Backdoor.Win32.Caphaw_QKKBAL_a01fbf74e2

by malwarelabrobot on June 1st, 2014 in Malware Descriptions.

Susp_Dropper (Kaspersky), Gen:Variant.Kazy.24727 (B) (Emsisoft), Gen:Variant.Kazy.24727 (AdAware), Trojan-PSW.Win32.Zbot.6.FD, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan, Backdoor


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: a01fbf74e2ec3bf61cf5bb6f0d992c93
SHA1: 5ea401e79fcc3a28c22a360516936474cd22b33e
SHA256: 2d62b0b1904b0b05eb230cb4cca1a44a60e2559c4c33dbbfe1fe14c8cddf3b31
SSDeep: 3072:BqFxHpXP iYzsA3DM/25vgCFAu4Qz2c9R L9xZa9T 8UiFGPNb5EoY7RECRMDVyn:BqFn/ 5zsA3Dd5vZr4Q6cPgY9SiIPNyJ
Size: 186628 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2000-08-26 22:36:37
Analyzed on: WindowsXP SP3 32-bit


Summary:

Backdoor. Malware that enables a remote control of victim's machine.

Payload

No specific payload has been found.

Process activity

The Backdoor creates the following process(es):

hivai.exe:1472
%original file name%.exe:1368

The Backdoor injects its code into the following process(es):

Explorer.EXE:1572

File activity

The process %original file name%.exe:1368 makes changes in the file system.
The Backdoor creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tmp996de2de.bat (177 bytes)
%Documents and Settings%\%current user%\Application Data\Seizu\hivai.exe (186 bytes)

Registry activity

The process hivai.exe:1472 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "98 8C 04 F2 97 7F 25 C3 C8 2A DC F1 41 5D F2 A7"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Edeci]
"Upafb" = "A5 8A 9D D3 92 8F 74 DE F8 23 BD EF 83 90 04 E6"

The process %original file name%.exe:1368 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C 6E D1 50 2C 24 7D 95 82 39 4D A0 E2 0D D0 A2"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Edeci]
"Upafb" = "A5 8A 9D D3 92 8F 74 DE F8 23 BD EF 83 90 04 E6"

Dropped PE files

MD5 File path
88ca87d9cd483ae201cf093f48b8d70d c:\Documents and Settings\"%CurrentUserName%"\Application Data\Seizu\hivai.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

The Backdoor installs the following user-mode hooks in WININET.dll:

HttpSendRequestExA
HttpSendRequestW
InternetSetStatusCallbackW
InternetReadFileExA
InternetSetStatusCallback
InternetQueryDataAvailable
HttpSendRequestExW
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetSetOptionA

The Backdoor installs the following user-mode hooks in CRYPT32.dll:

PFXImportCertStore

The Backdoor installs the following user-mode hooks in USER32.dll:

SetCursorPos
DefMDIChildProcA
DefFrameProcA
DefDlgProcA
GetClipboardData
DefMDIChildProcW
DefFrameProcW
GetUpdateRgn
RegisterClassA
GetDCEx
ReleaseCapture
SetCapture
DefWindowProcA
CallWindowProcA
GetUpdateRect
PeekMessageA
CallWindowProcW
GetMessagePos
GetCursorPos
EndPaint
BeginPaint
DefWindowProcW
RegisterClassExA
GetMessageA
DefDlgProcW
SwitchDesktop
OpenInputDesktop
RegisterClassExW
RegisterClassW
GetCapture
PeekMessageW
GetMessageW
GetWindowDC
TranslateMessage
GetDC
ReleaseDC

The Backdoor installs the following user-mode hooks in WS2_32.dll:

WSASend
recv
WSARecv
send
closesocket

The Backdoor installs the following user-mode hooks in kernel32.dll:

GetFileAttributesExW

The Backdoor installs the following user-mode hooks in ntdll.dll:

LdrLoadDll
NtCreateThread

Propagation

VersionInfo

Company Name: Mozilla Foundation
Product Name: Network Security Services
Product Version: 3.12.9.0 Basic ECC
Legal Copyright:
Legal Trademarks:
Original Filename: nssdbm3.dll
Internal Name: nssdbm3
File Version: 3.12.9.0 Basic ECC
File Description: Legacy Database Driver
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
UPX0 4096 17330176 0 0 d41d8cd98f00b204e9800998ecf8427e
UPX1 17334272 184320 181760 5.44509 6d4bc7c84c2df7b15929af9b26ef4380
.rsrc 17518592 4096 3584 2.97526 0063fcddfa2b8d88f6ee22f393513b9f

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://www.google.com/webhp
hxxp://www.google.com/webhp?gfe_rd=cr&ei=tIiJU6atFcvm9AbUpoHgBw
hxxp://upmguspdgpmrui.org/news/?s=21920 82.165.37.26
hxxp://www.google.com.ua/webhp?gfe_rd=cr&ei=tIiJU6atFcvm9AbUpoHgBw


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET TROJAN Zeus Bot GET to Google checking Internet connectivity
ET TROJAN MUROFET/Licat Trojan

Traffic

GET /webhp HTTP/1.1
Accept: */*
Connection: Close
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.google.com
Cache-Control: no-cache


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/webhp?gfe_rd=cr&ei=tIiJU6atFcvm9AbUpoHgBw
Content-Length: 267
Date: Sat, 31 May 2014 07:45:56 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic
Connection: close
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/webhp?gfe_rd=cr&ei=tIiJU6a
tFcvm9AbUpoHgBw">here</A>...</BODY></HTML>....


GET /webhp?gfe_rd=cr&ei=tIiJU6atFcvm9AbUpoHgBw HTTP/1.1
Accept: */*
Connection: Close
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Cache-Control: no-cache
Host: VVV.google.com.ua


HTTP/1.1 200 OK
Date: Sat, 31 May 2014 07:45:56 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=78a72896167bd39e:FF=0:TM=1401522356:LM=1401522356:S=IJat1FPN3n9MgpiS; expires=Mon, 30-May-2016 07:45:56 GMT; path=/; domain=.google.com.ua
Set-Cookie: NID=67=SqWgaKmGZhn6pUM6NXNYWU4Y-gdP_UmUhNzwhQgHYMTwCus_TzCjab1TehH2uSRSQ39fcOxbrlrnLure_TyLydEqnih8cchp0Z0T7gByWSReBGylCMC3wvGMt-k7Ph2K; expires=Sun, 30-Nov-2014 07:45:56 GMT; path=/; domain=.google.com.ua; HttpOnly
P3P: CP="This is not a P3P policy! See hXXp://VVV.google.com/support/accounts/bin/answer.py?hl=en&answer=151657 for more info."
Server: gws
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Alternate-Protocol: 80:quic
Connection: close
<!doctype html><html itemscope="" itemtype="hXXp://schema.org
/WebPage" lang="uk"><head><meta content="text/html; charse
t=UTF-8" http-equiv="content-type"><meta content="/images/google
_favicon_128.png" itemprop="image"><title>Google</title>
;<script>(function(){.window.google={kEI:"tIiJU5KiNMLlsAS-3ILoBA
",getEI:function(a){for(var b;a&&(!a.getAttribute||!(b=a.getAttribute(
"eid")));)a=a.parentNode;return b||google.kEI},https:function(){return
"https:"==window.location.protocol},kEXPI:"4791,17259,4000116,4007606,
4007661,4007830,4008142,4009033,4009641,4010806,4010858,4010899,401122
8,4011258,4011679,4012373,4012504,4013414,4013591,4013723,4013758,4013
787,4013823,4013941,4013967,4013979,4014016,4014093,4014431,4014515,40
14636,4014671,4014810,4014813,4014991,4015234,4015260,4015266,4015339,
4015550,4015587,4015633,4015772,4016127,4016309,4016367,4016372,401648
7,4016824,4016855,4016882,4016933,4016950,4016976,4017063,4017224,4017
280,4017285,4017298,4017544,4017566,4017578,4017595,4017597,4017612,40
17639,4017681,4017694,4017710,4017742,4017818,4017821,4017823,4017856,
4017862,4017913,4017922,4017959,4017963,4017981,4017982,4018009,401801
9,4018089,4018130,4018176,4018283,4018363,4018367,4018424,4018480,4018
566,4018609,8300012,8300027,8500222,8500252,8500256,8500264,8500272,85
00306,8500332,8500357,8500365,8500379,8500389,8500394,8500400,8500413,
8500415,10200012,10200029,10200040,10200048,10200053,10200084,10200120
,10200134,10200136,10200155,10200160,10200164,10200184,10200211,10

