Trojan.NSIS.StartPage_da8649ef5e
not-a-virus:Downloader.Win32.Solimba.b (Kaspersky), DownloadMR (fs) (VIPRE), Trojan.Solimba.37 (DrWeb), Application.AdLoad (A) (Emsisoft), Artemis!DA8649EF5E69 (McAfee), Trojan.Gen.2 (Symantec), Trojan.MSIL.Injector (Ikarus), Bechiro SL (AVG), Win32:Morstar-T [PUP] (Avast), TROJ_GEN.R00XC0FCR17 (TrendMicro), Trojan.NSIS.StartPage.FD (Lavasoft MAS)
Behaviour: Trojan, PUP
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: da8649ef5e6952314cb7a68296def60a
SHA1: 2b53e6ffab202962020450da515ef810631e00a0
SHA256: 29724ac0b781a3d97a202dbb2fbb41b97999472c8a8573da058259457e8e9ed6
SSDeep: 6144:jsaocyLCuL RUiyOiJ2/o45tHAYbAmdQ5AIqUloXos7HzN:jtobpEBDAURdDIqHY6h
Size: 278088 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-01-05 20:21:23
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1704
ns15C4.tmp:2748
The Trojan injects its code into the following process(es):
250cb8e0-d9b8-11e2-a752-00259033c1da.exe:2296
installer5.exe:3420
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1507.tmp (8196 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\ns15C4.tmp (20 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\installer5.exe (8184 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\nsExec.dll (20 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1506.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp (0 bytes)
The process installer5.exe:3420 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab1A43.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_B98B22DC6E1BE0F7FBDA9800AA963E01 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9 (696 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar3048.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar1A44.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\250cb8e0-d9b8-11e2-a752-00259033c1da.exe (512 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (1720 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_B98B22DC6E1BE0F7FBDA9800AA963E01 (696 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab3047.tmp (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab1A45.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B (1008 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar1A46.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B (537 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9 (1 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab1A43.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar3048.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar1A44.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab3047.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab1A45.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar1A46.tmp (0 bytes)
The process ns15C4.tmp:2748 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\installer5.exe (221 bytes)
Registry activity
The process installer5.exe:3420 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81]
"Blob" = "0F 00 00 00 01 00 00 00 14 00 00 00 85 FE F1 1B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E]
"LanguageList" = "en-US, en"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD]
"Blob" = "0F 00 00 00 01 00 00 00 20 00 00 00 52 29 BA 15"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"91C6D6EE3E8AC86384E548C299295C756C817B81"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"D69B561148F01C77C54578C10926DF5B856976AD"
Dropped PE files
| MD5 | File path |
|---|---|
| 22371a8f60488d167c752cf965f25237 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\250cb8e0-d9b8-11e2-a752-00259033c1da.exe |
| 029162f299af12e48fc5ffde104766e2 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\installer5.exe |
| beb860b900dab197156c5354da55bf3b | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\ns15C4.tmp |
| 9f4abe9c1c095cdb505df5db52644d44 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\nsExec.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name:
Product Name: Google Earth
Product Version:
Legal Copyright: AppInstaller 2013 (132050450)
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 3.0.16.0
