Trojan.NSIS.StartPage_df2fe6117f
Trojan.NSIS.StartPage.FD, Trojan.Win32.Swrort.3.FD, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: df2fe6117f49067a584241983d2504cb
SHA1: f42bfc93078880a87d94056c7e9aff1c82684649
SHA256: 36c395fae9f61c689aed3647edf7cd38e246a8d4078ad30fce639185f36c1441
SSDeep: 98304:ZP22A9rBFOLWKhtfKiUwsw5mRgwNtjTz2M2YE6PYAt:U2wrBRekiXsw0J3dPj
Size: 5239671 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company:
Created at: 2007-05-05 15:23:36
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:3880
The Trojan injects its code into the following process(es):
s2exe.exe:3968
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:3880 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Project151Map.sb2 (36078 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe (30480 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\open.fnr (66362 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nszB9CE.tmp (131050 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsjB921.tmp (0 bytes)
The process s2exe.exe:3968 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar4183.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DFECE1A4D0C745EF29E7B51A2DA008B8 (1454 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0DD30266AF9B4A57FF10335BAF014F_1A83F80A2067DD202B16599AA2CE4194 (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9B (2674 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab4182.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA72AE1092979CCD3A7B12BE5EF5A9A2 (1252 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DFECE1A4D0C745EF29E7B51A2DA008B8 (2730 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9B (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FA72AE1092979CCD3A7B12BE5EF5A9A2 (650 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0DD30266AF9B4A57FF10335BAF014F_1A83F80A2067DD202B16599AA2CE4194 (1118 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab4182.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar4183.tmp (0 bytes)
Registry activity
The process s2exe.exe:3968 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Classes\Local Settings\MuiCache\2C\52C64B7E]
"LanguageList" = "en-US, en"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 38 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"MaxFileSize" = "1048576"
"FileDirectory" = "%windir%\tracing"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
Dropped PE files
| MD5 | File path |
|---|---|
| 2a759981d87587cbac0e4c270e6fd736 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 22948 | 23040 | 4.47592 | 27548a140ee5871e901b5081d2ea223c |
| .rdata | 28672 | 4474 | 4608 | 3.58713 | 69c5211e1a88679cc11fd273667a51c9 |
| .data | 36864 | 110552 | 1024 | 3.45044 | 7e7f788f7322d235e21ca51dab874511 |
| .ndata | 147456 | 32768 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 180224 | 1646072 | 1646080 | 1.89841 | 812bd0f048e1d538adcf08b4bb89098f |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://scratch.mit.edu/scratchr2/static/locale/lang_list.txt | |
| hxxp://scratch.mit.edu/site-api/i18n/get-preferred-language/ | |
| hxxp://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY= | |
| hxxp://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m/WqorSs9UgOHYm8Cd8rIDZssCEEcg0PqFRhp+F6FkApGEY3Q= | |
| hxxp://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRpg21TVpHZ/LeGq/t34TnEClb0IgQUHgWjd49sluJbh0umtIascQAM5zgCEECxXuCwl/CuFVbmbhKEc2M= | |
| hxxp://crl.incommon-rsa.org/InCommonRSAServerCA.crl |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRpg21TVpHZ/LeGq/t34TnEClb0IgQUHgWjd49sluJbh0umtIascQAM5zgCEECxXuCwl/CuFVbmbhKEc2M= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Wed, 23 Aug 2017 03:54:02 GMT
Server: Apache
Last-Modified: Mon, 21 Aug 2017 18:04:49 GMT
Expires: Mon, 28 Aug 2017 18:04:49 GMT
ETag: 55D6D86009A8437A04879E2D34E38FE8AB93D26A
Cache-Control: max-age=482446,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp19
Content-Length: 471
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.........w.l..[.K....q...8..2017082
1180449Z0s0q0I0... ........i.mSV.......w.9..V.".....w.l..[.K....q...8.
.@.^......V.n..sc....20170821180449Z....20170828180449Z0...*.H........
.....'..[.......t....B..Xy...QWBf....o.`...%...|.5.....(G5k./.y...~...
