Gen.Trojan.Heur.RP.emXaaC8yN_251e8a930a
Trojan-Downloader.Win32.Agent.ova (Kaspersky), Gen:Trojan.Heur.RP.emX@aaC8yN (B) (Emsisoft), Gen:Trojan.Heur.RP.emX@aaC8yN (AdAware), GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 251e8a930ae92a5d76b8b326726936ea
SHA1: 972e8f413a695fcf4e5db608f75939f32ea16edc
SHA256: 0986eaa479667840ccca8fc952586476300418d198b800170158ad89fb16d4d6
SSDeep: 1536:KdBp7Jo9vfxeGhqykdBPO735nouy81MZCi3b:WBLC3xeGhqdBPO1outU
Size: 78336 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualCv71EXE, UPolyXv05_v6
Company: no certificate found
Created at: 2007-05-21 16:18:28
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1008
The Trojan injects its code into the following process(es):
Explorer.EXE:884
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
No files have been created.
Registry activity
The process %original file name%.exe:1008 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 28 00 00 00 01 00 00 00 00 00 00 00"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| 4920ece94ede6b4623b6d64e2ec544d7 | c:\WINDOWS\system32\drivers\kmcxzv.sys |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 24576 bytes in size. The following strings are added to the hosts file listed below:
| 202.109.114.142 | survey88.allyes.com |
| 202.109.114.142 | adtaobao.allyes.com |
| 202.109.114.142 | code.qihoo.com |
| 202.109.114.142 | union.mop.com |
| 202.109.114.142 | js.kkunion.com |
| 202.109.114.142 | v.kkunion.com |
| 202.109.114.142 | v.21cn.com |
| 202.109.114.142 | iplusms.allyes.com |
| 202.109.114.142 | mms.t2t2.com |
| 202.109.114.142 | ivr.dobig.net |
| 202.109.114.142 | www.u8u.com |
| 202.109.114.142 | u.u8u.com |
| 202.109.114.142 | img.zhangxiu.com |
| 202.109.114.142 | tl.linktone.com |
| 202.109.114.142 | channel.e78.com |
| 202.109.114.142 | u.7town.com |
| 202.109.114.142 | union.95ol.com.cn |
| 202.109.114.142 | mms1.95ol.com.cn |
| 202.109.114.142 | mfs.95ol.com.cn |
| 202.109.114.142 | tl.a8.com |
| 202.109.114.142 | ad01.a8.com |
| 202.109.114.142 | u2.caiku.com |
| 202.109.114.142 | mms.caiku.com |
| 202.109.114.142 | code1.caiku.com |
| 202.109.114.142 | pub.lele.com |
| 202.109.114.142 | u.lele.com |
| 202.109.114.142 | 7town.com |
| 202.109.114.142 | tvsend.7town.com |
| 202.109.114.142 | ivrsend.7town.com |
| 202.109.114.142 | tlt.7town.com |
| 202.109.114.142 | gsend.7town.com |
| 202.109.114.142 | smssend.7town.com |
| 202.109.114.142 | mmssend.moyu.com |
| 202.109.114.142 | 91ivr.com |
| 202.109.114.142 | myad.91ivr.com |
| 202.109.114.142 | u.91ivr.com |
| 202.109.114.142 | union.91ivr.com |
| 202.109.114.142 | cm.p4p.cn.yahoo.com |
| 202.109.114.142 | un.265.com |
| 202.109.114.142 | union.qq.com |
| 202.109.114.142 | view.aliunion.cn.yahoo.com |
| 202.109.114.142 | union.narrowad.com |
| 202.109.114.142 | ln.heima8.com |
| 202.109.114.142 | www.fboat.cn |
| 202.109.114.142 | cpro.baidu.com |
| 202.109.114.142 | unstat.baidu.com |
| 202.109.114.142 | y.cnxad.com |
| 202.109.114.142 | www.ewowo.com |
| 202.109.114.142 | template.union.163.com |
| 202.109.114.142 | new.is686.com |
| 202.109.114.142 | creative.unionsys.bolaa.com |
| 202.109.114.142 | www.qyule.com |
