Gen.Variant.Barys.56335_f09eaf98a7
Trojan.GenericKD.4838176 (BitDefender), Trojan-Dropper.Win32.Sysn.cenj (Kaspersky), Trojan.Win32.Generic!BT (VIPRE), Trojan.Baidu.1871 (DrWeb), Trojan.GenericKD.4838176 (B) (Emsisoft), Artemis!F09EAF98A70C (McAfee), SecurityRisk.gen1 (Symantec), Trojan.GenericKD.4838176 (FSecure), Generic38.BIRH (AVG), Win32:Malware-gen (Avast), Gen:Variant.Barys.56335 (AdAware), Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: f09eaf98a70ce17f490d7f38c3fea3ca
SHA1: 13c1a78ae7b91aee13ddcedd2f20169f74f17c13
SHA256: aaf69cdef8acc6487d416a9458462442d40bf83107254d6aaaba21f78d76878a
SSDeep: 12288:7XwOrReFWQFdeh4GSezhMCD/QplmW7NTXX1hb2lM6Vsj:7XwOrRshgjQCE3z1hmfVS
Size: 458915 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company: no certificate found
Created at: 2012-12-31 02:38:51
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1024
setup.exe:1692
Bind.exe:3776
uc.exe:3144
setup.tmp:3172
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1024 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\7ZipSfx.000\setup.exe (788 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\7ZipSfx.000\setup.exe (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\7ZipSfx.000 (0 bytes)
The process setup.exe:1692 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-0606L.tmp\setup.tmp (1423 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-0606L.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-0606L.tmp\setup.tmp (0 bytes)
The process Bind.exe:3776 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Browser_V6.0.1471.913_f_4730_(Build1702151518).exe (926095 bytes)
The process setup.tmp:3172 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-UIGE9.tmp\_isetup\_shfoldr.dll (47 bytes)
%Program Files%\lll\Bind.exe (49 bytes)
%Program Files%\lll\is-SN6NI.tmp (23961 bytes)
%Program Files%\lll\unins000.dat (1376 bytes)
%Program Files%\lll\yyy.ini (25 bytes)
%Program Files%\lll\is-KLOJP.tmp (49 bytes)
%Program Files%\lll\is-CHKF7.tmp (673 bytes)
%Program Files%\lll\uc.exe (147 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-UIGE9.tmp\_isetup\_shfoldr.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-UIGE9.tmp\_isetup (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-UIGE9.tmp (0 bytes)
Registry activity
The process %original file name%.exe:1024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process Bind.exe:3776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3E 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\Bind_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\Bind_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"ConsoleTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\Bind_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\Bind_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\Bind_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\Bind_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
The process uc.exe:3144 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"svchost0" = "%Program Files%\lll\uc.exe"
The process setup.tmp:3172 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\RestartManager\Session0000]
"Sequence" = "1"
"RegFilesHash" = "2C 4C 49 ED 65 8F 74 92 99 64 09 F3 4F 5F 31 52"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\RestartManager\Session0000]
"RegFiles0000" = "%Program Files%\lll\uc.exe, %Program Files%\lll\Bind.exe"
"SessionHash" = "F5 30 93 F5 7E 25 C3 7D 7F E4 F0 4C 99 25 86 31"
"Owner" = "64 0C 00 00 C4 47 1E FB D4 BB D2 01"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
The Trojan deletes the following registry key(s):
[HKCU\Software\Microsoft\RestartManager\Session0000]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\RestartManager\Session0000]
"RegFilesHash"
"Sequence"