File Description: Google Earth AppInstaller
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 34884 | 35328 | 4.14077 | 49b0a05e59cfe2eb146863465a7f35bb |
| .data | 40960 | 140 | 512 | 0.818128 | df0ef3a0da7e22c790a62c5869d70520 |
| .rdata | 45056 | 9108 | 9216 | 4.08895 | 91271e59f4470886a512444b74613d7b |
| .bss | 57344 | 109520 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .idata | 167936 | 4868 | 5120 | 3.63012 | 5f39890d9696ebf98517ebe318287e41 |
| .ndata | 176128 | 36864 | 1024 | 0 | 0f343b0931126a20f133d67c2b018a3b |
| .rsrc | 212992 | 17832 | 17920 | 3.1842 | 35f9a3faa501627f06a4e8613d816748 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 60
4f5453af7cc0163f7bca9c2a86b1bffb
5f84551d0d1ab893996b23b4d6bcd0ef
b23b455d941f545e41320b419ff96a1a
57c2e5dc6de5025ab1d1e49975e0a910
1af0a07bd5a4e4fdd923a5bf91c70ea1
ee70686e3f5d65805dd4c1db714b31df
547f113ab674fe32e3ac74f0a29fd616
58e317ef223b80f8803958ea7b088e31
e9865935945f53f1039ad9d7d0a08485
d83e1d7564874295ecb87345fc8cd0f8
38c998c440525293e60d622de0810ac8
d423df8774ae42036aef7fe6861c6549
b6bb22befb0b61173076b6298cfd6d82
c638e12d06d98fdcf5294ac78667244c
036848c7117db1ceab7e1e196e5dbe54
511e15539f2898f4a4ee0ab750733c34
76633a576a328c955a0b1ce3c5a6913c
14695dd5d65d81bb1fe36faf07bc0e52
42abeb59c9167446663d41c34ce77ff4
6c4c4f04e69be0f1a360d77f789de166
6339832a49a8b9a0c7505835bd236bcd
e05243167e322619256bcd518a696db6
4af5c38f4f2dffc5e1b1330bf189d3c7
480da6dfdcac6c04807a3028c2ad659a
ace9b2ce11cf631f3d4bee1387152514
URLs
| URL | IP |
|---|---|
| hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://e6845.dscb1.akamaiedge.net/ThawtePCA.crl | |
| hxxp://e8218.dscb1.akamaiedge.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD/yl6nWPkczAQUe1tFz6/Oy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS+zcBkvzl4= | |
| hxxp://e8218.dscb1.akamaiedge.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRsif7263KedmR2MLuYKv9+WQCtWAQU1A1lP3q9NMb+R+dMDcC98t4Vq3ECEHONysaXwG4bidEGBzdzAQ0= | |
| hxxp://downloadmr.com/installer/250cb8e0-d9b8-11e2-a752-00259033c1da/9041507/config | |
| hxxp://crl.thawte.com/ThawtePCA.crl | |
| hxxp://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD/yl6nWPkczAQUe1tFz6/Oy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS+zcBkvzl4= | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRsif7263KedmR2MLuYKv9+WQCtWAQU1A1lP3q9NMb+R+dMDcC98t4Vq3ECEHONysaXwG4bidEGBzdzAQ0= | |
| hxxp://api.downloadmr.com/installer/250cb8e0-d9b8-11e2-a752-00259033c1da/9041507/config | |
| dns.msftncsi.com | |
| cs-g2-crl.thawte.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET USER_AGENTS Suspicious User-Agent (DownloadMR)
Traffic
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRsif7263KedmR2MLuYKv9+WQCtWAQU1A1lP3q9NMb+R+dMDcC98t4Vq3ECEHONysaXwG4bidEGBzdzAQ0= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.thawte.com
HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1437
content-transfer-encoding: binary
Cache-Control: max-age=554522, public, no-transform, must-revalidate
Last-Modified: Thu, 6 Apr 2017 23:02:02 GMT
Expires: Thu, 13 Apr 2017 23:02:02 GMT
Date: Fri, 07 Apr 2017 13:00:00 GMT
Connection: keep-alive0..........0..... .....0......0..{0.........#.......Y...1...0..2017040
6230202Z0s0q0I0... ........l....r.vdv0..*.~Y..X....e?z.4..G.L.......q.
.s.....n.....7s......20170406230202Z....20170413230202Z0...*.H........
.....je.8.O\}.X.=)`.3K.#.....1..X$...0..$.|..d.|..f..9.j....3.&mW_..1i
.&'.z.q#...........BzM.S....k......SP.V....R...my....O.e.LvDc>..S..
..f.9.x...3t6.7:o.L.v(..K.d.....#.-..5.d,."..S9JT.....f*&m..(a..s.N..'
.%5q. 5...(72.S.1@..`...M..U.(.?_...E..A.P?..|W...(..>....0...0...0
...........i.i2.q...z.....0...*.H........0J1.0...U....US1.0...U....Tha
wte, Inc.1$0"..U....Thawte Code Signing CA - G20...161213000000Z..2112
31235959Z0:1806..U.../Thawte Code Signing CA - G2 SHA1 OCSP Responder0
.."0...*.H.............0...........@.L.Dpb..1.U.e5.!T..x#{..M.H.z.w.H4
..z.Q......=}N.6<...rl..I3......6W.....M.....r...-B.:v..9.p.4.....&
lt;.......n....x...... ....A.(...)...'.]...B.D.....r.w>.["Z?.Wz@...