| 202.109.114.142 | 99e.cc |
| 202.109.114.142 | www.91ivr.com |
| 202.109.114.142 | mg.ukaka.com |
| 202.109.114.142 | kooxoo2.ad4all.net |
| 202.109.114.142 | www.8fff.com |
| 202.109.114.142 | union.pomoho.com |
| 202.109.114.142 | 202.107.233.211 |
| 202.109.114.142 | www.end123.com |
| 202.109.114.142 | w1.7clink.com |
| 202.109.114.142 | w2.7clink.com |
| 202.109.114.142 | union01.com |
| 202.109.114.142 | click.8le8le.com |
| 202.109.114.142 | stbanner.allyes.com |
| 202.109.114.142 | mms1.moyu.com |
| 202.109.114.142 | u.moyu.com |
| 202.109.114.142 | mmsu.moyu.com |
| 202.109.114.142 | show.moyu.com |
| 202.109.114.142 | ivrsend.moyu.com |
| 202.109.114.142 | ivru.moyu.com |
| 202.109.114.142 | ivr1.moyu.com |
| 203.191.146.205 | corep.dmcast.com |
| 203.191.146.205 | m081.dmcast.com |
| 203.191.146.205 | dcww.dmcast.com |
| 203.191.146.205 | renren.dmcast.com |
| 203.191.146.205 | files.henbang.net |
| 203.191.146.205 | bannerbox.cn |
| 203.191.146.205 | www.bannerbox.cn |
| 203.191.146.205 | action.coopen.cn |
| 203.191.146.205 | u4.sky99.cn |
| 203.191.146.205 | u1.sky99.cn |
| 203.191.146.205 | u2.sky99.cn |
| 203.191.146.205 | u3.sky99.cn |
| 203.191.146.205 | sky99.cn |
| 203.191.146.205 | u.sky99.cn |
| 203.191.146.205 | u.ete.cn |
| 203.191.146.205 | ip.alexaanywhere.com |
| 203.191.146.205 | www.365tan.com |
| 203.191.146.205 | www.winopen.cn |
| 203.191.146.205 | www.tanip.com |
| 203.191.146.205 | alexaanywhere.com |
| 203.191.146.205 | jssb.alexaanywhere.com |
| 203.191.146.205 | ns250.alexaanywhere.com |
| 203.191.146.205 | sb.alexaanywhere.com |
| 203.191.146.205 | ip.alexaanywhere.com |
| 203.191.146.205 | pop.9v.cn |
| 203.191.146.205 | xuni.myad.cn |
| 203.191.146.205 | iebar.t2t2.com |
| 203.191.146.205 | error.newcell.cn |
| 203.191.146.205 | auto.search.msn.com |
| 203.191.146.205 | cns.3721.com |
| 203.191.146.205 | seek.3721.com |
| 203.191.146.205 | name.cnnic.cn |
| 203.191.146.205 | toolsbar.kuaiso.com |
| 203.191.146.205 | www.kuaiso.com |
| 203.191.146.205 | kuaiso.com |
| 203.191.146.205 | www.copyso.com |
| 203.191.146.205 | union.copyso.com |
| 203.191.146.205 | auto.search.msn.com |
| 203.191.146.205 | ok.mop-hz.com |
| 203.191.146.205 | www.ncast.cn |
| 203.191.146.205 | www.ads3721.com |
| 203.191.146.205 | 360.ads3721.com |
| 203.191.146.205 | www.maohehe.com |
| 203.191.146.205 | www.5566.net |
| 203.191.146.205 | 5566.net |
| 203.191.146.205 | www.gjj.cc |
| 203.191.146.205 | gjj.cc |
| 203.191.146.205 | www.9495.com |
| 203.191.146.205 | 9495.com |
| 203.191.146.205 | my123.com |
| 203.191.146.205 | www.my123.com |
| 203.191.146.205 | 7b.com.cn |
| 203.191.146.205 | www.7b.com.cn |
| 203.191.146.205 | www.3567.com |
| 203.191.146.205 | 3567.com |
| 203.191.146.205 | www.37021.com |
| 203.191.146.205 | 37021.com |
| 203.191.146.205 | k369.com |
| 203.191.146.205 | www.k369.com |
| 203.191.146.205 | www.haourl.com |
| 203.191.146.205 | haourl.com |
| 203.191.146.205 | www.37021.net |
| 203.191.146.205 | 37021.net |
| 203.191.146.205 | www.4199.com |
| 203.191.146.205 | 4199.com |
| 203.191.146.205 | www.9505.com |
| 203.191.146.205 | 9505.com |
| 203.191.146.205 | 7939.com |
