Home Malware Programs Backdoors PWS-Duqu

PWS-Duqu

Posted: October 19, 2011

Threat Metric

Threat Level: 10/10
Infected PCs: 47
First Seen: October 19, 2011
Last Seen: September 24, 2022
OS(es) Affected: Windows

PWS-Duqu is a backdoor Trojan that's based on a previous Stuxnet Trojan that uses similarly-advanced methods to attack and control Windows computers. The criminals behind PWS-Duqu attacks have been observed to focus their attacks on Northern Africa, southeastern Europe, the Middle East and India, and you may be in particular danger of being attacked by PWS-Duqu if you live in any of the above regions. Although SpywareRemove.com malware experts have found that PWS-Duqu can be configured to launch a wide variety of attacks, PWS-Duqu's functions are primarily-focused on delivering spyware programs, such as keyloggers, which can steal passwords and other forms of personal information. Because PWS-Duqu uses sophisticated techniques to avoid detection, using an anti-malware program to find and remove PWS-Duqu is more feasible than trying to find and delete PWS-Duqu by yourself.

PWS-Duqu – a Crippled but Still Deadly Backdoor Trojan

PWS-Duqu's criminal maintainers have achieved a minor measure of infamy by preferring to target regions in the range of the 'golden jackal,' a subtype of jackal that's often found in northern Africa, India and various Middle Eastern countries. In addition, PWS-Duqu's actual code and functions are clearly evolved from the comparatively older Stuxnet relative, although PWS-Duqu does lack some of Stuxnet's features, such as PWS-Duqu's PLC functions. Since detecting PWS-Duqu without a software-based assistance can be very difficult, preventative measures, such as using strict browser security settings, are, as usual, the best defense.

PWS-Duqu, like most backdoor Trojans, can be reconfigured to change PWS-Duqu's attacks to a certain extent, but both PWS-Duqu's encryption file and several other components, including PWS-Duqu's .dll files, are encrypted to conceal their true purposes. Despite this capability, PWS-Duqu's ability to receive commands has been cut off due to the original command server in India being blacklisted. This means that any PC that's attacked by PWS-Duqu will most likely have to withstand PWS-Duqu's default attacks, such as installing keyloggers, until a new PWS-Duqu variant arises.

SpywareRemove.com malware analysts have also observed a second major victory against PWS-Duqu – a recently-occurred revocation of PWS-Duqu's certificates (digital signatures from trustworthy companies that swear to the safety of the relevant software). The clever crooks behind PWS-Duqu issued fake certificates to make it appear as though PWS-Duqu is trustworthy for anyone who bothered to look for PWS-Duqu's certificates, but now that PWS-Duqu's C-Media Electronics Corporation certification has been clearly revoked, PWS-Duqu has one less disguise to use to hide PWS-Duqu's attacks. In addition, not all variants of PWS-Duqu have this certification; one observed PWS-Duqu variant has been seen without any form of certification at all.

An Analysis of PWS-Duqu's Hidden Hostility

In addition to PWS-Duqu's other methods of concealment, PWS-Duqu will hide the majority of PWS-Duqu's components in encrypted .dll files and drivers that appear to be parts of your normal operating system. Different variants of PWS-Duqu can also be detected as Troj/Bdoor-BDA, PWS-Duqu.dr and PWS-Duqu!rootkit, and as the latter implies, many PWS-Duqu variants do have the ability to launch themselves even in Safe Mode via rootkit-based exploits.

Attacks from PWS-Duqu can consist of, but aren't limited to:

  • The installation of spyware, such as keyloggers that monitor keyboard keystrokes, take screenshots or even record microphone or webcam input. PWS-Duqu may attempt to steal passwords, identification credentials or banking information.
  • Reduced security due to blocked software and alterations to your security settings. Your firewall may be riddled with exceptions, your network ports may be left open, and programs like Task Manager, MSConfig or anti-virus scanners may crash or fail to launch.
  • Total loss of control over your PC. PWS-Duqu may be used to create a backdoor access to your computer that allows remote criminals to force your PC to engage in DDoS crimes, spambotting and other forms of illegal behavior that use up your system resources without your permission.

Since SpywareRemove.com malware researchers have observed that some versions of PWS-Duqu include rootkit features, you should always use a suitable and up-to-date anti-malware program to remove a PWS-Duqu infection; visible symptoms of PWS-Duqu's activities may be minimal or even nonexistent.

PWS-Duqu, or Duqu, hides its actions by appearing to be a normal website. Behind the scenes Duqu actually connects to the server identified as canoyraqomez.rapidns.com (IP: 206.183.111.97) which is based out of India. From there, Duqu sends a http request and the server responds with a blank JPG image sending back the file dsc00001.jpg with embedded stolen data. The actual JPG file, if accessed, will open nothing more than a JPG image looking like a picture of a galaxy. Duqu has a perplexing nature and the JPG image used to transmit pilfered data is quite a mystery which is why you should take actions to remove Duqu as soon as possible.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Program Files%\Protection Center\protext.dll File name: %Program Files%\Protection Center\protext.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%Documents and Settings%\[UserName]\Start Menu\ Update.lnk File name: %Documents and Settings%\[UserName]\Start Menu\ Update.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%Windows%\system32\Drivers\jminet7.sys File name: %Windows%\system32\Drivers\jminet7.sys
File type: System file
Mime Type: unknown/sys
Group: Malware file
%SystemDrive%\inf\netp191.pnf File name: %SystemDrive%\inf\netp191.pnf
Mime Type: unknown/pnf
Group: Malware file
%SystemDrive%\inf\netp192.pnf File name: %SystemDrive%\inf\netp192.pnf
Mime Type: unknown/pnf
Group: Malware file
%UserProfile%\Start Menu\Programs\PWS-Duqu\ File name: %UserProfile%\Start Menu\Programs\PWS-Duqu\
Group: Malware file
%UserProfile%\Start Menu\Programs\PWS-Duqu\Uninstall PWS-Duqu.lnk File name: %UserProfile%\Start Menu\Programs\PWS-Duqu\Uninstall PWS-Duqu.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%UserProfile%\Start Menu\Programs\PWS-Duqu\PWS-Duqu.lnk File name: %UserProfile%\Start Menu\Programs\PWS-Duqu\PWS-Duqu.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ XTray.exeHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 'SelfdelNT'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 'tmp'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run '[random string]'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\JmiNET3

One Comment

  • Bijit says:

    OMGOMGOMG I saw many guides sniyag open gpedit.msc and my os is Windows 7 Home Premium well those doesn't work as I didn't have gpedit.msc in my com so I tried this .Now I know that the inf file is to enable regedit for 3 seconds only so as soon as you clicked install quickly click that registry fix from the second link .And wala!!!! Task manager and others enabled!!!!^^

Loading...