d2e24t2jgcnor2.webhostoid.comin the browser's address bar. When I retyped the correct address, the page I wanted appeared. I tried mistyping a few other domain names and putting in some site names I knew were bogus since the domains had never been registered. Every time I did that I saw a reference to the webhostoid system appear in the address bar. E.g., I tried http://slowfood123.com and saw the following address appear in the address bar:
And the error message below was displayed:
It appears the website you are trying to visit is having technical difficulties or is no longer available.
Please go back and try your request again or try searching Google to find another website with what you're looking for!
I suspected some software on the system was now redirecting web traffic to the webhostoid.com site. When I checked the proxy server settings in Internet Explorer - see Checking Microsoft Windows proxy server settings - I found the system was now configured to route all HTTP and HTTPS traffic to a proxy server listening on the system local loopback address , i.e., 127.0.0.1, on port 55833. I.e., traffic to websites from the system was now being routed through proxy server software running on the system itself that had been installed on the system without my permission. Note: the port this malware uses for the proxy server it installs will vary; when I later rebooted the system I found the registry entry it uses to specify the proxy server port had been changed to 64696.
You can check the port the Genius Box malware is using for its proxy
server setting from a command with a
reg query command.
C:\>reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings ProxyServer REG_SZ http=127.0.0.1:64696;https=127.0.0.1:64696
Since I had not knowingly granted any software the right to set itself up as a proxy server on the system, I blocked the system's access to the Internet at the firewall and began investigating this unwanted and suspicous alteration to the system's configuration.
After blocking access to the Internet by the system, I tried accessing another website through a browser on the system and saw the following:
[GeniusBox] The socket connection to d2e24t2jgcnor2.webhostoid.com failed.
A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond 184.108.40.206:80
I blocked access to the Internet by the system, but left its access to the DNS server on the LAN in place, so it could look up IP addresses for domain names, but couldn't access systems outside of the LAN.
Later, when I checked the IP address of the webhostoid host with nslookup, I saw the IP address below:
Checking both the 220.127.116.11 and 18.104.22.168 through the American Registry for Internet Numbers website, I found the IP addresses had been assigned to Amazon Technologies, so webhostoid appeared to be using Amazon Web Services .
Microsoft Windows systems store the IP address for a proxy server Windows has
been configured to use in the Windows Registry under
If you check the value for
ProxyServer there, you will see
the IP address and port number being used for a proxy server, if one is being
used. I wanted to know when that registry value had last been modified. The
regedit tool doesn't display the time stamp for when a
registry value was last modified, so I searched for
with RegScanner, a
free tool from NirSoft.
It indicated that the
ProxyServer value had been set under
HKEY_USERS\S-1-5-21-3084690208-3888753220-1328190815-1115\Software\Microsoft\Windows\CurrentVersion\Internet Settings at 5:04:35 PM on January
4, 2015. The Security Identifier (SID) under
the id beginning with "S-1-5-21" was the SID for the currently logged on user.
I track the registry and file changes to a system when I install software
with Total Uninstall, so I examined its
log of the changes made when I installed Vuze
Bittorrent Client, which had been on the list of software my wife wanted
installed on the system, since Total Uninstall indicated the installation
of that program had completed at 5:06 PM on January 4, 2015, i.e., when
the installation of Vuze was completed and I indicated to Total Uninstall that
it should report on the changes, it had completed its assessment less than two
minutes after the proxy server value had been set in the registry. The Total
Uninstall report showed a
GeniusBox directory was created during
the installation of Vuze with a
settings.config file being created
in the GeniusBox directory at 5:04 PM. The contents of that directory are
C:\>dir /ad %USERPROFILE%\AppData\Local | find /i "GeniusBox" 01/04/2015 05:04 PM <DIR> GeniusBox C:\>dir /s %USERPROFILE%\AppData\Local\Genius Box Volume in drive C has no label. Volume Serial Number is 5C60-1B61 Directory of C:\Users\JDoe\AppData\Local\GeniusBox 01/04/2015 05:04 PM <DIR> . 01/04/2015 05:04 PM <DIR> .. 12/18/2014 03:43 PM 8,704 certmanager.exe 12/29/2014 03:11 PM 872,672 Client.exe 12/18/2014 03:43 PM 55,632 makecert.exe 01/04/2015 05:04 PM <DIR> Resources 01/04/2015 05:04 PM 115 settings.config 12/29/2014 03:11 PM 18,656 Tasks.exe 01/04/2015 05:04 PM 913 TrustedRoot.cer 12/29/2014 03:11 PM 761,056 Uninstall.exe 12/29/2014 03:11 PM 750,304 Updater.exe 8 File(s) 2,468,052 bytes Directory of C:\Users\JDoe\AppData\Local\GeniusBox\Resources 01/04/2015 05:04 PM <DIR> . 01/04/2015 05:04 PM <DIR> .. 12/18/2014 03:43 PM 90,112 certutil.exe 12/18/2014 03:43 PM 208,896 libnspr4.dll 12/18/2014 03:43 PM 28,672 libplc4.dll 12/18/2014 03:43 PM 24,576 libplds4.dll 12/18/2014 03:43 PM 364,544 nss3.dll 12/18/2014 03:43 PM 106,496 smime3.dll 12/18/2014 03:43 PM 372,736 softokn3.dll 7 File(s) 1,196,032 bytes Total Files Listed: 15 File(s) 3,664,084 bytes 5 Dir(s) 3,916,020,883,456 bytes free
%USERPROFILE% environment variable points to the current user's
profile directory, usually
Username is the account name for the user.