<<< skipped >>>

GET /news/?s=21920 HTTP/1.1
Accept: */*
Connection: Close
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: upmguspdgpmrui.org
Cache-Control: no-cache


HTTP/1.1 404 Not Found
Server: nginx/1.4.7
Date: Sat, 31 May 2014 07:45:57 GMT
Content-Type: text/html
Content-Length: 570
Connection: close
<html>..<head><title>404 Not Found</title><
/head>..<body bgcolor="white">..<center><h1>404 N
ot Found</h1></center>..<hr><center>nginx/1.4.
7</center>..</body>..</html>..<!-- a padding to d
isable MSIE and Chrome friendly error page -->..<!-- a padding t
o disable MSIE and Chrome friendly error page -->..<!-- a paddin
g to disable MSIE and Chrome friendly error page -->..<!-- a pad
ding to disable MSIE and Chrome friendly error page -->..<!-- a
padding to disable MSIE and Chrome friendly error page -->..<!--
a padding to disable MSIE and Chrome friendly error page -->....


The Backdoor connects to the servers at the folowing location(s):

Explorer.EXE_1572_rwx_01EB0000_0002E000:

.text
`.data
.reloc
PR_OpenTCPSocket
-./0123456789
gdiplus.dll
GdiplusShutdown
HTTP/1.1
cabinet.dll
urlmon.dll
#?4)-1%3`*4(
095(2)4>'8.
/214"$#-,:
*7=.*=-;-
8,88##/#`'#5 7/3=*
8%(<;*9"
4547900
17(.3=2;
5E6/1&
&;1"&1!7!
->9!!'#-.'
tM<8sI?2aAo`svdjZNx .p.OyPa%
"?5&"5%3%5
?5$&;"%$;
REPORT
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
!!!!!!""#$%&'(((((())* ,-.IIIIIIII//I01234445656789:;9:;IIIII<=>?@ABCDEF
GetProcessHeap
KERNEL32.dll
SetKeyboardState
OpenWindowStationW
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
SetProcessWindowStation
MapVirtualKeyW
MsgWaitForMultipleObjects
GetKeyboardState
ExitWindowsEx
USER32.dll
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegCreateKeyExW
CryptImportKey
CryptDestroyKey
ADVAPI32.dll
UrlUnescapeA
SHDeleteKeyW
PathIsURLW
SHLWAPI.dll
ShellExecuteW
SHELL32.dll
Secur32.dll
ole32.dll
SetViewportOrgEx
GDI32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestA
InternetCrackUrlA
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
HttpAddRequestHeadersA
HttpOpenRequestA
WININET.dll
OLEAUT32.dll
NETAPI32.dll
msvcrt.dll
2"2&2*2.2
2"2.252^2
nspr4.dll
SysShadow
%sx.%s
%sx
e.dat
kernel32.dll
"%s" %s
/c "%s"
%Documents and Settings%\%current user%\Application Data\Tybeel\icjaa.upn
%Documents and Settings%\%current user%\Application Data\Tybeel
icjaa.upn
Global\{08FA9341-34A1-FBB9-18A0-8ECFCFF37061}
%Documents and Settings%\%current user%\Application Data
{9E81216A-868A-6DC2-18A0-8ECFCFF37061}


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Scan a system with an anti-rootkit tool.
  2. Terminate malicious process(es) (How to End a Process With the Task Manager):

    hivai.exe:1472
    %original file name%.exe:1368

  3. Delete the original Backdoor file.
  4. Delete or disinfect the following files created/modified by the Backdoor:

    %Documents and Settings%\%current user%\Local Settings\Temp\tmp996de2de.bat (177 bytes)
    %Documents and Settings%\%current user%\Application Data\Seizu\hivai.exe (186 bytes)

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now