"RegFiles0000"
"SessionHash"
"Owner"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
Dropped PE files
| MD5 | File path |
|---|---|
| 86b7f4a91af28ca519e1de52916cf688 | c:\Program Files\lll\Bind.exe |
| 08200a6b207e50a87375dc7c82908d06 | c:\Program Files\lll\uc.exe |
| 14023e92a84f8a82c10a6a1d6b1182be | c:\Program Files\lll\unins000.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Oleg N. Scherbakov
Product Name: 7-Zip SFX
Product Version: 1.6.0.2712
Legal Copyright: Copyright (c) 2005-2012 Oleg N. Scherbakov
Legal Trademarks:
Original Filename: 7ZSfxMod_x86.exe
Internal Name: 7ZSfxMod
File Version: 1.6.0.2712
File Description: 7z Setup SFX (x86)
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 101854 | 101888 | 4.62608 | 0c04e49d78a3c453186c916e6f29540d |
| .rdata | 106496 | 15306 | 15360 | 3.96022 | 1eff757b36a6b7a599236ac8b1b35b4d |
| .data | 122880 | 19948 | 2560 | 3.08518 | 21d5c7a8ba54658b1e07909bf1045c79 |
| .rsrc | 143360 | 6124 | 6144 | 2.44721 | 8a4ce16b05b7e5db4cc67ec2b030ef27 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 7
712fe060095354d46e56453a9e89361a
53aab8f119044b5d5acf11b1e9e1a752
b6531269133af53933634722c54f1018
c59ec9aa2900d0444e445184b567cb8f
f7ee0c604322fd2ecde860d9e255e401
018dc6096ab70a223715be23a7529094
b74229149dee4708eeb55641b246cf2c
URLs
| URL | IP |
|---|---|
| hxxp://www.guoneizhu.com/uc222.txt | |
| hxxp://www.guoneizhu.com/Browser_V6.0.1471.913_f_4730_(Build1702151518).exe |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY PE EXE or DLL Windows file download HTTP
ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
Traffic
GET /uc222.txt HTTP/1.1
Accept: */*
Accept-Language: zh-cn
User-Agent: wget
Host: VVV.guoneizhu.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Tue, 18 Apr 2017 07:17:26 GMT
Accept-Ranges: bytes
ETag: "c4fde1d413b8d21:0"
Server: Microsoft-IIS/10.0
Date: Sun, 23 Apr 2017 01:55:58 GMT
Content-Length: 362hXXp://VVV.guoneizhu.com/Browser_V6.0.1471.913_f_4730_(Build1702151518
).exe Browser_V6.0.1471.913_f_4730_(Build1702151518).exe..hXXp://VVV.g
uoneizhu.com/FlowSpritSetup_slnt_5016.exe FlowSpritSetup_slnt_5016.exe
..hXXp://VVV.guoneizhu.com/PSoft_4010_1.0.0.104_Setup.exe PSoft_4010_1
.0.0.104_Setup.exe..hXXp://VVV.guoneizhu.com/MagicDiskSetup.exe MagicD
iskSetup.exe....
GET /Browser_V6.0.1471.913_f_4730_(Build1702151518).exe HTTP/1.1
Accept: */*
Accept-Language: zh-cn
User-Agent: wget
Host: VVV.guoneizhu.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Tue, 21 Feb 2017 14:09:35 GMT
Accept-Ranges: bytes
ETag: "e7c03c214c8cd21:0"
Server: Microsoft-IIS/10.0
Date: Sun, 23 Apr 2017 01:55:58 GMT
Content-Length: 51185040MZ......................@...................................H.........
..!..L.!This program cannot be run in DOS mode....$.......]....o...o..
.o....]..o...._..o....^.;o...6...o....k..o..w4...o..w4..Xo..w4..[o....
X..o..w2...o....C.>o...o...m...4..Xo...4...o...4..]o...4...o...4S..
o...o;..o...4...o..Rich.o..........................PE..L...Y..X.......
.............................. ....@..........................`......
'..................................Y.......T.......h................3.
......n..@...T...............................@........................
....................text...I........................... ..`.data...<
;e... ......................@....idata...,...........&..............@.
.@.gfids..(............T..............@..@.tls.................X......
........@....rsrc...h............Z..............@..@.reloc...n.......p
...b..............@..B................................................
......................................................................
....................................................A.......J...A...A.
..A...A...A...A...A...A...A...A...A...A.3.A.'.A.?.A.Z.A.u.A...A...A.p.