.D..A&T?]. ..u......B4.......s..A......B.M..q..Z.........>|.;T..-&m
o.b............_...i........0..0...U.......0.0...U.%..0... .......0...
U...........0... .....0......0"..U....0...0.1.0...U....TGV-OFF-600...U
.........#.......Y...1...00...U.#..0.....e?z.4..G.L.......q0...*.H....
.........0.._S.<.{}..@I.......7.s...-................Z0ol.%..]J21.m
...2(..!. ./.@...u..Z..<...p..r6...|...ee{.W..B....T.l3~....t..M..t
........66....1z..y..V.G.....z.........(....I..b....v...ny.....w..M...
.....q.....E..).....^..S.U^....GLE..h...6..F.....{Z.Y.V.H......<<< skipped >>>
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Cache-Control: max-age = 86402
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Fri, 16 Sep 2016 21:16:59 GMT
If-None-Match: "8017f9a85f10d21:0"
User-Agent: Microsoft-CryptoAPI/6.1
Host: VVV.download.windowsupdate.com
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/vnd.ms-cab-compressed
Last-Modified: Tue, 28 Feb 2017 17:51:01 GMT
Accept-Ranges: bytes
ETag: "80b03039eb91d21:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Content-Length: 52122
Date: Fri, 07 Apr 2017 12:59:39 GMT
Connection: keep-alive
X-CCC: UA
X-CID: 2MSCF............,...................I.................\JTN .authroot.s
tl.W.H..7..CK...<........i.g.B.A.E#D..Z.d..d..AH))..B%......,QH.Y.$
JE...Lu3...{....g.8....>.s 1..... ....Y0tT'..m...*....0..H.RS..@`..
^Z.iZ...Vf..'.o'n. ..._...........ow..b.)#..*8eE.De..~....a..uMo.8@.Q.
.]2\..v.R..#|D...P&..;.:...QS!B.._....G*.F......?..!sf........cY......
i..KgVv1..Z..E.yO9.D`....M...gi.F...LZ.<../...1un...,>..<..L.
M.F...r.. ?(...BA..d.V~.........l$=....`_... w.T.....!..H..X..{3..T..6
.rq...B._......._.....C..}.......;.8V..a...;44t..hTF.m....'....[.J..F.
.!.|o.6P...X.N..w$.G..l...........)..n..|4.<(......w6.G..P)...$....
x.A...9X.......`..v|..Dt.D(.q....gY.)............Jxp......_.5d..y..M..
..x...m.E.....?.&..NI.....h.?......{.\rN7......d..P..~.T...O#.ud. ....
.w.....&0..uP.hk..]..29..6..h..x.c.h.h4.....=..V..Z....5..N.:.7..N.yZ.
.].....f...V.R.o.u3..SF.O..$..T....qj .d.[....E. y..p.E...c.d..5.>.
.FL....ZU.e......O.........=...#7z....]..YX...G....4.....-..\.K.,.....
uh....IO..sz.....a....y2g..E.Y.:#.7...4a.....A. 2....hDL.......Y>;.
gW......E.E.}R'.{......=..C...p.y8....c.......du9.y..v..<..../1....
~...DV.I..s"..d..ZQ..i.....fq..I3...{7#.m.Y)...Ey..8...@...v...o . .{.
.|....x.N.."G"..v... r.......................=...?1r..)`&.f....!...$.8
..-.~5.....5a^.n.n.H?~j./t.E......N..D.#|.4n.f...@..y-.CM....c .......
..Q..#..T.v.....f.....[.p`....P3._...d..n.X.....8D.B$..`E\ .5....I.H..
@../1:...c..O......~...............d....>.%.....nU...Az.(..g....-.c
.V.w.......W$...)...cB.y....Kd.....-.X;e`0....T.U~.r.....\:..8....<<< skipped >>>
GET /ThawtePCA.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.thawte.com
HTTP/1.1 200 OK
Server: Apache
ETag: "9a0c909d0279c1bbdf66260ef952850c:1490320987"
Last-Modified: Fri, 24 Mar 2017 02:01:25 GMT
Date: Fri, 07 Apr 2017 12:59:54 GMT
Content-Length: 537
Connection: keep-alive
Content-Type: application/pkix-crl0...0..0...*.H........0..1.0...U....US1.0...U....thawte, Inc.1(0&..U..
..Certification Services Division1806..U.../(c) 2006 thawte, Inc. - Fo
r authorized use only1.0...U....thawte Primary Root CA..170321000000Z.
