Sample_5781520721
not-a-virus:HEUR:AdWare.Win32.DLBoost.gen (Kaspersky)
Behaviour: Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 57815207214f07d44abd4be12ccbf7fc
SHA1: 1c4ed54cc562fb6fdab9936249b1c2942c0feb0f
SHA256: 6028e82a483fe8f207dbc9f21f2734f5200c9732b24d1fe5cd30583ef74a0e62
SSDeep: 98304:y7TMRcdGYRKAWuVMdJg1g6rmNyEoJrLjgEoJrLjD:0GYyDJ6rmNvKL5KLD
Size: 4638720 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6, BorlandDelphi30, MicrosoftWindowsShortcutfile
Company: Xacti, LLC
Created at: 1992-06-20 01:22:17
Analyzed on: Windows7 SP1 32-bit
Summary:
Adware. Delivers advertising content in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions. Users may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program or are frustrated by its effects on system performance.
Payload
No specific payload has been found.
Process activity
The PUP creates the following process(es):
%original file name%.exe:3720
The PUP injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
No files have been created.
Registry activity
The process %original file name%.exe:3720 makes changes in the system registry.
The PUP creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"processname" = "iexplore.exe"
"WindowClassName" = "DDEMLMom"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name:
Product Name: Setup
Product Version: 1.1.1.0
Legal Copyright:
Legal Trademarks:
Original Filename: Setup
Internal Name: Setup
File Version: 1.1.1.0
File Description: Setup
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| CODE | 4096 | 1501556 | 1501696 | 4.54604 | e4d277503ca02d2ce1c1ef0dd2b43756 |
| DATA | 1507328 | 838912 | 839168 | 5.28478 | ccf439029253ff554fda63bd00a00404 |
| BSS | 2347008 | 53681 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .idata | 2404352 | 13912 | 14336 | 3.47757 | b6e733e5b0b9eede2ad74f74b70e0f3d |
| .tls | 2420736 | 48 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rdata | 2424832 | 24 | 512 | 0.121666 | f7049307e739e6431f4f028ac12889e3 |
| .reloc | 2428928 | 120756 | 120832 | 4.69818 | f50ff7a247a4716fcac68d4f8ac0c9d5 |
| .rsrc | 2551808 | 2158825 | 2159104 | 5.39635 | b4d3701d0f4c44fd86ec3ee8ad0e8473 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 29
172f499a9d59267e0b669dc834ed322e
fc33c11cf14cc5988e4988d083b56936
f592191a0ba93b44f9415d525e833904
db169aa90d5b6d37a64113d72926c573
8bbd82722a4ea2957cfcb268b9950857
89dde78908fb76b8948da35b87960c13
85110b239b695ae0c36a123faa0f7b05
7c2a4dcd2e92b51ae0a417cf34435f76
70844c5fd38cf6a8abf0daa23731bdd9
6d26a54b67c826df1468e4e2aa1d0b61
5ffbd9da32937e9b62ec9717debe95f5
4a20c28cfdb8585e7795166b6864630b
2fca89897dfbfa9cf84c0552ef1a14ab
2336ac70ecb5a3b6b3d58a4490f46437
fda3e27dd40bad145b750416f035c284
cb565be03b55b52e1f17bee9ac16ea36
c02c422752aa38c27f73fd3df341aba4
9396aa54065e91a52ea092b56fdaac88
5055b90dff09044bcc0c4b67064dfba1
11cfdd88b4c9d3d058c811de5c4a7873
e7812911d533607ac52e8023280957f1
e2f3d1f1de66e5b1a1ac0902c6a1d6c7
b510544691048fc229c809ff3c14711a
a02969f03c16f6658a3b8b31f49ba428
7e26cbbdeb4d2181513420e84b515700
55d8e2df40d88504459a4c348d65acb6
URLs
| URL | IP |
|---|---|
| ic-dc.deliverydlcenter.com | |
| speed-new.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
The PUP connects to the servers at the folowing location(s):
.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... ))
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421
iexplore.exe_348:
.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... ))
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:3720
- Delete the original PUP file.
- Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.