Gen.Variant.FAkeAlert.105_d5b4bccbe6
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.FAkeAlert.105 (B) (Emsisoft), Gen:Variant.FAkeAlert.105 (AdAware), Backdoor.Win32.PcClient.FD (Lavasoft MAS)
Behaviour: Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: d5b4bccbe6d9d2218e96deeac46b6cc1
SHA1: ffda30556cb6261a52e0dba8745aa9516605b09e
SHA256: ea58dc84f7b1c86710a5823d08afd4c89b9da1dbf61c1fbb2b6984847dae1c52
SSDeep: 49152:MqauozZLQ0kFkXqjTE/PLOP0u6oEh/A16/whGeql3pTsDw:Mpu0ZL6K0Y/PLDzvhY16oh3qdF6
Size: 2476032 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2013-12-12 22:56:10
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
taskkill.exe:1704
taskkill.exe:532
taskkill.exe:904
FAPCF MODZ.exe:520
FAPCFPACK.EXE:2016
DYB.exe:1840
RunDll32.exe:744
RunDll32.exe:696
00TZ5CGTPfuLyfbQ8kKV.EXE:128
%original file name%.exe:1336
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process FAPCF MODZ.exe:520 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\FAPCF\FAPCFPACK.EXE (282 bytes)
The Trojan deletes the following file(s):
%WinDir%\FAPCF\__tmp_rar_sfx_access_check_1412062 (0 bytes)
The process FAPCFPACK.EXE:2016 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\FAPCF\TapXbJybJI5pNzGrvcF4.DB (221 bytes)
%WinDir%\FAPCF\qJXdlc2OnXz60MfVjIYf.DB (157 bytes)
%WinDir%\FAPCF\ERCzL3JyfBqHk43P3Ec3.DB (6358 bytes)
%WinDir%\FAPCF\00TZ5CGTPfuLyfbQ8kKV.EXE (5442 bytes)
%WinDir%\FAPCF\go1.bat (80 bytes)
%WinDir%\FAPCF\FAPCF.DAT (99 bytes)
C:\RCX7D.tmp (121361 bytes)
C:\RCX7E.tmp (122212 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\~DF3565.tmp (0 bytes)
%WinDir%\FAPCF\TapXbJybJI5pNzGrvcF4.DB (0 bytes)
%WinDir%\FAPCF\qJXdlc2OnXz60MfVjIYf.DB (0 bytes)
%WinDir%\FAPCF\ERCzL3JyfBqHk43P3Ec3.DB (0 bytes)
The process DYB.exe:1840 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\All Users\Application Data\NLA\DYB.004 (5118 bytes)
The process 00TZ5CGTPfuLyfbQ8kKV.EXE:128 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6XM9U9Q3\FAPCF[1].HTML (702 bytes)
%System%\drivers\etc\hosts.ics (508 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\8NY507IB\18216[1].htm (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\8NY507IB\anti[1].php (506 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6RGX0FS3\263[1].png (324 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6XM9U9Q3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\8NY507IB\desktop.ini (67 bytes)
%System%\drivers\etc\hosts (508 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6XM9U9Q3\ajax-loader[1].gif (4015 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\F0RK31OK\37481[1].htm (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\F0RK31OK\desktop.ini (67 bytes)
%Documents and Settings%\All Users\Desktop\FAPCF ONE.lnk (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6RGX0FS3\desktop.ini (67 bytes)
The process %original file name%.exe:1336 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\FAPCF MODZ.exe (1652 bytes)
%WinDir%\BGDLOC\DYB.00 (1 bytes)
%WinDir%\BGDLOC\DYB.exe (15021 bytes)
%WinDir%\BGDLOC\DYB.02 (56 bytes)
%WinDir%\BGDLOC\DYB.01 (81 bytes)
Registry activity
The process taskkill.exe:1704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "30 18 D0 72 3D 44 5F C6 83 F0 2F BE 9A DE 11 ED"
The process taskkill.exe:532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "32 DE 3B ED D7 62 99 2F 91 0E 3F CE 79 13 93 57"
The process taskkill.exe:904 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F5 A9 16 AD 3D 62 D6 D2 AC 1E 9C 94 27 17 9D 6F"
The process FAPCF MODZ.exe:520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B C0 D7 40 D4 40 6D 35 78 9E 49 E3 B5 2A B4 77"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%WinDir%\FAPCF]
