Gen.Heur.Minggy.4_3443a38565
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Heur.Minggy.4 (B) (Emsisoft), Gen:Heur.Minggy.4 (AdAware), Trojan.Win32.Nedsym.FD, TrojanNedsym.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 3443a38565b09dab151e365225d41232
SHA1: 3b3631969f273743890da785f6663b0ee0e8fd29
SHA256: eea1cc00ff077f2780522de52017db470971134363ba322af9ad9a801d520b26
SSDeep: 1536:MkyrW18KMg HRwUxslEoYP5BJQINzbWj6jLudYsNLXbCWO 73miIOd:MkJMgiMEoYfeObWOjL1oPCn Lmi9
Size: 98817 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MingWin32GCC3x, UPolyXv05_v6
Company: Structure Or
Created at: 2013-06-14 22:00:12
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1688
svcnost.exe:628
The Trojan injects its code into the following process(es):
svcnost.exe:648
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1688 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\drivers\etc\hosts (5 bytes)
The Trojan deletes the following file(s):
%System%\drivers\etc\hosts (0 bytes)
The process svcnost.exe:648 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\ntuser.dat (55 bytes)
%Documents and Settings%\%current user%\Application Data\desktop.ini (9 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Application Data\desktop.ini (0 bytes)
Registry activity
The process %original file name%.exe:1688 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Init" = "%Documents and Settings%\%current user%\Application Data\xa3jicvbs1ctxanmbato2adsgw3kfglx2\svcnost.exe"
The process svcnost.exe:648 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 D9 0E 2C 94 6B E9 A6 60 5F B9 8A C3 4D 21 AB"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Internet Explorer\LowRegistry]
"SavedLegacySettingsML" = "31 36 35 32 33 38 37 33 36"
Adds a rule to the firewall Windows which allows any network activity:
[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%Documents and Settings%\%current user%\Application Data\xa3jicvbs1ctxanmbato2adsgw3kfglx2]
"svcnost.exe" = "%Documents and Settings%\%current user%\Application Data\xa3jicvbs1ctxanmbato2adsgw3kfglx2\svcnost.exe:*:Enabled:ldrsoft"
Dropped PE files
| MD5 | File path |
|---|---|
| 7e8e966927e04a35aec644602b8a9e05 | c:\Documents and Settings\"%CurrentUserName%"\Application Data\ntuser.dat |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 5915 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | downloads4.kaspersky-labs.com |
| 127.0.0.1 | downloads3.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads-us1.kaspersky-labs.com |
| 127.0.0.1 | rads.mcafee.com |
| 127.0.0.1 | www.secuser.com |
| 127.0.0.1 | a188.x.akamai.net |
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantec.d4p.net |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | ftp.nai.com |
| 127.0.0.1 | www.grisoft.cz |
| 127.0.0.1 | www.grisoft.com |
| 127.0.0.1 | free.grisoft.cz |
| 127.0.0.1 | tds.diamondcs.com.au |
| 127.0.0.1 | ieupdate.gdata.de |
| 127.0.0.1 | ieupdate6.gdata.de |
| 127.0.0.1 | ieupdate5.gdata.de |
| 127.0.0.1 | ieupdate4.gdata.de |
| 127.0.0.1 | ieupdate3.gdata.de |
| 127.0.0.1 | ieupdate2.gdata.de |
| 127.0.0.1 | ieupdate1.gdata.de |
| 127.0.0.1 | www.iavs.cz |
| 127.0.0.1 | download7.avast.com |
| 127.0.0.1 | download6.avast.com |
| 127.0.0.1 | download5.avast.com |
| 127.0.0.1 | download4.avast.com |
| 127.0.0.1 | download3.avast.com |
| 127.0.0.1 | download2.avast.com |