| 203.191.146.205 | www.7939.com |
| 203.191.146.205 | www.3448.com |
| 203.191.146.205 | 3448.com |
| 203.191.146.205 | 8925.com |
| 203.191.146.205 | www.8925.com |
| 203.191.146.205 | www.ttmp3.com |
| 203.191.146.205 | ttmp3.com |
| 203.191.146.205 | www.3tg.cn |
| 203.191.146.205 | 3tg.cn |
| 203.191.146.205 | www.ttjj.com |
| 203.191.146.205 | ttjj.com |
| 203.191.146.205 | www.59178.com |
| 203.191.146.205 | 59178.com |
| 203.191.146.205 | www.987654.com |
| 203.191.146.205 | 987654.com |
| 203.191.146.205 | www.zhao123.com |
| 203.191.146.205 | zhao123.com |
| 203.191.146.205 | 123wa.com |
| 203.191.146.205 | www.123wa.com |
| 203.191.146.205 | www.159.com |
| 203.191.146.205 | soft.159.com |
| 203.191.146.205 | www.v111.com |
| 203.191.146.205 | v111.com |
| 203.191.146.205 | www.855.com |
| 203.191.146.205 | 855.com |
| 203.191.146.205 | www.wu123.com |
| 203.191.146.205 | wu123.com |
| 203.191.146.205 | www.haodx.com |
| 203.191.146.205 | haodx.com |
| 203.191.146.205 | 19ku.com |
| 203.191.146.205 | www.19ku.com |
| 203.191.146.205 | www.t2t2.com |
| 203.191.146.205 | t2t2.com |
| 203.191.146.205 | www.ku8.com |
| 203.191.146.205 | ku8.com |
| 203.191.146.205 | www.v23.com |
| 203.191.146.205 | v23.com |
| 203.191.146.205 | www.51115.com |
| 203.191.146.205 | www.52.com |
| 203.191.146.205 | 52.com |
| 203.191.146.205 | www.qu123.com |
| 203.191.146.205 | qu123.com |
| 203.191.146.205 | www.haokan123.com |
| 203.191.146.205 | haokan123.com |
| 203.191.146.205 | www.kan123.com |
| 203.191.146.205 | kan123.com |
| 203.191.146.205 | hang123.com |
| 203.191.146.205 | www.hang123.com |
| 203.191.146.205 | 3tom.com |
| 203.191.146.205 | www.3tom.com |
| 203.191.146.205 | www.anyso.com |
| 203.191.146.205 | anyso.com |
| 203.191.146.205 | 59178.com |
| 203.191.146.205 | www.59178.com |
| 203.191.146.205 | t3j4.com |
| 203.191.146.205 | www.t3j4.com |
| 203.191.146.205 | www.zh130.com |
| 203.191.146.205 | zh130.com |
| 203.191.146.205 | www.8757.com |
| 203.191.146.205 | 8757.com |
| 203.191.146.205 | www.7667.com |
| 203.191.146.205 | 7667.com |
| 203.191.146.205 | ie.union123.com |
| 203.191.146.205 | www.daohangtu.com |
| 203.191.146.205 | daohangtu.com |
| 203.191.146.205 | www.ld123.com |
| 203.191.146.205 | ld123.com |
| 203.191.146.205 | www.369.com |
| 203.191.146.205 | 369.com |
| 203.191.146.205 | 91ni.com |
| 203.191.146.205 | www.91ni.com |
| 203.191.146.205 | www.17995.com |
| 203.191.146.205 | 17995.com |
| 203.191.146.205 | www.sha123.com |
| 203.191.146.205 | sha123.com |
| 203.191.146.205 | www.lethot.com |
| 203.191.146.205 | lethot.com |
| 203.191.146.205 | www.8757.com |
| 203.191.146.205 | 8757.com |
| 203.191.146.205 | 4533.cn |
| 203.191.146.205 | 6h.com.cn |
| 203.191.146.205 | www.6h.com.cn |
| 203.191.146.205 | www.jjol.cn |
| 203.191.146.205 | jjol.cn |
| 203.191.146.205 | wangzhiku.com |
| 203.191.146.205 | www.wangzhiku.com |
| 203.191.146.205 | www.1zhan.com |
| 203.191.146.205 | 1zhan.com |
| 203.191.146.205 | www.262.com |
| 203.191.146.205 | 262.com |
| 203.191.146.205 | www.365.com |
| 203.191.146.205 | 365.com |
| 203.191.146.205 | www.4533.cn |
| 203.191.146.205 | 4533.cn |
| 203.191.146.205 | 31tg.com |
