Gen.Trojan.Heur.cuWdhw1lg_a0532ca709

by malwarelabrobot on April 13th, 2017 in Malware Descriptions.

Gen:Trojan.Heur.cuW@!dhw1lg (BitDefender), Trojan.Win32.Agent.wfn (v) (VIPRE), Gen:Trojan.Heur.cuW@!dhw1lg (B) (Emsisoft), RDN/Generic PUP.z (McAfee), Trojan.Gen.2 (Symantec), Gen:Trojan.Heur.cuW@!dhw1lg (FSecure), Win32:Patcher-AK [PUP] (Avast), TROJ_GEN.R00UC0EC317 (TrendMicro), Gen:Trojan.Heur.cuW@!dhw1lg (AdAware), HackTool.Win32.DiabloPatcher.FD, PUPDiabloCrack.YR (Lavasoft MAS)
Behaviour: Trojan, HackTool, PUP


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: a0532ca709d7c51d1afefad223927d94
SHA1: 100e6e5cbbb621d408d140c729ff082a8dc69720
SHA256: d046c9c26419fdb9df49fdb4b8da634c83ea7b941df46f9d09a92eb0f0e3562a
SSDeep: 768:pg3Gr4AT8vY5SzUYRc0f759UkaB3KplhQMIYRV7B4C3jV1RI2r:W35A3gc/aplWMNVeMLRI2r
Size: 32768 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Socosokuno
Created at: 2012-12-21 22:59:46
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):

%original file name%.exe:4032

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:4032 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\dup2patcher.dll (54 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\A1D76FF97175BF79025AB7AA1DDF0A2A.dll (7 bytes)

Registry activity

Dropped PE files

MD5 File path
70a3b98d4dcd9c7bf08d228334fbcab4 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\A1D76FF97175BF79025AB7AA1DDF0A2A.dll
47eadbcab61ccc502bd13ce28537c15d c:\Users\"%CurrentUserName%"\AppData\Local\Temp\dup2patcher.dll

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 502 512 3.51015 4c584307e5aa70f515ee8c3d942e5f6c
.rdata 8192 472 512 2.96018 e5aa65265e17d8a1b524adbc10c0a1ad
.data 12288 52 512 0.394392 f8fedf1be1122ff5cd0e5b4716311cc5
.rsrc 16384 29228 29696 5.48822 c78ac12b314676ca0310ed27b6ff202b
.reloc 49152 82 512 0.510189 2e6554ffc943448b686d85ad68f9ec9a

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_4032:

.text
`.rdata
@.data
.rsrc
@.reloc
kernel32.dll
\dup2patcher.dll
".3#*6#'
%D-nz
.Fq<!
d-s}/
Nt%xq7b
version="2.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel

%original file name%.exe_4032_rwx_10001000_0002B000:

HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_DYN_DATA
user32.dll
\bassmod.dll
Exe Files [*.exe]
*.exe
All Files [*.*]
Imagehlp.dll
kernel32.dll
during file attachment export
/setvar <content> : set content of %dup2_cmd_var%
dup2_cmd_var
<>[]|$^!%&/\(){}=?`* -'#.:;,@~"
\regpatch.reg
regedit.exe
\pcre.dll
pcre_exec
.text
`.rdata
@.data
.reloc
AddMsg
dup2patcher.dll
backup_switch_patcherdll.dll
Directory Monitor PRO 2.10.8.0 
*.exe;*.dll
directorymonitor.com
DevEnterprise.Utility.dll
wintrust.dll
DevEnterprise.DirectoryMonitor.Common.dll
DirectoryMonitor.exe
DirectoryMonitorConsole.exe
DirectoryMonitorService.exe
Plugins\DevEnterprise.DirectoryMonitor.Plugin.Enterprise.dll
wintrust32.dll
WINTRUST.DLL
wintrust64.dll
InstallerHelper.exe
ngenfix.bat
set cl=%WinDir%\Microsoft.NET\Framework64\v4.0.30319\ngen.exe uninstall
if not defined ProgramFiles(x86) set cl=%cl:64=%
%cl% Plugins\Deventerprise.DirectoryMonitor.Plugin.Enterprise.dll /nologo
for %%a in (DirectoryMonitor DirectoryMonitorConsole DirectoryMonitorService) do %cl% %%a.exe /nologo
del /f /s /q "%WinDir%\Assembly\DevEnterprise.Utility.ni.dll*"
del /f /s /q "%WinDir%\Assembly\DevEnterprise.DirectoryMonitor.Common.ni.dll*"
ren wintrust64.dll xintrust.dll
del /f /q wintrust32.dll
ren wintrust32.dll xintrust.dll
del /f /q wintrust64.dll
del /f /q wintrust.dll
_startDm.bat
fc /b xintrust.dll wintrust%a%.dll>nul
if errorlevel 1 copy /y wintrust%a%.dll xintrust.dll
if not "%*"=="/NoStart" start DirectoryMonitor.exe
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
ShellExecuteA
ShellExecuteExA
GetKeyState
.rdata
.rsrc
[URL]
filename.exe
hXXp://diablo2oo2.cjb.net
[EXPORT FILE]
...done!
'Can not find the file. Search the file?%File is in use -> using rename methodvCan not access the file. Maybe it's in use...
File Export : Failed
File Export : OK


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\dup2patcher.dll (54 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\A1D76FF97175BF79025AB7AA1DDF0A2A.dll (7 bytes)

  4. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now