The presence of files named
ominous, since at this point it appeared this "GeniusBox" software configured
the system so it could monitor HTTPS, i.e., the encrypted web traffic, as well
as the unencrypted HTTP traffic. Their presence made me wonder if this
dangerous digital ordure had positioned itself for a
man-in-the-middle attack by putting a
security certificate on the system that would allow it to decrypt and eavesdrop
on HTTPS traffic giving it access to login ids and passwords to otherwise secure
sites, with the potential to steal banking credentials, credit card numbers, as
well as other sensitive information. See
Viewing the Trusted
Root certificates on a Windows system for instructions on how to
view the trusted root
certificates on a Microsoft Windows system and for further information
on the trusted root certificate installed by the GeniusBox malware.
I right-clicked on the TrustedRoot.cer file in the GeniusBox directory and chose "Open", which on a Microsoft Windows system will provide details on the certificate. I saw the following:
The details under the General tab were as follows:
|Valid from||12/28/2014 to 12/27/2025|
When I clicked on the Certification Path tab, the only entry I saw under "Certification path" was DO_NOT_TRUST_FiddlerRoot
The starting date for the "Valid from" date range was December 28, 2014.
All of the files in the
directory had a date stamp of December 18, 2014 and many of the files
%USERPROFILE%\AppData\Local\GeniusBox directory had
a date of December 29, 2014, making the starting date on the certificate
consistent with the installation of this malware during the installation
It appears the Genius Box adware may have used the Microsoft
Makecert.exe (Certificate Creation Tool), since when I right-clicked
makecert.exe program in the GeniusBox directory and
chose Properties, and then clicked on the Details
tab, I saw Microsoft Corporation listed as the value for
"Copyright" - see Makecert.exe Properties
I didn't see Microsoft Corporation listed when I checked the properties
certmanager.exe file (see
image) in the GeniusBox directory.
Microsoft's command line tool is
Certmgr.exe (Certificate Manager Tool). There was no copyright information
Client.exe, either. When I checked the digital
signature on the file - see
Checking the digital signature for a file under Microsoft Windows - I found
it was signed by JoltLogic, a known adware purveyor.
When I checked the Details tab under Properties
Tasks.exe, I saw "Copright © 2014", but no
company or invidual was identified. Checking its digital signature, I fond
it was also signed by JoltLogic.
C:\Users\JDoe\AppData\Local\GeniusBox>powershell Windows PowerShell Copyright (C) 2014 Microsoft Corporation. All rights reserved. PS C:\Users\JDoe\AppData\Local\GeniusBox> Get-AuthenticodeSignature Tasks.exe | Format-List SignerCertificate : [Subject] CN=Joltlogic, O=Joltlogic, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US [Issuer] CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB [Serial Number] 5EE011413A702F6705B25B34B674F3AB [Not Before] 7/15/2014 8:00:00 PM [Not After] 7/16/2015 7:59:59 PM [Thumbprint] 16CE9D5ADE81FCA57EF3F545F631DFD7B6D6C01E TimeStamperCertificate : Status : Valid StatusMessage : Signature verified. Path : C:\Users\JDoe\AppData\Local\GeniusBox\Tasks.exe PS C:\Users\Thorlack\AppData\Local\GeniusBox> exit
Looking for text strings within it using the Sysinternals strings program, I saw the following included within it as well as others:
in the GeniusBox subdirectory
Resources has copyright information
for Netscape Communications
a company responsible for an early browser, Netscape Navigator, which released
its source code and created the
, which now produces the free and open-source browser Firefox. All of
the other DLL files in
GeniusBox\Resources directory display Netscape Communications
copyright information when the properties information is viewed.
certutil.exe program in the
directory has no identifying copyright information nor is it digitally signed.
