Sample_5781520721

not-a-virus:HEUR:AdWare.Win32.DLBoost.gen (Kaspersky) Behaviour: Adware The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurat...
Blog rating:2 out of5 with1 ratings

Sample_5781520721

by malwarelabrobot on August 28th, 2017 in Malware Descriptions.

not-a-virus:HEUR:AdWare.Win32.DLBoost.gen (Kaspersky)
Behaviour: Adware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 57815207214f07d44abd4be12ccbf7fc
SHA1: 1c4ed54cc562fb6fdab9936249b1c2942c0feb0f
SHA256: 6028e82a483fe8f207dbc9f21f2734f5200c9732b24d1fe5cd30583ef74a0e62
SSDeep: 98304:y7TMRcdGYRKAWuVMdJg1g6rmNyEoJrLjgEoJrLjD:0GYyDJ6rmNvKL5KLD
Size: 4638720 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6, BorlandDelphi30, MicrosoftWindowsShortcutfile
Company: Xacti, LLC
Created at: 1992-06-20 01:22:17
Analyzed on: Windows7 SP1 32-bit


Summary:

Adware. Delivers advertising content in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions. Users may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program or are frustrated by its effects on system performance.

Payload

No specific payload has been found.

Process activity

The PUP creates the following process(es):

%original file name%.exe:3720

The PUP injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

No files have been created.

Registry activity

The process %original file name%.exe:3720 makes changes in the system registry.
The PUP creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"processname" = "iexplore.exe"
"WindowClassName" = "DDEMLMom"

Dropped PE files

There are no dropped PE files.

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name:
Product Name: Setup
Product Version: 1.1.1.0
Legal Copyright:
Legal Trademarks:
Original Filename: Setup
Internal Name: Setup
File Version: 1.1.1.0
File Description: Setup
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
CODE 4096 1501556 1501696 4.54604 e4d277503ca02d2ce1c1ef0dd2b43756
DATA 1507328 838912 839168 5.28478 ccf439029253ff554fda63bd00a00404
BSS 2347008 53681 0 0 d41d8cd98f00b204e9800998ecf8427e
.idata 2404352 13912 14336 3.47757 b6e733e5b0b9eede2ad74f74b70e0f3d
.tls 2420736 48 0 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 2424832 24 512 0.121666 f7049307e739e6431f4f028ac12889e3
.reloc 2428928 120756 120832 4.69818 f50ff7a247a4716fcac68d4f8ac0c9d5
.rsrc 2551808 2158825 2159104 5.39635 b4d3701d0f4c44fd86ec3ee8ad0e8473

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 29
172f499a9d59267e0b669dc834ed322e
fc33c11cf14cc5988e4988d083b56936
f592191a0ba93b44f9415d525e833904
db169aa90d5b6d37a64113d72926c573
8bbd82722a4ea2957cfcb268b9950857
89dde78908fb76b8948da35b87960c13
85110b239b695ae0c36a123faa0f7b05
7c2a4dcd2e92b51ae0a417cf34435f76
70844c5fd38cf6a8abf0daa23731bdd9
6d26a54b67c826df1468e4e2aa1d0b61
5ffbd9da32937e9b62ec9717debe95f5
4a20c28cfdb8585e7795166b6864630b
2fca89897dfbfa9cf84c0552ef1a14ab
2336ac70ecb5a3b6b3d58a4490f46437
fda3e27dd40bad145b750416f035c284
cb565be03b55b52e1f17bee9ac16ea36
c02c422752aa38c27f73fd3df341aba4
9396aa54065e91a52ea092b56fdaac88
5055b90dff09044bcc0c4b67064dfba1
11cfdd88b4c9d3d058c811de5c4a7873
e7812911d533607ac52e8023280957f1
e2f3d1f1de66e5b1a1ac0902c6a1d6c7
b510544691048fc229c809ff3c14711a
a02969f03c16f6658a3b8b31f49ba428
7e26cbbdeb4d2181513420e84b515700
55d8e2df40d88504459a4c348d65acb6

URLs

URL IP
ic-dc.deliverydlcenter.com
speed-new.com


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

The PUP connects to the servers at the folowing location(s):

iexplore.exe_3036:

.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... )) 
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!
Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}
"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}
\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421

iexplore.exe_348:

.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... )) 
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!
Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}
"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}
\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:3720

  2. Delete the original PUP file.
  3. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

Average: 2 (1 vote)

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now