.b<EJ...w..{6.W[y........~......a.w..*..Vg..... .=.....&....q]f....
.-.{E...<...H&.n!cuD.!.W.........[...S.lEa.dp...7u.T*...x..=.....&l
t;.#?....e^.X..Zk.j.M..Pr......cXO.......nf...j9..qN.*........
GET /InCommonRSAServerCA.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.incommon-rsa.org
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 23 Aug 2017 03:54:06 GMT
Content-Type: application/x-pkcs7-crl
Content-Length: 626461
Last-Modified: Tue, 22 Aug 2017 08:53:32 GMT
Connection: close
ETag: "599bf10c-98f1d"
X-CCACDN-Mirror-ID: rmdccacrl1
Cache-Control: max-age=36000
Accept-Ranges: bytes0....0.......0...*.H........0v1.0...U....US1.0...U....MI1.0...U....Ann
Arbor1.0...U....Internet21.0...U....InCommon1.0...U....InCommon RSA S
erver CA..170822085332Z..170826085332Z0... 0!..57*-Y..~.....A....14092
2160742Z0!..,......RE....].!..140922161506Z0".....n.....^.n..r.I..1409
22174109Z0".....2....3.......#..140922214152Z0"......%....Z@.l.."...14
0922223922Z0!...f&.....# .C.P.O..140923121431Z0"....}....O".*..B.G4..1
40923141306Z0".....>..a.t.M........140923141318Z0"...... .J|.......
6...140923170247Z0"....RQ.1ga..v..K.....140923191704Z0"...."I.....=..h
...E..140924115602Z0!..A~..G~..3.wg$N$...140924160011Z0!..r....Y.l.&..
LS....140924160022Z0!..('6...w.^....d....140924171120Z0"....=.........
F..y...140924173752Z0".....~..,......1T.U..140924195705Z0!..p..AisNgQ.
...[Oh..140925055500Z0!..l%.l.......^......140925123802Z0!../8........
..A.J...140925150805Z0!..d...d|..$..KW.....140925155625Z0!..]k.......]
3..i....140925164605Z0"....d8.|.>*45..#.no..140925165006Z0!..~y...N
x4....C.....140925165614Z0!....(.O?j[..m\..;N..140925174651Z0"....u.g.
...^Lar......140925174701Z0"....q.RC.W].X........140925181036Z0"....l.
..-.....r..r...140925201547Z0"...."..p....o.E...A..140925203729Z0"....
.l..a..<.[..@|&..140925204907Z0"....S........j.......140926123114Z0
!..e%......ZMMh#.Z...140926140856Z0!..D....i.....1.M....140926171818Z0
"......@o0...cB..n....140926174052Z0"....T-.-.V..UU..X.*..140926211006
Z0"....z...7..U.95...S..140926211014Z0!..C........^8....K..14092621132
9Z0"........l..$.Hb...H..140928193424Z0".......)...O....f?J..14092<<< skipped >>>
GET /scratchr2/static/locale/lang_list.txt HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 23,0,0,185
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: scratch.mit.edu
Connection: Keep-Alive
HTTP/1.1 301 Moved Permanently
Server: Varnish
Retry-After: 0
Location: hXXps://scratch.mit.edu/scratchr2/static/locale/lang_list.txt
Content-Length: 0
Accept-Ranges: bytes
Date: Wed, 23 Aug 2017 03:53:43 GMT
Via: 1.1 varnish
Connection: close
X-Served-By: cache-hhn1544-HHN
X-Cache: HIT
X-Cache-Hits: 0
X-Timer: S1503460424.726340,VS0,VE0
Strict-Transport-Security: max-age=31536000
X-Xss-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRpg21TVpHZ/LeGq/t34TnEClb0IgQUHgWjd49sluJbh0umtIascQAM5zgCEECxXuCwl/CuFVbmbhKEc2M= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Wed, 23 Aug 2017 03:54:02 GMT
Server: Apache
Last-Modified: Mon, 21 Aug 2017 18:04:49 GMT
Expires: Mon, 28 Aug 2017 18:04:49 GMT
ETag: 55D6D86009A8437A04879E2D34E38FE8AB93D26A
Cache-Control: max-age=482446,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp10
Content-Length: 471
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.........w.l..[.K....q...8..2017082
1180449Z0s0q0I0... ........i.mSV.......w.9..V.".....w.l..[.K....q...8.