| 127.0.0.1 | download1.avast.com |
| 127.0.0.1 | upgrade.bitdefender.com |
| 127.0.0.1 | windowsupdate.microsoft.com |
| 127.0.0.1 | www.lavasoftusa.com |
| 127.0.0.1 | www.a-2.org |
| 127.0.0.1 | updates.a-2.org |
| 127.0.0.1 | niuone.norman.no |
| 127.0.0.1 | www.diamondcs.com.au |
| 127.0.0.1 | www.attechnical.com |
| 127.0.0.1 | www.zeylstra.nl |
| 127.0.0.1 | fractus.mat.uson.mx |
| 127.0.0.1 | www.toonbox.de |
| 127.0.0.1 | radius.turvamies.com |
| 127.0.0.1 | diamondcs.fileburst.com |
| 127.0.0.1 | downloads.My-eTrust.com |
| 127.0.0.1 | acs.pandasoftware.com |
| 127.0.0.1 | v4.windowsupdate.microsoft.com |
| 127.0.0.1 | www.NoAdware.net |
| 127.0.0.1 | www.nod32.com |
| 127.0.0.1 | www.eset.sk |
| 127.0.0.1 | avu.zonelabs.com |
| 127.0.0.1 | retail.sp.f-secure.com |
| 127.0.0.1 | retail01.sp.f-secure.com |
| 127.0.0.1 | retail02.sp.f-secure.com |
| 127.0.0.1 | www.moosoft.com |
| 127.0.0.1 | secuser.model-fx.com |
| 127.0.0.1 | secuser.com |
| 127.0.0.1 | downloads-eu1.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | downloads4.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | pccreg.antivirus.com |
| 127.0.0.1 | dl1.antivir.de |
| 127.0.0.1 | dl2.antivir.de |
| 127.0.0.1 | dl3.antivir.de |
| 127.0.0.1 | dl4.antivir.de |
| 127.0.0.1 | ad.doubleclick.net |
| 127.0.0.1 | ad.fastclick.net |
| 127.0.0.1 | ads.fastclick.net |
| 127.0.0.1 | ar.atwola.com |
| 127.0.0.1 | atdmt.com |
| 127.0.0.1 | avp.ch |
| 127.0.0.1 | avp.com |
| 127.0.0.1 | avp.com |
| 127.0.0.1 | avp.ru |
| 127.0.0.1 | awaps.net |
| 127.0.0.1 | banner.fastclick.net |
| 127.0.0.1 | banners.fastclick.net |
| 127.0.0.1 | ca.com |
| 127.0.0.1 | ca.com |
| 127.0.0.1 | click.atdmt.com |
| 127.0.0.1 | clicks.atdmt.com |
| 127.0.0.1 | customer.symantec.com |
| 127.0.0.1 | dispatch.mcafee.com |
| 127.0.0.1 | dispatch.mcafee.com |
| 127.0.0.1 | download.mcafee.com |
| 127.0.0.1 | download.mcafee.com |
| 127.0.0.1 | download.mcafee.com |
| 127.0.0.1 | download.microsoft.com |
| 127.0.0.1 | downloads.microsoft.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | downloads3.kaspersky-labs.com |
| 127.0.0.1 | downloads4.kaspersky-labs.com |
| 127.0.0.1 | downloads-us1.kaspersky-labs.com |
| 127.0.0.1 | downloads-us2.kaspersky-labs.com |
| 127.0.0.1 | downloads-us3.kaspersky-labs.com |
| 127.0.0.1 | engine.awaps.net |
| 127.0.0.1 | fastclick.net |
| 127.0.0.1 | f-secure.com |
| 127.0.0.1 | f-secure.com |
| 127.0.0.1 | ftp.avp.ch |
| 127.0.0.1 | ftp.downloads2.kaspersky-labs.com |
| 127.0.0.1 | ftp.f-secure.com |
| 127.0.0.1 | ftp.kasperskylab.ru |
| 127.0.0.1 | ftp.sophos.com |
| 127.0.0.1 | go.microsoft.com |
| 127.0.0.1 | ids.kaspersky-labs.com |
| 127.0.0.1 | kaspersky.com |
| 127.0.0.1 | kaspersky-labs.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | mast.mcafee.com |
| 127.0.0.1 | mast.mcafee.com |
| 127.0.0.1 | mcafee.com |
| 127.0.0.1 | mcafee.com |
| 127.0.0.1 | media.fastclick.net |
| 127.0.0.1 | msdn.microsoft.com |
| 127.0.0.1 | my-etrust.com |
| 127.0.0.1 | my-etrust.com |
| 127.0.0.1 | nai.com |
| 127.0.0.1 | nai.com |
| 127.0.0.1 | networkassociates.com |
| 127.0.0.1 | networkassociates.com |
| 127.0.0.1 | office.microsoft.com |
| 127.0.0.1 | phx.corporate-ir.net |
| 127.0.0.1 | rads.mcafee.com |
| 127.0.0.1 | secure.nai.com |
| 127.0.0.1 | secure.nai.com |
| 127.0.0.1 | securityresponse.symantec.com |
| 127.0.0.1 | securityresponse.symantec.com |
