC, has been verified to use functions such as disguising itself as Windows components and modifying your file-viewing settings to protect itself. Outside of thorough anti-malware scans by appropriate software, you shouldn't anticipate being able to detect payloads related to Exp/20124792-B, and you always should be willing to resort to anti-malware products as required to detect or delete Exp/20124792-B's payload.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



deployJava.js File name: deployJava.js
File type: JavaScript file
Mime Type: unknown/js
Group: Malware file
Helps.html File name: Helps.html
Mime Type: unknown/html
Group: Malware file
news.html File name: news.html
Mime Type: unknown/html
Group: Malware file
xsainfo.jpg File name: xsainfo.jpg
Mime Type: unknown/jpg
Group: Malware file
today.swf File name: today.swf
Mime Type: unknown/swf
Group: Malware file
exploit.html File name: exploit.html
Mime Type: unknown/html
Group: Malware file

Additional Information

The following URL's were detected:
sweetaccess.ru
Loading...