In this case the campaign is targeted at French speakers and purports to be from HSBC France.
The Upatre downloader is attached as an EXE file (a Windows program) inside a ZIP file named Avis.de.Paiement.zip.
The downloader then unscrambles and launches Gameover.
When it launches, Gameover installs into your Application Data directory, tagging itself with a short block of system-specific binary data.
This "tagging" serves two purposes: the installed copy is tied to your computer, so it won't run anywhere else if it is taken away for analysis; and your copy of the malware is unique, so that simple checksum-based file matching can't be used to detect it.
Normally, Gameover then injects itself into other processes and exits.
This is where the new variant drops and installs the Necurs rootkit, which is implemented as a kernel driver.
Two drivers - a 32-bit and a 64-bit version - are decrypted using different RC4 keys:
Then, further shellcode is decrypted and executed to setup and load the appropriate driver.
We can see that the code first checks to see if the Necurs device objectNtSecureSys already exists:
If it does not, the appropriate driver will be loaded.
If the system is 32-bit and you do not have administrator rights, the malware tries to exploit an aging vulnerability known as CVE-2010-4398 to elevate its privilege so it can load the driver.
The exploit relies on a specially-crafted registry entry and, somewhat curiously, the use of a system function associated with End-User Defined Characters (EUDCs), as seen here:
If you are patched against this vulnerability, then the loading of the rootkit will trigger a User Account Control (UAC) prompt - an immediately-suspicious side effect, considering that the file you just opened was supposed to be an invoice.
If you are running XP, which doesn't have UAC, and you aren't an administrator, the rootkit can't prompt for permission to load, ironically making you very slightly safer.
The 64-bit driver is digitally signed, but with an unsigned and obviously bogus certificate:
64-bit versions of Windows usually insist that drivers are signed with verified certificates, so the malware tries to reconfigure your system so that it will accept unverified drivers.
The malware uses the BCEDIT Boot Configuration Editor utility to set theTESTSIGNING boot option, allowing the malicious driver to be loaded:
The rookit greatly increases the difficulty of removing the malware from an infected computer, so you are likely to stay infected for longer, and lose more data to the controllers of the Gameover botnet.