"FAPCFPACK.EXE" = "FAPCFPACK"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"taskkill.exe" = "Kill Process"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The process FAPCFPACK.EXE:2016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 9A 3B B8 E5 28 84 F7 3C 5C 4B E2 BD 92 C1 91"
The process DYB.exe:1840 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 B6 54 14 13 3F 77 0C 89 F2 A0 3A A7 4A 90 22"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DYB Start" = "%WinDir%\BGDLOC\DYB.exe"
The process RunDll32.exe:744 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "51 91 D5 9A 22 9A 66 0B DF 41 E7 66 BA 2C 0D 54"
The process RunDll32.exe:696 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C5 86 9B 1C 20 CC FE 30 84 E8 65 39 E2 12 80 B5"
The process 00TZ5CGTPfuLyfbQ8kKV.EXE:128 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1407345815"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"NetHood" = "%Documents and Settings%\%current user%\NetHood"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 16 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Templates" = "%Documents and Settings%\%current user%\Templates"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "00TZ5CGTPfuLyfbQ8kKV.EXE"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"SendTo" = "%Documents and Settings%\%current user%\SendTo"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Startup" = "%Documents and Settings%\All Users\Start Menu\Programs\Startup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"PrintHood" = "%Documents and Settings%\%current user%\PrintHood"
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Fonts" = "%WinDir%\Fonts"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A1 91 41 34 7B D8 56 02 90 B2 7B EE 0B 2A B9 64"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Recent" = "%Documents and Settings%\%current user%\Recent"
"Favorites" = "%Documents and Settings%\%current user%\Favorites"
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process %original file name%.exe:1336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C C9 20 2A 67 FE F0 5C 2E B1 C6 F0 CB B1 0D 0B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\c:]
"FAPCF MODZ.exe" = "FAPCF MODZ"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%WinDir%\BGDLOC]
"DYB.exe" = "DYB"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
| MD5 | File path |
|---|---|
| 1762b39dd37d5e1c63fbfdf021cbfedb | c:\FAPCF MODZ.exe |
| 01e52cc38f3fe324a9e26ddb36dc89e5 | c:\WINDOWS\BGDLOC\DYB.01 |
| d2953694651198b4e9031578bf52a939 | c:\WINDOWS\BGDLOC\DYB.02 |
| 9dd994d5ee6dd09ab083d20d6c887db9 | c:\WINDOWS\BGDLOC\DYB.exe |
| 0235b2e42d43961cc569f7f63e5e1b41 | c:\WINDOWS\FAPCF\00TZ5CGTPfuLyfbQ8kKV.EXE |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 506 bytes in size. The following strings are added to the hosts file listed below:
| 9.9.9.9 | mobily.pw |
| 9.9.9.9 | patron.tweethashcount.com |
| 9.9.9.9 | track.ttswebdesign.com |
| 9.9.9.9 | grizzl.thewell-beingcompany.com |
| 9.9.9.9 | rdp.thewalkinginstitute.com |
| 9.9.9.9 | welcome.thesplitscreenphotobooth.com |
| 9.9.9.9 | hello.thesplitscreenphotobooth.com |
| 9.9.9.9 | welcome.thecraftbarnwales.com |
| 9.9.9.9 | hello.sylvanstructures.com |
| 9.9.9.9 | remote.sylvanstructures.com |
| 9.9.9.9 | wuah.chekc.co.vu |
| 9.9.9.9 | canmacar.com |
| 9.9.9.9 | www.canmacar.com |
| 9.9.9.9 | phaelixe.com |
| 9.9.9.9 | nitrous.cf |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 40340 | 40448 | 4.81966 | 2d733d29919d8bc133e77c2de5eec471 |
| .rdata | 45056 | 9232 | 9728 | 3.72958 | 88e41e43a2075dc0bf713901dd97f9a1 |
| .data | 57344 | 8032 | 3584 | 1.58991 | d4668da877d58af66239b78e3837253f |
| .rsrc | 65536 | 2416044 | 2416128 | 5.3535 | 21634aed8a1932aea5e1de2f7c896b2c |
| .reloc | 2482176 | 4752 | 5120 | 2.51898 | 8d3f6fb3c0a2cc24688e73c583565978 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://antiweb.zapto.org/ | |
