Gen.Heur.MSIL.Androm.3_bba21f5311

by malwarelabrobot on July 25th, 2017 in Malware Descriptions.

Trojan.Generic.KDV.83510 (BitDefender), VirTool:Win32/BeeInject (Microsoft), Trojan.Win32.Generic!BT (VIPRE), Trojan.DownLoader1.43187 (DrWeb), Trojan.Generic.KDV.83510 (B) (Emsisoft), Artemis!BBA21F531186 (McAfee), Trojan.Gen (Symantec), Trojan-Dropper.Win32.Injector (Ikarus), Trojan.Generic.KDV.83510 (FSecure), Dropper.Generic2.CEKT (AVG), Win32:Malware-gen (Avast), TROJ_SPNR.03CI11 (TrendMicro), Gen:Heur.MSIL.Androm.3 (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, Worm, VirTool, WormAutorun, Malware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: bba21f5311867e5aa932d4d328526ba0
SHA1: 09ff777d014569989a0cdc5cd2df8ffe73c5e8fa
SHA256: 3281a0ebd4a2851f25af22151035dda7f327b563be184d68861475114f94db86
SSDeep: 3072:uPe/Xd7VkDq8ybW0kyJbMYbb94QwMRbXxPC d:uepHjdfyYbbrwMu
Size: 114688 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2010-12-05 19:20:37
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.

Payload

Behaviour Description
WormAutorun A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.


Process activity

The Trojan creates the following process(es):

%original file name%.exe:2604
%original file name%.exe:3424

The Trojan injects its code into the following process(es):

iexplore.exe:3492

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:2604 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\Program.exe (601 bytes)

The process %original file name%.exe:3424 makes changes in the file system.
The Trojan deletes the following file(s):

Registry activity

The process %original file name%.exe:2604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"program" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\Program.exe"

The process %original file name%.exe:3424 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\LuCi]
"FileNameActual" = "c:\%original file name%.exe"

Dropped PE files

There are no dropped PE files.

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.

VersionInfo

Company Name:
Product Name:
Product Version: 0.0.0.0
Legal Copyright:
Legal Trademarks:
Original Filename: zhlxocgd.exe
Internal Name: zhlxocgd.exe
File Version: 0.0.0.0
File Description:
Comments:
Language: English (United Kingdom)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 8192 94228 98304 5.32927 8736b65c08e334ea7f4d93c8f72ae378
.sdata 106496 97 4096 0.164742 aae1763c27970d2dce8b5573c854173a
.rsrc 114688 680 4096 0.473709 6128c37094b60ed2f3e2647c2d74d147
.reloc 122880 12 4096 0.011373 b52a2bffb0104c7ee8f28a5c66c98fdf

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

iexplore.exe_3492:

.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... )) 
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!
Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}
"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}
\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421

iexplore.exe_3492_rwx_00050000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00090000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_001F0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_004A0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_004E0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00520000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00560000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00670000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_007D0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00810000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00850000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00890000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_008D0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00910000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00950000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00990000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_009D0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00A10000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00A50000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00A90000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00AD0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00B10000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00B50000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00B90000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00BD0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00C10000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_00C50000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01950000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01990000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_019D0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01A10000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01A50000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01A80000_00001000:

user32.dll

iexplore.exe_3492_rwx_01AB0000_00001000:

GetKeyboardType

iexplore.exe_3492_rwx_01AC0000_00001000:

user32.dll

iexplore.exe_3492_rwx_01B00000_00001000:

user32.dll

iexplore.exe_3492_rwx_01B30000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_01B70000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_01BA0000_00001000:

RegOpenKeyExA

iexplore.exe_3492_rwx_01BB0000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_01BE0000_00001000:

RegCloseKey

iexplore.exe_3492_rwx_01BF0000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_01E20000_00001000:

oleaut32.dll

iexplore.exe_3492_rwx_01E60000_00001000:

oleaut32.dll

iexplore.exe_3492_rwx_01EA0000_00001000:

oleaut32.dll

iexplore.exe_3492_rwx_01ED0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01F10000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01F50000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01F90000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_01FD0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02010000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02250000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02280000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_022C0000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02300000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02330000_00001000:

RegOpenKeyExA

iexplore.exe_3492_rwx_02340000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02380000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_023B0000_00001000:

RegCreateKeyA

iexplore.exe_3492_rwx_023C0000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_023F0000_00001000:

RegCloseKey

iexplore.exe_3492_rwx_02400000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02440000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02580000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_025C0000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02600000_00001000:

advapi32.dll

iexplore.exe_3492_rwx_02630000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02670000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_026B0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_026F0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02730000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02770000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_028B0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_028F0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02930000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02970000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_029B0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_029F0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02A30000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02A70000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02AB0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02AF0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02B30000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02B70000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02BB0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02BF0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02C30000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02C70000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02CB0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02CF0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02D30000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02D70000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02DB0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02DF0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02E30000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02E70000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02EB0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02EF0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02F30000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02F70000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02FB0000_00001000:

kernel32.dll

iexplore.exe_3492_rwx_02FE0000_00001000:

user32.dll

iexplore.exe_3492_rwx_03020000_00001000:

user32.dll

iexplore.exe_3492_rwx_03050000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03090000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_032D0000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03310000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03350000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03390000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_033D0000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03410000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03450000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03490000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_034D0000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03510000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03550000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03590000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_035D0000_00001000:

wsock32.dll

iexplore.exe_3492_rwx_03600000_00001000:

shell32.dll

iexplore.exe_3492_rwx_03640000_00001000:

shell32.dll

iexplore.exe_3492_rwx_10410000_00010000:

.idata
.reloc
P.rsrc
kernel32.dll
Windows NT 4.0
Windows 2000
Windows XP
Windows Server 2003
Windows Vista
Windows 7
Windows 95
Windows 98
Windows Me
udprec
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
TSqliteDatabase
TSqliteQueryResultsU
sqlite3_open
sqlite3_errmsg
sqlite3_free
sqlite3_close
sqlite3_last_insert_rowid
sqlite3_total_changes
sqlite3_errcode
sqlite3_bind_text
sqlite3_bind_int
sqlite3_bind_int64
sqlite3_bind_double
sqlite3_bind_null
sqlite3_bind_blob
sqlite3_prepare_v2
sqlite3_step
sqlite3_reset
sqlite3_finalize
sqlite3_prepare
sqlite3_busy_timeout
sqlite3_libversion
sqlite3_bind_parameter_index
sqlite3_changes
sqlite3_column_count
sqlite3_column_name
sqlite3_column_type
sqlite3_column_int64
sqlite3_column_double
sqlite3_column_bytes
sqlite3_column_blob
sqlite3_column_text
Error: %s%s%s
:\autorun.inf
icon=%SystemRoot%\system32\SHELL32.dll,4
\Mozilla Firefox\
nss3.dll
mozcrt19.dll
sqlite3.dll
nspr4.dll
plc4.dll
plds4.dll
nssutil3.dll
softokn3.dll
PK11_GetInternalKeySlot
userenv.dll
\Mozilla\Firefox\
profiles.ini
\signons3.txt
\Mozilla\Firefox\profiles.ini
signons.sqlite
SELECT * FROM moz_logins
Urlmon.dll
Shell32.dll
URLDownloadToFileA
ShellExecuteA
UDPStart||*||
SOFTWARE\Mozilla\Mozilla Firefox\CurrentVersion
WEBDL
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
oleaut32.dll
RegCreateKeyA
wsock32.dll
shell32.dll
sqlite3dll
KWindows
UrlMon
sqlite3


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:2604
    %original file name%.exe:3424

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\Users\"%CurrentUserName%"\AppData\Roaming\Program.exe (601 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "program" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\Program.exe"

  5. Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now