.@.^......V.n..sc....20170821180449Z....20170828180449Z0...*.H........
.....'..[.......t....B..Xy...QWBf....o.`...%...|.5.....(G5k./.y...~...
.b<EJ...w..{6.W[y........~......a.w..*..Vg..... .=.....&....q]f....
.-.{E...<...H&.n!cuD.!.W.........[...S.lEa.dp...7u.T*...x..=.....&l
t;.#?....e^.X..Zk.j.M..Pr......cXO.......nf...j9..qN.*........
GET /site-api/i18n/get-preferred-language/ HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 23,0,0,185
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: scratch.mit.edu
Connection: Keep-Alive
HTTP/1.1 301 Moved Permanently
Server: Varnish
Retry-After: 0
Location: hXXps://scratch.mit.edu/site-api/i18n/get-preferred-language/
Content-Length: 0
Accept-Ranges: bytes
Date: Wed, 23 Aug 2017 03:53:44 GMT
Via: 1.1 varnish
Connection: close
X-Served-By: cache-hhn1535-HHN
X-Cache: HIT
X-Cache-Hits: 0
X-Timer: S1503460424.290419,VS0,VE0
Strict-Transport-Security: max-age=31536000
X-Xss-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Wed, 23 Aug 2017 03:53:50 GMT
Server: Apache
Last-Modified: Sat, 19 Aug 2017 22:42:46 GMT
Expires: Sat, 26 Aug 2017 22:42:46 GMT
ETag: A26F805A3BB1D57694720F1A00460904F5AC2A6C
Cache-Control: max-age=326335,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp10
Content-Length: 471
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.........z4.&...&T....$.T...2017081
9224246Z0s0q0I0... ........|.fT...D.b&...e{.z.......z4.&...&T....$.T..
...(p[....6c..aC6....20170819224246Z....20170826224246Z0...*.H........
..... .F.h.......|10;.....*.Wz\..........2...,;....<.h.......g3..\.
..._.^.^.)..."V(....@l.m.J.....%...............:\...D.M.V...O..JO2to..
..I'g...l..../yz4_...3..B|......Y8....\..Ew..Z...,.6.S..Eys...hcY(..&.
.no...U...}`f9....'..xq...i|.....X..<wC....=6..T.....;..
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Wed, 23 Aug 2017 03:53:50 GMT
Server: Apache
Last-Modified: Sat, 19 Aug 2017 22:42:46 GMT
Expires: Sat, 26 Aug 2017 22:42:46 GMT
ETag: A26F805A3BB1D57694720F1A00460904F5AC2A6C
Cache-Control: max-age=326335,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp19
Content-Length: 471
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.........z4.&...&T....$.T...2017081
9224246Z0s0q0I0... ........|.fT...D.b&...e{.z.......z4.&...&T....$.T..
...(p[....6c..aC6....20170819224246Z....20170826224246Z0...*.H........
..... .F.h.......|10;.....*.Wz\..........2...,;....<.h.......g3..\.
..._.^.^.)..."V(....@l.m.J.....%...............:\...D.M.V...O..JO2to..
..I'g...l..../yz4_...3..B|......Y8....\..Ew..Z...,.6.S..Eys...hcY(..&.
.no...U...}`f9....'..xq...i|.....X..<wC....=6..T.....;..
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m/WqorSs9UgOHYm8Cd8rIDZssCEEcg0PqFRhp+F6FkApGEY3Q= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Wed, 23 Aug 2017 03:53:56 GMT
Server: Apache
Last-Modified: Sat, 19 Aug 2017 22:42:46 GMT
Expires: Sat, 26 Aug 2017 22:42:46 GMT
ETag: 81E84CD63427CCB5384564F478DC67D0FEB5E6FA
Cache-Control: max-age=326329,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp10
Content-Length: 727
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0......Sy.Z. J.T.........f...2017081
9224246Z0s0q0I0... .........0.L4:....p.....v)....Sy.Z. J.T.........f..