| hxxp://googlecode.l.googleusercontent.com/svn/trunk/anti.php | |
| hxxp://googlecode.l.googleusercontent.com/svn/trunk/FAPCF.HTML | |
| hxxp://whos.amung.us/swidget/fapcfone.png | |
| hxxp://ad.a-ads.com/37481?size=990x90 | |
| hxxp://ad.a-ads.com/18216?size=990x90 | |
| hxxp://widgets.amung.us/small/02/263.png | |
| hxxp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML | |
| hxxp://cfpro00007.googlecode.com/svn/trunk/anti.php | |
| hxxp://fapcf001.ddns.net/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET / HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: antiweb.zapto.org
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Mon, 01 Sep 2014 04:53:38 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Location: hXXp://cfpro00007.googlecode.com/svn/trunk/anti.php
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
GET /small/02/263.png HTTP/1.1
Accept: */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Connection: Keep-Alive
Host: widgets.amung.us
HTTP/1.1 200 OK
Server: nginx/1.2.4
Date: Mon, 01 Sep 2014 04:53:40 GMT
Content-Type: image/png
Content-Length: 324
Last-Modified: Sun, 13 Jun 2010 09:48:29 GMT
Connection: keep-alive
Expires: Wed, 01 Oct 2014 04:53:40 GMT
Cache-Control: max-age=2592000
Accept-Ranges: bytes.PNG........IHDR...P.........D......9PLTE.bM.nX.82.G:................z
c.....z.UC..n.'-00/...555...........IDAT8...... .E.C.=j..?v...7uK....x
r[(M.E.$.!t.B...!3.|U..-.C...21.;..|..........".).g..d} ..U.[... ..@!.
.0.4.:.A>...D.Y.i..4.du]H..v....b....%.../.k.Y......<.a.e.D..-.G
.Z..p>p..!...z.h.1u...S..a/7..Y.I._.......IEND.B`...
GET / HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: fapcf001.ddns.net
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Mon, 01 Sep 2014 04:53:39 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Location: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
GET /svn/trunk/anti.php HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Connection: Keep-Alive
Host: cfpro00007.googlecode.com
HTTP/1.1 200 OK
Date: Mon, 01 Sep 2014 04:53:38 GMT
Server: Apache
Last-Modified: Fri, 15 Aug 2014 09:50:54 GMT
ETag: "10//trunk/anti.php"
Accept-Ranges: bytes
Expires: Mon, 01 Sep 2014 04:56:38 GMT
Cache-Control: public, max-age=180
Content-Length: 506
Content-Type: text/plain
Alternate-Protocol: 80:quic9.9.9.9 mobily.pw..9.9.9.9 patron.tweethashcount.com..9.9.9.9 track.tt
swebdesign.com..9.9.9.9 grizzl.thewell-beingcompany.com..9.9.9.9 rdp.t
hewalkinginstitute.com..9.9.9.9 welcome.thesplitscreenphotobooth.com..
9.9.9.9 hello.thesplitscreenphotobooth.com..9.9.9.9 welcome.thecraftba
rnwales.com..9.9.9.9 hello.sylvanstructures.com..9.9.9.9 remote.sylvan
structures.com..9.9.9.9 wuah.chekc.co.vu..9.9.9.9 canmacar.com..9.9.9.
9 VVV.canmacar.com..9.9.9.9 phaelixe.com..9.9.9.9 nitrous.cf..9.9.9.9
godlikeweapon.pw....
GET /svn/trunk/FAPCF.HTML HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cfpro00007.googlecode.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 01 Sep 2014 04:53:40 GMT
Server: Apache
Last-Modified: Sun, 31 Aug 2014 06:45:01 GMT
ETag: "22//trunk/FAPCF.HTML"
Accept-Ranges: bytes
Expires: Mon, 01 Sep 2014 04:56:40 GMT
Cache-Control: public, max-age=180
Content-Length: 1870
Content-Type: text/plain
Alternate-Protocol: 80:quic<html><head><meta http-equiv="content-type" content="te
xt/html;charset=utf-8"><title></title></head><
body>..<script type="text/javascript">.. var webLink = new
Array("hXXp://fpsmodz.net<=>SynBoz crossfire modz working<=&
gt;SynBoz crossfire modz working<=>SynBoz crossfire modz working
");..var randNumber = Math.floor(Math.random() * webLink.length);..
var linkActive = webLink[randNumber];..... function eLinkActive(){.
...document.write("<div id='ACTIVEWEB'>" linkActive "");.. }..