.170630235959Z0#0!.."Gc.6.\k.....;....160630172515Z0...*.H............
..g....o.9.....Z.b....Wh#_.&.................V...(.....MJ,..CnG.T2.S.q
K ..%.=.Lt...i....H.A...?..[).9K 4..=.{8/...V'..si..s.x.._...z..XK../.
.u.....{.MT.L. .\..]R.o{.H)....}...".9s2X....=.-...)........,..?../.)n
,.".8..W..;U.....6.L...rP..`6....53.......'....HTTP/1.1 200 OK..Server
: Apache..ETag: "9a0c909d0279c1bbdf66260ef952850c:1490320987"..Last-Mo
dified: Fri, 24 Mar 2017 02:01:25 GMT..Date: Fri, 07 Apr 2017 12:59:54
GMT..Content-Length: 537..Connection: keep-alive..Content-Type: appli
cation/pkix-crl..0...0..0...*.H........0..1.0...U....US1.0...U....thaw
te, Inc.1(0&..U....Certification Services Division1806..U.../(c) 2006
thawte, Inc. - For authorized use only1.0...U....thawte Primary Root C
A..170321000000Z..170630235959Z0#0!.."Gc.6.\k.....;....160630172515Z0.
..*.H..............g....o.9.....Z.b....Wh#_.&.................V...(...
..MJ,..CnG.T2.S.qK ..%.=.Lt...i....H.A...?..[).9K 4..=.{8/...V'..si..s
.x.._...z..XK../..u.....{.MT.L. .\..]R.o{.H)....}...".9s2X....=.-...).
.......,..?../.)n,.".8..W..;U.....6.L...rP..`6....53.......'......<<< skipped >>>
GET /installer/250cb8e0-d9b8-11e2-a752-00259033c1da/9041507/config HTTP/1.1
User-Agent: DownloadMR/3.0.16 (MSIE 9.0; Windows NT 6.1.7601 SP1; .NET CLR 2.0.50727 SP2; .NET CLR 3.0 SP2; .NET CLR 3.5 SP1; .NET CLR 4; .NET CLR 4.0; T132050450S1021cea8321c5d80cd193bfa5920ef; m=VMware Virtual Platform; northstar)
Accept-Language: en-US
Host: api.downloadmr.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Fri, 07 Apr 2017 13:00:23 GMT
Server: Apache/2.4.6 (CentOS) PHP/5.4.16
X-Powered-By: PHP/5.4.16
Location: hXXp://ww12.downloadmr.com
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8HTTP/1.1 302 Found..Date: Fri, 07 Apr 2017 13:00:23 GMT..Server: Apach
e/2.4.6 (CentOS) PHP/5.4.16..X-Powered-By: PHP/5.4.16..Location: http:
//ww12.downloadmr.com..Content-Length: 0..Keep-Alive: timeout=5, max=1
00..Connection: Keep-Alive..Content-Type: text/html; charset=UTF-8..
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD/yl6nWPkczAQUe1tFz6/Oy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS+zcBkvzl4= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.thawte.com
HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1504
content-transfer-encoding: binary
Cache-Control: max-age=579562, public, no-transform, must-revalidate
Last-Modified: Fri, 7 Apr 2017 05:57:09 GMT
Expires: Fri, 14 Apr 2017 05:57:09 GMT
Date: Fri, 07 Apr 2017 12:59:58 GMT
Connection: keep-alive0..........0..... .....0......0...0.........@e!.t.....4...,.#..2017040
7055709Z0s0q0I0... ........0..k....&..p..^.X.....{[E....z.1..j..F.WHP.
.G.Mxs..../.p./.^....20170407055709Z....20170414055709Z0...*.H........
.....$.Kt...._...Q...E.\.l..cV.).. ..uX......=.p...E.".$=..b..>...d
.eD..U..........<r..2.#.D%.,.CG..J...],.s_."S.R.A.U])s........k1.7.
2..s...r...P..J..1.....v.g.....sm.|G<l.t..t.-b...o9t...0../..$.W.$.
.r~..6........y..b0P....D...=..hl..G`...9....%....X...!c.k./....0...0.
..0..........j!.....&.....t.T0...*.H........0..1.0...U....US1.0...U...