.G ...F.~..d...ct....20170819224246Z....20170826224246Z0...*.H........
.....4p...7.1*/c...:...ziT.n5.nH..h....<..r.k.@....n...3.........}
...:.....P.s_..<..s..#RK%.p.d..'W.ax...i.....=.N.].....p.F.c...b^.!
.......O....X(...x<.%....(.....~.....N*.. &4N.N......f..T..Beo..I..
..|<....d.....`w.-q.......3.hn..pA...t..v.ik.....Bi.|..L...{......F
`......E..d..2...c......C..E.%.$....\.......2g. ...#.....S.N..;.z..~..
....N$......T.....{>.=...~<..P ...wy..E.....=.[..lVo.p!...\k.[..
.'K.fo..y...>...".uY.(.....e..!......F.N.....]....M.72.............
....ey..>;6.i..rZ....).$..9...Y.....[.\w...._W....
GET /InCommonRSAServerCA.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.incommon-rsa.org
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 23 Aug 2017 03:54:06 GMT
Content-Type: application/x-pkcs7-crl
Content-Length: 626461
Last-Modified: Tue, 22 Aug 2017 08:53:32 GMT
Connection: close
ETag: "599bf10c-98f1d"
X-CCACDN-Mirror-ID: rmdccacrl1
Cache-Control: max-age=36000
Accept-Ranges: bytes0....0.......0...*.H........0v1.0...U....US1.0...U....MI1.0...U....Ann
Arbor1.0...U....Internet21.0...U....InCommon1.0...U....InCommon RSA S
erver CA..170822085332Z..170826085332Z0... 0!..57*-Y..~.....A....14092
2160742Z0!..,......RE....].!..140922161506Z0".....n.....^.n..r.I..1409
22174109Z0".....2....3.......#..140922214152Z0"......%....Z@.l.."...14
0922223922Z0!...f&.....# .C.P.O..140923121431Z0"....}....O".*..B.G4..1
40923141306Z0".....>..a.t.M........140923141318Z0"...... .J|.......
6...140923170247Z0"....RQ.1ga..v..K.....140923191704Z0"...."I.....=..h
...E..140924115602Z0!..A~..G~..3.wg$N$...140924160011Z0!..r....Y.l.&..
LS....140924160022Z0!..('6...w.^....d....140924171120Z0"....=.........
F..y...140924173752Z0".....~..,......1T.U..140924195705Z0!..p..AisNgQ.
...[Oh..140925055500Z0!..l%.l.......^......140925123802Z0!../8........
..A.J...140925150805Z0!..d...d|..$..KW.....140925155625Z0!..]k.......]
3..i....140925164605Z0"....d8.|.>*45..#.no..140925165006Z0!..~y...N
x4....C.....140925165614Z0!....(.O?j[..m\..;N..140925174651Z0"....u.g.
...^Lar......140925174701Z0"....q.RC.W].X........140925181036Z0"....l.
..-.....r..r...140925201547Z0"...."..p....o.E...A..140925203729Z0"....
.l..a..<.[..@|&..140925204907Z0"....S........j.......140926123114Z0
!..e%......ZMMh#.Z...140926140856Z0!..D....i.....1.M....140926171818Z0
"......@o0...cB..n....140926174052Z0"....T-.-.V..UU..X.*..140926211006
Z0"....z...7..U.95...S..140926211014Z0!..C........^8....K..14092621132
9Z0"........l..$.Hb...H..140928193424Z0".......)...O....f?J..14092<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m/WqorSs9UgOHYm8Cd8rIDZssCEEcg0PqFRhp+F6FkApGEY3Q= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Wed, 23 Aug 2017 03:53:56 GMT
Server: Apache
Last-Modified: Sat, 19 Aug 2017 22:42:46 GMT
Expires: Sat, 26 Aug 2017 22:42:46 GMT
ETag: 81E84CD63427CCB5384564F478DC67D0FEB5E6FA
Cache-Control: max-age=326329,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp10
Content-Length: 727
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0......Sy.Z. J.T.........f...2017081
9224246Z0s0q0I0... .........0.L4:....p.....v)....Sy.Z. J.T.........f..