A...........J...J...J.)JK.mhL...L.o.L......... .E...........L...L..KK.
................{.6.5.1.2.2.C.B.0.-.E.A.0.F.-.4.7.D.F.-.A.9.5.3.-.0.1.
7.1.7.0.E.D.1.2.F.9.}.....{.4.e.a.1.6.a.c.7.-.f.d.5.a.-.4.7.c.3.-.8.7.
5.b.-.d.b.f.4.a.2.0.0.8.c.2.0.}.....{.8.B.A.9.8.6.D.A.-.5.1.0.0.-.4.0.
5.E.-.A.A.3.5.-.8.6.F.3.4.A.0.2.A.C.B.F.}.....{.4.D.C.8.B.4.C.A.-.1.B.
D.A.-.4.8.3.e.-.B.5.F.A.-.D.3.C.1.2.E.1.5.B.6.2.D.}.......E.-.-.c.<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
__MSVCRT_HEAP_SELECT
user32.dll
KERNEL32.dll
USER32.dll
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyW
RegOpenKeyW
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
COMCTL32.dll
GetCPInfo
%s\*.*
%s\%s
@.reloc
GetProcessWindowStation
"%/28;=#$019:>?
mgM
zcÁ
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
1 1@1`1|1
8 8$80848
%Program Files%\lll\uc.exe
<assemblyIdentity version="9.4.3.2"
<requestedExecutionLevel
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\2345Explorer
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\2345Explorer
%USERPROFILE%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\2345
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
\aa.lnk
Chrome_WidgetWin_1
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\
C:\Users\Public\Desktop\
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{96F04C1B-E352-4A90-BED4-11A0FA968BC1}_is1%s\Internet Explorer\iexplore.exe
http\shell\open\command
qqbrowser.exe
Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
%USERPROFILE%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\UC
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\UCBrowser
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\UCBrowser
%s\UCBrowser.exe
mscoree.dll
@KERNEL32.DLL
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
WUSER32.DLL
index.dat
%Program Files% (x86)\UCBrowser\Application\UCBrowser.exe
%Program Files% (x86)\2345Soft\2345Explorer\2345Explorer.exe
%Program Files% (x86)\KuaiZip\X86\KuaiZip.exe
%Program Files% (x86)\IQIYI Video\LStyle\5.3.21.2676\QyClient.exe
%Program Files% (x86)\LuDaShi\ComputerZ_CN.exe
%Program Files% (x86)\YouKu\YoukuClient\YoukuDesktop.exe
InstallerSuccessLaunchCmdLine
Software\Microsoft\Windows\CurrentVersion\Run
\UUC0789.exe
Bind.exe_3776:
.text
`.rdata
@.data
.rsrc
__MSVCRT_HEAP_SELECT
user32.dll
KERNEL32.dll
USER32.dll
ShellExecuteA
SHELL32.dll
HttpQueryInfoA
InternetOpenUrlA
WININET.dll
GetCPInfo
GET%sHTTP/1.1
Range: bytes=%d-
%Program Files%\lll\Bind.exe
1, 0, 0, 1
Bind.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1024
setup.exe:1692
Bind.exe:3776
uc.exe:3144
setup.tmp:3172 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\7ZipSfx.000\setup.exe (788 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-0606L.tmp\setup.tmp (1423 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Browser_V6.0.1471.913_f_4730_(Build1702151518).exe (926095 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-UIGE9.tmp\_isetup\_shfoldr.dll (47 bytes)
%Program Files%\lll\Bind.exe (49 bytes)
%Program Files%\lll\is-SN6NI.tmp (23961 bytes)
%Program Files%\lll\unins000.dat (1376 bytes)
%Program Files%\lll\yyy.ini (25 bytes)
%Program Files%\lll\is-KLOJP.tmp (49 bytes)
%Program Files%\lll\is-CHKF7.tmp (673 bytes)
%Program Files%\lll\uc.exe (147 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"svchost0" = "%Program Files%\lll\uc.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.