| 127.0.0.1 | service1.symantec.com |
| 127.0.0.1 | sophos.com |
| 127.0.0.1 | sophos.com |
| 127.0.0.1 | spd.atdmt.com |
| 127.0.0.1 | support.microsoft.com |
| 127.0.0.1 | symantec.com |
| 127.0.0.1 | symantec.com |
| 127.0.0.1 | trendmicro.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | updates.symantec.com |
| 127.0.0.1 | updates.symantec.com |
| 127.0.0.1 | updates1.kaspersky-labs.com |
| 127.0.0.1 | updates1.kaspersky-labs.com |
| 127.0.0.1 | updates2.kaspersky-labs.com |
| 127.0.0.1 | updates3.kaspersky-labs.com |
| 127.0.0.1 | updates3.kaspersky-labs.com |
| 127.0.0.1 | updates4.kaspersky-labs.com |
| 127.0.0.1 | updates5.kaspersky-labs.com |
| 127.0.0.1 | us.mcafee.com |
| 127.0.0.1 | us.mcafee.com |
| 127.0.0.1 | vil.nai.com |
| 127.0.0.1 | viruslist.com |
| 127.0.0.1 | viruslist.ru |
| 127.0.0.1 | windowsupdate.microsoft.com |
| 127.0.0.1 | www.avp.ch |
| 127.0.0.1 | www.avp.com |
| 127.0.0.1 | www.avp.com |
| 127.0.0.1 | www.avp.ru |
| 127.0.0.1 | www.awaps.net |
| 127.0.0.1 | www.ca.com |
| 127.0.0.1 | www.ca.com |
| 127.0.0.1 | www.fastclick.net |
| 127.0.0.1 | www.f-secure.com |
| 127.0.0.1 | www.f-secure.com |
| 127.0.0.1 | www.grisoft.com |
| 127.0.0.1 | www.kaspersky.com |
| 127.0.0.1 | www.kaspersky.ru |
| 127.0.0.1 | www.kaspersky.ru |
| 127.0.0.1 | www.kaspersky-labs.com |
| 127.0.0.1 | www.mcafee.com |
| 127.0.0.1 | www.mcafee.com |
| 127.0.0.1 | www.my-etrust.com |
| 127.0.0.1 | www.my-etrust.com |
| 127.0.0.1 | www.nai.com |
| 127.0.0.1 | www.nai.com |
| 127.0.0.1 | www.networkassociates.com |
| 127.0.0.1 | www.networkassociates.com |
| 127.0.0.1 | www.sophos.com |
| 127.0.0.1 | www.sophos.com |
| 127.0.0.1 | www.symantec.com |
| 127.0.0.1 | www.symantec.com |
| 127.0.0.1 | www.trendmicro.com |
| 127.0.0.1 | www.trendmicro.com |
| 127.0.0.1 | www.viruslist.com |
| 127.0.0.1 | www.viruslist.ru |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: xcbehj
Product Name: h465h46
Product Version: 2.5
Legal Copyright: yw334hz
Legal Trademarks: j46kiewb7
Original Filename: h654j564
Internal Name: k78lotj
File Version: 6.4
File Description: j65j
Comments:
Language: Chinese (Simplified, PRC)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 9876 | 10240 | 3.89165 | c1bd615959d823845ba987fae06b92df |
| .data | 16384 | 3664 | 4096 | 0.536387 | f2b125ad19f8485dd1c0e422a324cfb6 |
| .rdata | 20480 | 8288 | 8704 | 4.03099 | 3a6df5299d87f12e747bfa64baf0ca1e |
| .bss | 32768 | 432 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .idata | 36864 | 1056 | 1536 | 2.24063 | c048754d7d5c1e9ca75835b18e90867b |
| .rsrc | 40960 | 73728 | 72192 | 5.50907 | c4fa682ca36c3bdd81355d54e767154e |
| .tdata | 114688 | 4096 | 1024 | 1.79823 | 9330ce44b450af830e97f712340f0228 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
`.rsrc
kernel32.dll
PSAPI.dll
shell32.dll
\svcnost.exe
2\svcnost.exe"
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Init
.text
`.rdata
@.data
.reloc
1.2.3
LDR.ML.STARTED
user32.dll
ws2_32.dll
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
advapi32.dll
FindCloseUrlCache
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryA
wininet.dll
ole32.dll
dnsapi.dll
crypt32.dll
Mailer.dll
87.75.44.12
:9:::>:::
':::*:::
*%:*"%:*
s:\5E;
::;:::<:::<:::
9::::;::>:::
q.jlk
y.hlj
.lmD]
:*>:>:2:>:
:*>:?:*:2:
:*>:>:*:*:*
:8;8;:**
: =7::2^::2
:*==::2`::2 ::3
: =5::2\::2
:*=0::2[::2
: =7::2_::2
: =5::2]::2
(?3: ?;2,?
(?7: ?;6,?