</script><font color="white">..<script type="text/ja
vascript">eLinkActive()</script></font>..<font color
="white">..<div id="NOTE">INFOMATION: (31/08/2014) UPDATE FAP
CF ONE V4.8 - FIX XTRAP - SUPPORT CF: NA - EU - BZ - RU - PH - INDO -
KOREA - TAIWAN - SEA - ES !!!</div>..<div id="DLLINK">htt
p://VVV.fapcf.com</div>..<div id="VERHACK">4.73</div>
;..<div id="VERMODZ">FAPCF ONE V4.8 (31/08/2014) - FIX XTRAP<
/div>..<div id="CTIME">60</div>..<div id="WEBPOP">
;hXXp://VVV.fapcf.com</div>..<div id="LB">linkbucks.com/hL
8y,linkbucks.com/hL8n,linkbucks.com/hL7q,linkbucks.com/hL8y,linkbucks.
com/hL8n,linkbucks.com/hL7q</div>..<div id="ADF">adf.ly/rK
9vX,adf.ly/rK9ur,adf.ly/rK9sM,adf.ly/rK9qD,adf.ly/rK9vX,adf.ly/rK9ur,a
df.ly/rK9sM,adf.ly/rK9qD</div>..</font>..<iframe data-a
a='37481' src='//ad.a-ads.com/37481?size=990x90' scrolling='no' st<<< skipped >>>
GET /37481?size=990x90 HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: ad.a-ads.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html;charset=utf-8
Content-Length: 5342
Connection: keep-alive
Status: 200 OK
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Powered-By: Phusion Passenger 4.0.44
Date: Mon, 01 Sep 2014 04:53:40 GMT
Server: nginx/1.6.0 Phusion Passenger 4.0.44<!DOCTYPE html>.<html lang='en'>.<head>.<style>
;. body{font:13px/1.231 arial,helvetica,clean,sans-serif;*font-size:s
mall;*font:x-small}select,input,textarea,button{font:99% arial,helveti
ca,clean,sans-serif}table{font-size:inherit;font:100%}pre,code,kbd,sam
p,tt{font-family:monospace;*font-size:108%;line-height:100%}html,body{
margin:0;padding:0;background:0 transparent;font-size:16px;font-family
:"Helvetica Neue",Helvetica,Arial,sans-serif}p,a,small{text-align:cent
er}a{color:#0069d6;text-decoration:none;line-height:inherit;font-weigh
t:inherit}a:hover{color:#00438a;text-decoration:underline}.size120x60,
.size120x60 .cell{width:120px;height:60px}.size120x90,.size120x90 .cel
l{width:120px;height:90px}.size120x240,.size120x240 .cell{width:120px;
height:240px}.size120x600,.size120x600 .cell{width:120px;height:600px}
.size125x125,.size125x125 .cell{width:125px;height:125px}.size160x90,.
size160x90 .cell{width:160px;height:90px}.size160x600,.size160x600 .ce
ll{width:160px;height:600px}.size180x90,.size180x90 .cell{width:180px;
height:90px}.size180x150,.size180x150 .cell{width:180px;height:150px}.
size200x90,.size200x90 .cell{width:200px;height:90px}.size200x200,.siz
e200x200 .cell{width:200px;height:200px}.size234x60,.size234x60 .cell{
width:234px;height:60px}.size240x400,.size240x400 .cell{width:240px;he
ight:400px}.size250x250,.size250x250 .cell{width:250px;height:250px}.s
ize300x250,.size300x250 .cell{width:300px;height:250px}.size320x50,.si
ze320x50 .cell{width:320px;height:50px}.size336x280,.size336x280 .<<< skipped >>>
GET /18216?size=990x90 HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: ad.a-ads.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html;charset=utf-8
Content-Length: 5355
Connection: keep-alive
Status: 200 OK
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Powered-By: Phusion Passenger 4.0.44
Date: Mon, 01 Sep 2014 04:53:40 GMT
Server: nginx/1.6.0 Phusion Passenger 4.0.44<!DOCTYPE html>.<html lang='en'>.<head>.<style>
;. body{font:13px/1.231 arial,helvetica,clean,sans-serif;*font-size:s
mall;*font:x-small}select,input,textarea,button{font:99% arial,helveti
ca,clean,sans-serif}table{font-size:inherit;font:100%}pre,code,kbd,sam
p,tt{font-family:monospace;*font-size:108%;line-height:100%}html,body{
margin:0;padding:0;background:0 transparent;font-size:16px;font-family
:"Helvetica Neue",Helvetica,Arial,sans-serif}p,a,small{text-align:cent
er}a{color:#0069d6;text-decoration:none;line-height:inherit;font-weigh
t:inherit}a:hover{color:#00438a;text-decoration:underline}.size120x60,
.size120x60 .cell{width:120px;height:60px}.size120x90,.size120x90 .cel
l{width:120px;height:90px}.size120x240,.size120x240 .cell{width:120px;
height:240px}.size120x600,.size120x600 .cell{width:120px;height:600px}
.size125x125,.size125x125 .cell{width:125px;height:125px}.size160x90,.