.G ...F.~..d...ct....20170819224246Z....20170826224246Z0...*.H........
.....4p...7.1*/c...:...ziT.n5.nH..h....<..r.k.@....n...3.........}
...:.....P.s_..<..s..#RK%.p.d..'W.ax...i.....=.N.].....p.F.c...b^.!
.......O....X(...x<.%....(.....~.....N*.. &4N.N......f..T..Beo..I..
..|<....d.....`w.-q.......3.hn..pA...t..v.ik.....Bi.|..L...{......F
`......E..d..2...c......C..E.%.$....\.......2g. ...#.....S.N..;.z..~..
....N$......T.....{>.=...~<..P ...wy..E.....=.[..lVo.p!...\k.[..
.'K.fo..y...>...".uY.(.....e..!......F.N.....]....M.72.............
....ey..>;6.i..rZ....).$..9...Y.....[.\w...._W....
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
t%SPV
tDSSh
Gw2.Hw
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
%s %s
... %d%%
verifying installer: %d%%
unpacking data: %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
"C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe" C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Project151Map.sb2
C:\Users\"%CurrentUserName%"\AppData\Local\Temp
s2exe.exe
Map.sb2
version="5.1.0.0"
13.exe"/>
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><!--The ID below indicates application support for Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>@E:\AAuto\lib\winex\_.aau
import
EnumWindows
EnumChildWindows
enumWindows
cmdid
@main.aau
win.ui
com.flash
_CMDLINE
msgbox
scratch\open.fnr
?http
by hXXp://hi.baidu.com/scratch
"6.0.0.0"
-"C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe" C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Project151Map.sb2
c:\%original file name%.exe
%original file name%.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nsjB921.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.27</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo></assembly>
yz.lhuo@gmail.com
0.0.0.4
.........................exe>
scratch2exe.exe
s2exe
s2exe.exe_3968:
.text
`.rdata
@.data
.rsrc
?%uYG
xSSSh
FTPjKS
FtPj;S
C.PjRV
Hw2.Hw%
cmd.exe
Visual C CRT: Not enough memory to complete call to strerror.
Broken pipe
Inappropriate I/O control operation
Operation not permitted
portuguese-brazilian
GetProcessWindowStation
operator
_CMDLINE
import preload;
com.each = function(obj) begin
if(type(obj)==type.function)obj=obj();
if(!com.IsObject(obj))error('try{enumerator = com.GetEnumerator(obj);}catch(e){err=e}if(err)error(err,2);var function iterator( index ) {var value = owner.Next();return ( value ? index 1 : null ) , value ;}return iterator, enumerator, 0;endThere was not enough memory to complete the operation
Windows error
Unsupported feature required
%d.%d
com.dll
Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352}Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352}Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502}Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502}Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}com.getIUnknow() QueryInterface Failed!
-mapid %d
hh.exe
ID:0x%X: %s
$Spp: AAuto v3.0 Copyright (C) ecranesoft.com $
$URL: VVV.ecranesoft.com $
File %s, Line %d
ExportConstants
ExportEnumerations
ole.host
expected: ::MSG struct
com.CreateEmbed
Invalid form.hwnd!
Union type not supported!
Record type not supported!
TKIND_MODULE and TKIND_MAX not supported!
Exception (%s)
IDispatch.Data
invalid object(com.IDispatch)
Property putref not supported.
Property puts with more than two parameters aren't supported.
showMsg
Spp error: error during error handler execution.
load resource(%s/%s) failed!
bad argument:@%d '%s'
calling:'%s'
bad argument:@%d
expected:%s
got:%s
file:%s
line:#%d
invalid option:'%s'
%s.%s
attempt to use a closed object: %s:#%d ( type:'%s.%s')
stack overflow (%s)
name conflict for namespace '%s'
failed:%s
error:%s
field:'%s'
thread id:%d
thread error:%s
return %s
callback : _struct error '...%s'
Cannot load library '%s'.
%s._struct not found!