.thawte, Inc.1(0&..U....Certification Services Division1806..U.../(c)
2006 thawte, Inc. - For authorized use only1.0...U....thawte Primary R
oot CA0...161122000000Z..171214235959Z0_1.0...U....US1.0...U....thawte
, Inc.1907..U...0thawte Primary Root OCSP Responder Certificate 50.."0
...*.H.............0..........s..O..W>.....2......n..z...U.......i.
.Ie...].O..._.{q.`;..........C.S.....W.1.....|.Y}....2..s.H..q....*z:|
2..]...F.j.....jq...#.."[.9..4-k...r....Y.?......f.K.......73...v.]...
....y....N_......0.b..:.a...'G..".(.x...;8d#>j.}......j..Bu....3.@.
.h...Z..........j0h0...U.%..0... .......0... .....0......0...U.......0
.0...U...........0"..U....0...0.1.0...U....TGV-OFF-510...*.H..........
...1.......9...4...;.xC%:W.J.....c...o..J.E.]%{j......^).~..qX.....iK.
.1vv....R._....&.O.%.(.|........S;5. ..A.&....)....D*uwKz1..V.....n...
.>...a..|......W..1:....Rl..s/.......\n.e...%E.. ...G.PIP.$.8.p..".
..$?e......\...u.;...-......D".|h...>6rO. ......Hd~...<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
0`.data
.rdata
0@.bss
.idata
.ndata
.rsrc
unpacking data: %d%%
verifying installer: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
.DEFAULT\Control Panel\International
*?|<>/":
%s=%s
RegDeleteKeyExA
Software\Microsoft\Windows\CurrentVersion
ers\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\nsExec.dll
exe 250cb8e0-d9b8-11e2-a752-00259033c1da.exe /t1021cea8321c5d80cd193bfa5920ef /dT132050450S1021cea8321c5d80cd193bfa5920ef /e9041507 /u250cb8e0-d9b8-11e2-a752-00259033c1da
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\nsExec.dll
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp
1T5al%x
%[S%U
iB%X|
.AcZ>
m.QYYFh
0`.rdata
.edata
0@.idata
.reloc
nsExec.dll
CreatePipe
PeekNamedPipe
ADVAPI32.dll
KERNEL32.dll
USER32.dll
installer5.exe
System.Diagnostics
System.Globalization
System.IO.Compression
System.IO
System.Reflection
System.Reflection.Emit
System.Runtime.CompilerServices
System.Runtime.InteropServices
System.Security.Cryptography
System.Text
System.Threading
.cctor
.ctor
set_Key
GetExecutingAssembly
#hXXp://crl.thawte.com/ThawtePCA.crl0
hXXp://ocsp.thawte.com0
$622281ed-4093-47bd-b203-ffc09e73e021
1.0.0.0
mscoree.dll
%Documents and Settings%\drdoom\My Documents\Visual Studio 2010\Projects\installer5\installer5\bin\Release\CryptoObfuscator_Output\installer5.pdb
v2.0.50727
$2F7128C1-C70C-4111-8C76-FC9CDB6AC18F
3.0.16
_CorExeMain
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
*hXXp://cs-g2-crl.thawte.com/ThawteCSG2.crl0
Certification Services Division1806
.AHpC
.XqV ;(*7K
nsc1508.tmp
lu2.iu)
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
GetWindowsDirectoryA
SHFileOperationA
ShellExecuteA
ExitWindowsEx
COMCTL32.DLL
GDI32.dll
ole32.dll
SHELL32.DLL
VERSION.dll
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\installer5.exe 250cb8e0-d9b8-11e2-a752-00259033c1da.exe /t1021cea8321c5d80cd193bfa5920ef /dT132050450S1021cea8321c5d80cd193bfa5920ef /e9041507 /u250cb8e0-d9b8-11e2-a752-00259033c1da
8112.16421
/u250cb8e0-d9b8-11e2-a752-00259033c1da
c:\%original file name%.exe
%original file name%.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nsc1506.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46-7</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>ResourceAssembly.dll
"3D9B94A98B-76A8-4810-B1A0-4BE7C4F9C98DA2#
PublicKeyToken=
publickeytoken=
3.0.16.0
ns15C4.tmp_2748:
.text
0`.rdata
0@.bss
.edata
0@.idata
.reloc
nsExec.dll
CreatePipe
PeekNamedPipe
ADVAPI32.dll
KERNEL32.dll
USER32.dll
conhost.exe_3408:
.text
`.data
.rsrc
@.reloc
GDI32.dll
USER32.dll
msvcrt.dll
ntdll.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
KERNEL32.dll
IMM32.dll
ole32.dll
OLEAUT32.dll
PutInputInBuffer: EventsWritten != 1 (0x%x), 1 expected
Invalid message 0x%x
InitExtendedEditKeys: Unsupported version number(%d)
Console init failed with status 0x%x
CreateWindowsWindow failed with status 0x%x, gle = 0x%x
InitWindowsStuff failed with status 0x%x (gle = 0x%x)
InitSideBySide failed create an activation context. Error: %d
GetModuleFileNameW requires more than ScratchBufferSize(%d) - 1.