size160x90 .cell{width:160px;height:90px}.size160x600,.size160x600 .ce
ll{width:160px;height:600px}.size180x90,.size180x90 .cell{width:180px;
height:90px}.size180x150,.size180x150 .cell{width:180px;height:150px}.
size200x90,.size200x90 .cell{width:200px;height:90px}.size200x200,.siz
e200x200 .cell{width:200px;height:200px}.size234x60,.size234x60 .cell{
width:234px;height:60px}.size240x400,.size240x400 .cell{width:240px;he
ight:400px}.size250x250,.size250x250 .cell{width:250px;height:250px}.s
ize300x250,.size300x250 .cell{width:300px;height:250px}.size320x50,.si
ze320x50 .cell{width:320px;height:50px}.size336x280,.size336x280 .<<< skipped >>>
GET /swidget/fapcfone.png HTTP/1.1
Accept: */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: whos.amung.us
Connection: Keep-Alive
HTTP/1.1 303 See Other
Date: Mon, 01 Sep 2014 04:53:40 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Location: hXXp://widgets.amung.us/small/02/263.png
Set-Cookie: uid=CgH9JlQD 9RIsVctNP0vAg==; expires=Thu, 31-Dec-37 23:55:55 GMT; domain=atta; path=/0..
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
IMAGEHLP.dll
rundll32.pdb
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
.manifest
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
Windows
Operating System
5.1.2600.5512
YThere is not enough memory to run the file %s.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Missing entry:%s
Error loading %s
RunDll32.exe_744:
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
IMAGEHLP.dll
rundll32.pdb
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
.manifest
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
Windows
Operating System
5.1.2600.5512
YThere is not enough memory to run the file %s.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Missing entry:%s
Error loading %s
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
taskkill.exe:1704
taskkill.exe:532
taskkill.exe:904
FAPCF MODZ.exe:520
FAPCFPACK.EXE:2016
DYB.exe:1840
RunDll32.exe:744
RunDll32.exe:696
00TZ5CGTPfuLyfbQ8kKV.EXE:128
%original file name%.exe:1336 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%WinDir%\FAPCF\FAPCFPACK.EXE (282 bytes)
%WinDir%\FAPCF\TapXbJybJI5pNzGrvcF4.DB (221 bytes)
%WinDir%\FAPCF\qJXdlc2OnXz60MfVjIYf.DB (157 bytes)
%WinDir%\FAPCF\ERCzL3JyfBqHk43P3Ec3.DB (6358 bytes)
%WinDir%\FAPCF\00TZ5CGTPfuLyfbQ8kKV.EXE (5442 bytes)
%WinDir%\FAPCF\go1.bat (80 bytes)
%WinDir%\FAPCF\FAPCF.DAT (99 bytes)
C:\RCX7D.tmp (121361 bytes)
C:\RCX7E.tmp (122212 bytes)
%Documents and Settings%\All Users\Application Data\NLA\DYB.004 (5118 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6XM9U9Q3\FAPCF[1].HTML (702 bytes)
%System%\drivers\etc\hosts.ics (508 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\8NY507IB\18216[1].htm (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\8NY507IB\anti[1].php (506 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6RGX0FS3\263[1].png (324 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6XM9U9Q3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\8NY507IB\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6XM9U9Q3\ajax-loader[1].gif (4015 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\F0RK31OK\37481[1].htm (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\F0RK31OK\desktop.ini (67 bytes)
%Documents and Settings%\All Users\Desktop\FAPCF ONE.lnk (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6RGX0FS3\desktop.ini (67 bytes)
C:\FAPCF MODZ.exe (1652 bytes)
%WinDir%\BGDLOC\DYB.00 (1 bytes)
%WinDir%\BGDLOC\DYB.exe (15021 bytes)
%WinDir%\BGDLOC\DYB.02 (56 bytes)
%WinDir%\BGDLOC\DYB.01 (81 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DYB Start" = "%WinDir%\BGDLOC\DYB.exe" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.