Invalid _struct{%s...},Expected a field name! [in]field:%s
field:%s.%s
Invalid _struct: {...%s},Data Type Error(%c...key:%s) [out]{ %s }Invalid _struct{%s...},Expected a field name! [out]Failed to get the size of the dynamic array!field(%s)
Cannot load remote library '%s'.
Cannot find remote function '%s' in the dll.
Cannot find function '%s' in the dll.
Declare Api:'%s'
Data type error: '...%s'
Struct size has more than %d
%s %s[%d]
invalid key to 'next'
Cann't modify a %s : '%s'
attempt to:%s
kind:%s
name:'%s'
type:%s
attempt to:compare two %s values
attempt to:compare %s with %s
file:%s:
join
^$* ?.:([\-{<%invalid replacement value (a %s)
no function environment for tail call at level %d
in function '%s'
in function <%s:%d>
import-namespace conflict for global.%s
import
import ide;
importFile
import %s failed ! file not found
import %s failed !syntax error:
import %s failed :
import-namespace conflict for self.%s
%s: %p
io.FILE*
Invalid time:Invalid dayofweek(%d) outside valid range(0~6)
Invalid time:Invalid month(%d) outside valid range(1~12)
Invalid time:Invalid day(%d) outside valid range(1~31)
Invalid time:hour(%d) outside valid range(0~23)
Invalid time:minute (%d) outside valid range(0~59)
Invalid time:second(%d) outside valid range(0~59)
Invalid time:year(%d) outside valid range(1900~9999)
Invalid format directive(...%s)
thread.call() error
[%d]=
['%s']=
["%s"]=
%s'%s'
%s"%s"
%snull
%stopointer(0x%p)
io.file(closed)
io.file(%p)
standard %s file is closed
cdata( by raw.malloc() )
%s\%s
_exepath
_exedir
_exefile
char(%d)
near:...'%s'
byte:%s
$"%s"
%s: %s in precompiled chunk
expected:'%s'
main function has more than %d %s
function at line %d has more than %d %s
match for:'%s'
match line:%d
expected:keyword
%H:%M:%S
%m/%d/%y %H:%M:%S
%m/%d/%y
?#%X.y
%S#[k
ole32.dll
SHDeleteKeyA
SHLWAPI.dll
GetProcessHeap
GetCPInfo
CreatePipe
KERNEL32.dll
USER32.dll
SetViewportExtEx
SetViewportOrgEx
GDI32.dll
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
ADVAPI32.dll
OLEAUT32.dll
zcÁ
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe
@E:\AAuto\lib\com\flash\_.aau
util.metaProperty
com.flash.xml
ShockwaveFlash.ShockwaveFlash
@E:\AAuto\lib\com\flash\xml.aau
string.xml
@E:\AAuto\lib\com\picture.aau
com.picture
win.guid
win.ole
@lib\config.aau
fsys.config
@E:\AAuto\lib\fsys\_.aau
fsys.path
SHFileOperation
SHFileOperationA
operation
Shlwapi.dll
fsys.shortpath()
joinpath
int hwnd;INT wFunc;string pFrom;string pTo;WORD fFlags;int fAnyOperationsAborted;pointer hNameMappings;string lpszProgressTitle
@E:\AAuto\lib\fsys\config.aau
fsys.table
.table
@E:\AAuto\lib\fsys\path.aau
[\\/:*?"<>|]
@E:\AAuto\lib\fsys\table.aau
@E:\AAuto\lib\gdi\_.aau
.LOGFONT
Gdi32.dll
int(ptr hdcDest,int xoriginDest,int yoriginDest,int wDest,int hDest,pointer hdcSrc,int xoriginSrc,int yoriginSrc,int wSrc,int hSrc,INT crTransparent)
ptr hdcSrc, struct ptSrc, INT crKey,struct blend, INT flags)
crKey
@E:\AAuto\lib\preload\_.aau
User32.dll
Kernel32.dll
MsgWaitForMultipleObjects
EXCEPTION_FLT_DENORMAL_OPERAND
EXCEPTION_FLT_INVALID_OPERATIO
0xX
\.*(. )(%\[\])$
\.*(. )\.([^.] )$
keys
msgWaitForMultipleObjects
@E:\AAuto\lib\string\xml.aau
<%s%s>%s
<%s%s>%s%s</%s>%s
<%s%s/>%s
(.*?)<@]]>@>
^\<\!\-\-.*?\-\-\>
^\<\!.*?\-\-\>
@E:\AAuto\lib\util\metaProperty.aau