::9:>:?:<:=:2:3:0:1:7:5: :):-:!:%:
:::;:8:9:>:?:=:3:7: :#:
;;8;9;>;<;2;6;*;";
:2:):3:);3:
;3:1:3:1;3:
;3:!:3:!;3:
;3:=:3:=;3:
;3:}:3:};3:
;3:]:3:];3:
;3:-:3:-;3:
;3:5:3:5;3:
;3:%:3:%;3:
;:::8:::9:::>:::<:::2:::6:::*:::":::
::::;:8:9:>:?:<:=:2:3:0:1:6:7:4:5:*: :(:):.:/:,:-:":#: :!:&:':$:%:
::;:8:;:::8:8:;:::8:
6h6C6V6i6
2'2-23292C2I2}2
KWindows
RegOpenKeyExA
RegCreateKeyExA
GetKeyboardType
.idata
.rdata
P.reloc
P.rsrc
>">0>5>;
-23292C2I2}2
`]VY\URLW
KERNEL32.DLL
gdi32.dll
SHFolder.dll
svcnost.exe_648_rwx_00400000_00062000:
`.rsrc
kernel32.dll
PSAPI.dll
shell32.dll
\svcnost.exe
2\svcnost.exe"
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Init
.text
`.rdata
@.data
.reloc
1.2.3
LDR.ML.STARTED
user32.dll
ws2_32.dll
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
advapi32.dll
FindCloseUrlCache
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryA
wininet.dll
ole32.dll
dnsapi.dll
crypt32.dll
Mailer.dll
87.75.44.12
:9:::>:::
':::*:::
*%:*"%:*
s:\5E;
::;:::<:::<:::
9::::;::>:::
q.jlk
y.hlj
.lmD]
:*>:>:2:>:
:*>:?:*:2:
:*>:>:*:*:*
:8;8;:**
: =7::2^::2
:*==::2`::2 ::3
: =5::2\::2
:*=0::2[::2
: =7::2_::2
: =5::2]::2
(?3: ?;2,?
(?7: ?;6,?
::9:>:?:<:=:2:3:0:1:7:5: :):-:!:%:
:::;:8:9:>:?:=:3:7: :#:
;;8;9;>;<;2;6;*;";
:2:):3:);3:
;3:1:3:1;3:
;3:!:3:!;3:
;3:=:3:=;3:
;3:}:3:};3:
;3:]:3:];3:
;3:-:3:-;3:
;3:5:3:5;3:
;3:%:3:%;3:
;:::8:::9:::>:::<:::2:::6:::*:::":::
::::;:8:9:>:?:<:=:2:3:0:1:6:7:4:5:*: :(:):.:/:,:-:":#: :!:&:':$:%:
::;:8:;:::8:8:;:::8:
6h6C6V6i6
2'2-23292C2I2}2
KWindows
RegOpenKeyExA
RegCreateKeyExA
GetKeyboardType
.idata
.rdata
P.reloc
P.rsrc
>">0>5>;
-23292C2I2}2
`]VY\URLW
KERNEL32.DLL
gdi32.dll
SHFolder.dll
svcnost.exe_648_rwx_00A01000_0001C000:
1.2.3
LDR.ML.STARTED
kernel32.dll
user32.dll
ws2_32.dll
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
advapi32.dll
FindCloseUrlCache
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryA
wininet.dll
ole32.dll
dnsapi.dll
crypt32.dll
Mailer.dll
87.75.44.12
/stat1.php
/stat2.php
/smtps.php
/u.php?
/error.php?
/logacc.php
165238736
:9:::>:::
':::*:::
*%:*"%:*
s:\5E;
::;:::<:::<:::
9::::;::>:::
q.jlk
y.hlj
.lmD]
:*>:>:2:>:
:*>:?:*:2:
:*>:>:*:*:*
:8;8;:**
: =7::2^::2
:*==::2`::2 ::3
: =5::2\::2
:*=0::2[::2
: =7::2_::2
: =5::2]::2
(?3: ?;2,?
(?7: ?;6,?
::9:>:?:<:=:2:3:0:1:7:5: :):-:!:%:
:::;:8:9:>:?:=:3:7: :#:
;;8;9;>;<;2;6;*;";
:2:):3:);3:
;3:1:3:1;3:
;3:!:3:!;3:
;3:=:3:=;3:
;3:}:3:};3:
;3:]:3:];3:
;3:-:3:-;3:
;3:5:3:5;3:
;3:%:3:%;3:
;:::8:::9:::>:::<:::2:::6:::*:::":::
::::;:8:9:>:?:<:=:2:3:0:1:6:7:4:5:*: :(:):.:/:,:-:":#: :!:&:':$:%:
::;:8:;:::8:8:;:::8:
6h6C6V6i6
2'2-23292C2I2}2
svcnost.exe_648_rwx_00A20000_0001A000:
kernel32.dll
|user32.dll
A~ws2_32.dll
qadvapi32.dll
wwininet.dll
wole32.dll
Nwdnsapi.dll
vcrypt32.dll
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1688
svcnost.exe:628 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%System%\drivers\etc\hosts (5 bytes)
%Documents and Settings%\%current user%\Application Data\ntuser.dat (55 bytes)
%Documents and Settings%\%current user%\Application Data\desktop.ini (9 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Init" = "%Documents and Settings%\%current user%\Application Data\xa3jicvbs1ctxanmbato2adsgw3kfglx2\svcnost.exe" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.