GetModuleFileNameW failed %d.
Invalid EventType: 0x%x
Dup handle failed for %d of %d (Status = 0x%x)
Couldn't grow input buffer, Status == 0x%x
InitializeScrollBuffer failed, Status = 0x%x
CreateWindow failed with gle = 0x%x
Opening Font file failed with error 0x%x
\ega.cpi
NtReplyWaitReceivePort failed with Status 0x%x
ConsoleOpenWaitEvent failed with Status 0x%x
NtCreatePort failed with Status 0x%x
GetCharWidth32 failed with error 0x%x
GetTextMetricsW failed with error 0x%x
GetSystemEUDCRangeW: RegOpenKeyExW(%ws) failed, error = 0x%x
RtlStringCchCopy failed with Status 0x%x
Cannot allocate 0n%d bytes
|%SWj
O.fBf;
ReCreateDbcsScreenBuffer failed. Restoring to CP=%d
Invalid Parameter: 0x%x, 0x%x, 0x%x
ConsoleKeyInfo buffer is full
Invalid screen buffer size (0x%x, 0x%x)
SetROMFontCodePage: failed to memory allocation %d bytes
FONT.NT
Failed to set font image. wc=x, sz=(%x,%x)
Failed to set font image. wc=x sz=(%x, %x).
Failed to set font image. wc=x sz=(%x,%x)
FullscreenControlSetColors failed - Status = 0x%x
FullscreenControlSetPalette failed - Status = 0x%x
WriteCharsFromInput failed 0x%x
WriteCharsFromInput failed %x
RtlStringCchCopyW failed with Status 0x%x
CreateFontCache failed with Status 0x%x
FTPh
\>.Sj
GetKeyboardLayout
MapVirtualKeyW
VkKeyScanW
GetKeyboardState
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
ActivateKeyboardLayout
GetKeyboardLayoutNameA
GetKeyboardLayoutNameW
_amsg_exit
_acmdln
ShipAssert
NtReplyWaitReceivePort
NtCreatePort
NtEnumerateValueKey
NtQueryValueKey
NtOpenKey
NtAcceptConnectPort
NtReplyPort
SetProcessShutdownParameters
GetCPInfo
conhost.pdb
%$%a%b%V%U%c%Q%W%]%\%[%
%<%^%_%Z%T%i%f%`%P%l%g%h%d%e%Y%X%R%S%k%j%
version="5.1.0.0"
name="Microsoft.Windows.ConsoleHost"
<requestedExecutionLevel
name="Microsoft.Windows.ConsoleHost.SystemDefault"
publicKeyToken="6595b64144ccf1df"
name="Microsoft.Windows.SystemCompatible"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
< =$>:>@>
2%2X2
%SystemRoot%
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\FullScreen
WindowSize
ColorTableu
ExtendedEditkeyCustom
ExtendedEditKey
Software\Microsoft\Windows\CurrentVersion
\ !:=/.<>;|&
%d/%d
cmd.exe
desktop.ini
\console.dll
%d/%d
6.1.7601.17641 (win7sp1_gdr.110623-1503)
CONHOST.EXE
Windows
Operating System
6.1.7601.17641
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1704
ns15C4.tmp:2748 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1507.tmp (8196 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\ns15C4.tmp (20 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\installer5.exe (8184 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\nsExec.dll (20 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab1A43.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_B98B22DC6E1BE0F7FBDA9800AA963E01 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9 (696 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar3048.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar1A44.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1508.tmp\250cb8e0-d9b8-11e2-a752-00259033c1da.exe (512 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (1720 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_B98B22DC6E1BE0F7FBDA9800AA963E01 (696 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab3047.tmp (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab1A45.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B (1008 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar1A46.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B (537 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9 (1 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.