@E:\AAuto\lib\win\_.aau
int(addr hwnd,INT msg,ADDR wParam,addr lParam)
int(pointer lpPrevWndFunc,addr hwnd,INT Msg,ADDR wParam,addr lParam)
addr(addr hwnd,INT msg,ADDR wParam,addr lParam)
addr(int idThread,INT msg,ADDR wParam,addr lParam)
addr(addr hwnd,INT msg,pointer wParam,pointer lParam)
addr(addr hwnd,INT msg,int &wParam,int &lParam)
addr(addr hwnd,INT msg,pointer wParam,pointer lParam,INT flags,INT timeout,int & resultult)
GetAsyncKeyState
word(int vKey)
GetKeyState
word( int vKey)
int( addr hwnd,INT uCmd)
bool(addr hwnd,int cmd)
msgbox
msgboxErr
msgboxTest
msgboxTimeout
win.invoke()
INT(int hDlg,struct IpMsgc)
UxTheme.dll
msg_observer
@E:\AAuto\lib\win\guid.aau
Rpcrt4
Rpcrt4.dll
Ole32.dll
@E:\AAuto\lib\win\ole\_.aau
Oleaut32.dll
@E:\AAuto\lib\win\ui\_.aau
win.ui.background
RegisterHotKey
UnregisterHotKey
int(int hwnd,int crKey,BYTE bAlpha,INT dwFlags)
.win.ui.ctrl
reghotkey
unreghotkey
cmdTranslate
%s[TID:%d]
_hotkeys
@E:\AAuto\lib\win\ui\background.aau
win.ui
@Publish\release.win.ui.ctrl.aau
win.ui.ctrl.common
win.ui.ctrl.metaProperty
win.ui.ctrl.button
win.ui.ctrl
win.ui.ctrl.custom
@E:\AAuto\lib\win\ui\ctrl\button.aau
@E:\AAuto\lib\win\ui\ctrl\common.aau
Comctl32.dll
@E:\AAuto\lib\win\ui\ctrl\custom.aau
@E:\AAuto\lib\win\ui\ctrl\metaProperty.aau
@E:\AAuto\lib\winex\_.aau
EnumWindows
EnumChildWindows
enumWindows
cmdid
@main.aau
com.flash
scratch\open.fnr
?http
by hXXp://hi.baidu.com/scratch
version="5.1.0.0"
13.exe"/>
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><!--The ID below indicates application support for Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>mscoree.dll
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
KERNEL32.DLL
WUSER32.DLL
Interface: %s
COM.FLASH
COM.FLASH.XML
COM.PICTURE
FSYS.CONFIG
FSYS.PATH
FSYS.TABLE
STRING.XML
UTIL.METAPROPERTY
WIN.GUID
WIN.OLE
WIN.UI
WIN.UI.BACKGROUND
WIN.UI.CTRL
WIN.UI.CTRL.BUTTON
WIN.UI.CTRL.COMMON
WIN.UI.CTRL.CUSTOM
WIN.UI.CTRL.METAPROPERTY
yz.lhuo@gmail.com
0.0.0.4
.........................exe>
scratch2exe.exe
s2exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:3880
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Project151Map.sb2 (36078 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe (30480 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\open.fnr (66362 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nszB9CE.tmp (131050 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar4183.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DFECE1A4D0C745EF29E7B51A2DA008B8 (1454 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0DD30266AF9B4A57FF10335BAF014F_1A83F80A2067DD202B16599AA2CE4194 (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9B (2674 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab4182.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA72AE1092979CCD3A7B12BE5EF5A9A2 (1252 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DFECE1A4D0C745EF29E7B51A2DA008B8 (2730 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9B (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FA72AE1092979CCD3A7B12BE5EF5A9A2 (650 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0DD30266AF9B4A57FF10335BAF014F_1A83F80A2067DD202B16599AA2CE4194 (1118 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.