| 203.191.146.205 | www.31tg.com |
| 203.191.146.205 | tomatolei.com |
| 203.191.146.205 | www.tomatolei.com |
| 203.191.146.205 | 999cha.com |
| 203.191.146.205 | www.999cha.com |
| 127.0.0.1 | mmsk.cn |
| 127.0.0.1 | ikaka.com |
| 127.0.0.1 | safe.qq.com |
| 127.0.0.1 | 360safe.com |
| 127.0.0.1 | bbs.360safe.com |
| 127.0.0.1 | www.mmsk.cn |
| 127.0.0.1 | www.ikaka.com |
| 127.0.0.1 | tool.ikaka.com |
| 127.0.0.1 | www.360safe.com |
| 127.0.0.1 | zs.kingsoft.com |
| 127.0.0.1 | forum.ikaka.com |
| 127.0.0.1 | up.rising.com.cn |
| 127.0.0.1 | scan.kingsoft.com |
| 127.0.0.1 | kvup.jiangmin.com |
| 127.0.0.1 | reg.rising.com.cn |
| 127.0.0.1 | update.rising.com.cn |
| 127.0.0.1 | update7.jiangmin.com |
| 127.0.0.1 | download.rising.com.cn |
| 127.0.0.1 | dnl-us1.kaspersky-labs.com |
| 127.0.0.1 | dnl-us2.kaspersky-labs.com |
| 127.0.0.1 | dnl-us3.kaspersky-labs.com |
| 127.0.0.1 | dnl-us4.kaspersky-labs.com |
| 127.0.0.1 | dnl-us5.kaspersky-labs.com |
| 127.0.0.1 | dnl-us6.kaspersky-labs.com |
| 127.0.0.1 | dnl-us7.kaspersky-labs.com |
| 127.0.0.1 | dnl-us8.kaspersky-labs.com |
| 127.0.0.1 | dnl-us9.kaspersky-labs.com |
| 127.0.0.1 | dnl-us10.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu1.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu2.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu3.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu4.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu5.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu6.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu7.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu8.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu9.kaspersky-labs.com |
| 127.0.0.1 | dnl-eu10.kaspersky-labs.com |
| 203.191.146.205 | www.ab365.com |
| 203.191.146.205 | ab365.com |
| 203.191.146.205 | www.5235.net |
| 203.191.146.205 | 5235.net |
Rootkit activity
Using the driver "%System%\drivers\jjuoxu.sys" the Trojan controls creation and closing of processes by installing the process notifier.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 45056 | 45056 | 3.94968 | 625e55ffac524678d252ff8084fc0ce2 |
| UPX1 | 49152 | 24576 | 23040 | 3.89538 | 1d99c1a329d55752025e0cab40841754 |
| UPX2 | 73728 | 4096 | 1536 | 1.63095 | ba5a821811227372d21f189b68947c99 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
user32.dll
kernel32.dll
%System%\jjuoxu.dll
Explorer.EXE_884_rwx_01CA0000_00004000:
Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel
Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu
{871C5380-42A0-1069-A2EA-08002B30309D}VVV.haol23.net/?a29//
\Internet Explorer\IEXPLORE.EXE
msvcrt
000000000000
1234567890
XXXXXX
kernel32.dll
user32.dll
explorer.exe
msvcrt.dll
KERNEL32.dll
USER32.dll
ADVAPI32.dll
SHELL32.dll
ole32.dll
HttpQueryInfoA
InternetOpenUrlA
WININET.dll
SHLWAPI.dll
RPCRT4.dll
NETAPI32.dll
PSAPI.DLL
QqHelperJ.dll
20150412
hXXp://update.microfsot.cn/dl/1.dat?%s
2#2*21292
4&4,42484
\Internet Explorer.lnk
Q\bc_aCroetqMLA.qM
RRlh?Jqka=1.mfTffrcR\TaeGgLE=qi
/.khJpoO?H4_F22qk-j
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1008
- Delete the original Trojan file.
- Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.