It uses the .dll files in the directory as can be seen by checking it with
strings utility. You can see the arguments
it takes by running it from a command prompt with no arguments.
The certificate the adware inserted into the root certificates list refers to Fiddler. The Fiddler proxy server application was created by Eric Lawrence, who was formerly a Program Manager on the Internet Explorer development team at Microsoft. Fiddler can capture both HTTP and HTTPS traffic and log it for later examination by utilizing a man-in-the-middle system using a self-signed certificate. From its position in the middle of a web browser and a web server, Fiddler can also modify, or "fiddle" with the traffic, if you will, from one system to another without either of the end parties being aware that Fiddler has modified traffic from or to them. Further information on the tool is also available at Decrypting HTTPS-protected traffic. The FAQ on that site notes in regards to the decryption of HTTPS:
Q: The HTTPS protocol was designed to prevent traffic viewing and tampering. Given that, how can Fiddler2 debug HTTPS traffic?
A: Fiddler2 relies on a "man-in-the-middle" approach to HTTPS interception. To your web browser, Fiddler2 claims to be the secure web server, and to the web server, Fiddler2 mimics the web browser. In order to pretend to be the web server, Fiddler2 dynamically generates a HTTPS certificate.
At the Decrypting HTTPS-protected traffic page, you can see that Fiddler generates a certificate with the Certificate Authority (CA) listed as "DO_NOT_TRUST_FiddlerRoot".
Fiddler was subsequently acquired by another company, Telerik, a Bulgarian company which offers software tools for application development. The software can be downloaded for free from the company's website at Fiddler free web debugging proxy.
The "Key Features" section of the company's page for Fiddler notes that the software can "easily manipulate and edit web sessions", "decrypt HTTPS traffic and display and modify requests using a man-in-the-middle decryption technique", and "Fiddler is a free web debugging proxy which logs all HTTP(s) traffic between your computer and the Internet."
The Fiddler software has legitimate traffic analysis and debugging uses, but in this case, Genius Box appears to be using a similar technique for nefarious purposes. Using RegScanner to search through the Windows registry for references to Fiddler, I found the following:
|Data||"C:\Users\JDoe\AppData\Local\GeniusBox\Resources\certutil.exe" -A -n "DO_NOT_TRUST_FiddlerRoot" -t "TCu,TCu,TCu" -i "C:\Users\JDoe\AppData\Local\GeniusBox\TrustedRoot.cer" -d "C:\Users\JDoe\AppData\Roaming\Mozilla\Firefox\Profiles\l7fnkeja.default"|
|Key Modified Time||1/4/2015 5:04:35 PM|
Though the GeniusBox software may only be generating a similar root certificate as the one used by Fiddler, but not actually incorporating Fiddler code, the GeniusBox software does seem to be using a similar technique. It seems clear to me at this point that this adware/spyware has completely nullified any chance for security on the system on which Vuze and it were installed when the account under which Vuze was installed is used on the system for visiting websites, even ones that might otherwise be secure by the use of HTTPS to encrypt traffic between the client browser and the web server, since this software can intercept all traffic and could provide its own credentials to the brower in place of any from any site visited, even a banking site. It could intercept any userids, passwords, credit card numbers, etc. and could do with those whatever the developers of the software might choose to do with the information now accessible to them through giving their software man-in-the-middle attack capabilities.
I found that the software only runs when a login is made to the account under which Vuze, and thus the Genius Box software, was installed. But, if that account had more than standard user account access to the system, I would still be concerned about the safety of other accounts on the system, though I didn't see the proxy server not the assoicated Genius Box tasks in the Task Scheduler running.
Other system changes I noted from the installation of the Genius Box software include the creation of three scheduled tasks, which run when a logon occurs for the account under which the Vuze software is installed. When this adware is installed it creates scheduled tasks for itself in the Windows Task Scheduler. You can search on Schedule Tasks in Windows to locate and run the Task Scheduler. In the Task Scheduler Library, you will see a task named "GeniusBox". The security options for the task include "Run when user is logged on" and "Run with highest privileges". If you click on the Triggers tab, you will see a one time setting reflecting the day and time the adware was installed and then a scheduled rerunning of the software periodically after that as well as a trigger to run it "At log on of any user". E.g., on the infected system I checked, I saw the following in the "Details" field for the "One time" trigger (image):
At 5:04 PM on 1/4/2015 - After triggered, repeat every 06:00:00 indefinitely."
Under the Actions tab, I saw "Start a progam" listed as the action with the following under the Details tab:
cmd.exe /C start "" "C:\Users\JDoe\AppData\Local\GeniusBox\client.exe"
You can click on the History tab to see the history of the activation of the scheduled task.
Since this malware was installed, I've seen "Tasks has stopped working" windows appear (image), which I suspect may be the GeniusBox tasks.exe program crashing, perhaps because I've blocked any access from the system to the Internet.
Another scheduled task named "Check Updates" is also created by the
installation of GeniusBox (image)
It is also configured to "Run ony when user is logged on" and to "Run with
highest privileges". The triggers are the same as for the GeniusBox scheduled
task. The actions specified for it are to run the
tasks.exe files in the GeniusBox directory.
A third scheduled task created by the GeniusBox software is
(image). The triggrs are
exactly the same as the other two tasks with the task scheduled to run
indefinitely. The actions are to run the
uninstall.exe programs in the GeniusBox directory.
You can uninstall the Genius Box software by going to Uninstall a program from the Programs section of the Control Panel. The entry for the software is named "GeniusBox 2.0"; the publisher is also listed as "GeniusBox 2.0". When I double-clicked on it, a GeniusBox Uninstall window opened.
When I clicked on Continue in that window, I saw
an "Uninstall complete" window shortly afterwards. When I checked
the registry afterwards, I saw the
ProxyServer value had
been removed from
ProxyEnable was reset to 0
(image). I also saw the three scheduled
tasks were removed. It also removed the registry key under
\Software\Microsoft\FiddlerCore it had created at
the installation of the software. It also deleted all files it had created in
AppData\Local directory. Checking the entries listed
under the Logon tab with the Sysinternals
Autoruns utility, a program which shows which programs will run when
the system boots or a user logs into the system, I found that the
GeniusBox uninstall process had not removed
registry key, which had a value of
"C:\Users\JDoe\AppData\Local\GeniusBox\Resources\certutil.exe" -A -n "DO_NOT_TRUST_FiddlerRoot" -t "TCu,TCu,TCu" -i "C:\Users\JDoe\AppData\Local\GeniusBox\TrustedRoot.cer" -d "C:\Users\JDoe\AppData\Roaming\Mozilla\Firefox\Profiles\l7fnkeja.default",
though. I manually deleted that entry from the registry using regedit by
right-clicking on it and choosing "delete". So GeniusBox does actually remove
itself itself and does a fairly good job of cleaning up after itself when
removed. But given the means it used to convey ads, by use of a proxy server
and the installation of its own security certificate into the root certificates
list, anyone with a system on which the software was installed appears to be at
the mercy of the JoltLogic developer(s), since their software appears to grant
them the capability to spy on all web traffic from the system when the account
under which it was installed is used. Do they only use the software to display
ads? Perhaps, but given that they appear to have the capability to engage in
much more nefarious activities would you want to make yourself so vulnerable by
allowing their software the capapbility to snoop on all web traffic for the
affected account on a system?
I am aware that some free software comes bundled with additional software from other companies/developers, sometimes adware like the GeniusBox software. When I install software, I always pick the "advanced" or "custom" install options when they are available to give me the chance to opt out of bundled software I don't want, avoid shortcuts being created on the desktop, and select the installation directory. I believed I had opted out of all of the bundled software that came with Vuze in this case. Perhaps I thought I had declined the installation of this bundled adware, but had failed to do so. Perhaps I hit Enter thinking I had declined it - see Avoiding the installation of adware when installing Vuze - when the window appears regarding the installation of GeniusBox during a custom installation. I'm willing to accept that as the explanation, but at this point I must conclude that one must be very careful when installing Vuze to avoid its bundled adware.
I certainly understand the need to cover development costs for software, but the fact that Vuze bundled the GeniusBox software with their software and the manner in which the GeniusBox software operates does not give me confidence that the Vuze software can be regarded as safe, unless care is taken by users when installing it to avoid its bundled adware. I feel the developers/publishers of Vuze must be regarded with some wariness, since they seem to have little regard for the privacy and security of the users of their product when they bundle such other software with their own. I.e., are they unaware of how this bundled software achieves its ends, or did they simply not even check on how it operates, or did they simply not care?
Created: Monday January 19, 2015