Gen.Variant.Kazy.57666_f5940b45e3
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Kazy.57666 (B) (Emsisoft), Gen:Variant.Kazy.57666 (AdAware), Backdoor.Win32.Shiz.FD, Shiz.YR, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: f5940b45e3c270335804ae522cc18a14
SHA1: 60965d4731351dd8b9f79862955e5487078974c5
SHA256: fd423ef2240f11ced2cf30d0a8f7e2e9b967a0292173193e4d5012297ff81d92
SSDeep: 3072:y8nW6fb/CH1pGLP7c7pJ1GE7am88d5Bt9pTlNg8pPD4Cqykp/v35aYV1kOOkSCWc:ZWQ6HWLs Eum1RNrkCqddcGRW4P
Size: 268800 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: Bechiro
Created at: 1992-05-14 04:12:33
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:548
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:548 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\AppPatch\heoavg.exe (1961 bytes)
%System%\config\software (2374 bytes)
%System%\config\SOFTWARE.LOG (5347 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\B2.tmp (0 bytes)
Registry activity
The process %original file name%.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB 83 D8 FB AB 93 7E 06 9C 2F 33 7C FC A4 B4 00"
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\%WinDir%\apppatch\heoavg.exe_, \??\%WinDir%\apppatch\heoavg.exe"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"a8a67a25" = "pEìX£bÀ¸¬qÄHF‡KöJü|2¥¥oD¬<»¹œ³ŒQ\´òd¼Œ¤Kô1,Ã…Â $ë›ÛÌ«â€Â¹l}Ë {Å“zΙC%é[qñl4ì;û´[Ã’#»Û:ÑU„„Ãâ€Ã‚Â\±ª²DÆ’uœ¡Ü¼);¼\Æ’tµ2â€ÂkDùâ€Âaâ€Â*›cü$}Sô|ë$¤ô{¬q³#sÃ…Ã¥\yuJÛËu©|ù¢rKã!$’‹‹b±ÃÄ£ã“ÉUcdÃÂÄZ¡r»ôâ€Â)Û©Š]“QlYÛl]$$D´ƒÌ£Q$aŒ‚*™ü›ÙóÃÂÃÂ=éÃâ€Ãƒâ€˜Ãƒâ€˜Ã¢â‚¬Â°Ã‚¬q9|áÃÂù’‘ÃÂéšÄR"
Dropped PE files
| MD5 | File path |
|---|---|
| bb0c23da41054ea6f90d28a06777249f | c:\WINDOWS\AppPatch\heoavg.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan installs the following user-mode hooks in CRYPT32.dll:
CertVerifyCertificateChainPolicy
The Trojan installs the following user-mode hooks in WININET.dll:
HttpSendRequestExA
HttpSendRequestW
InternetReadFileExA
InternetWriteFileExA
InternetQueryDataAvailable
HttpSendRequestExW
InternetReadFile
HttpSendRequestA
InternetCloseHandle
The Trojan installs the following user-mode hooks in USER32.dll:
GetWindowTextA
GetClipboardData
SendInput
GetMessageA
GetMessageW
TranslateMessage
The Trojan installs the following user-mode hooks in ADVAPI32.dll:
CryptEncrypt
The Trojan installs the following user-mode hooks in WS2_32.dll:
WSASend
recv
gethostbyname
WSARecv
send
The Trojan installs the following user-mode hooks in kernel32.dll:
CreateFileW
Propagation
VersionInfo
Company Name: unevidential
Product Name: Beneficialness
Product Version: 1.6.9.1
Legal Copyright: piso
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 3.3.1.7
File Description: charlatanically
Comments:
Language: Spanish (Spain, International Sort)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 4777 | 5120 | 3.95381 | 8bdd4180e5780da6e75ab176df2a25c4 |
| .text | 12288 | 11500 | 11776 | 4.16017 | 4d4d3dd63677b8344281c761b2c635bb |
| .FojB | 24576 | 959777 | 4608 | 0 | b1e27aa018409de6bfd73f8afb883a65 |
| .BUlqb | 987136 | 145285 | 2048 | 0 | c99a74c555371a433d121f551d6c6398 |
| .rdata | 1134592 | 50852 | 1536 | 2.69337 | 85c718428510b9e35aa50969e3274467 |
| .VYMzqI | 1187840 | 345906 | 2048 | 0 | c99a74c555371a433d121f551d6c6398 |
| .edata | 1536000 | 117603 | 96256 | 5.52935 | 1e6f744a866dd86c8e1a4c337dbff9ea |
| .wVqnBj | 1654784 | 811549 | 4608 | 4.20754 | 2a3747063ef36d2d2ac8a4e53e2f44cb |
| .data | 2469888 | 174503 | 6656 | 4.88703 | 7f40ea5fe335b5575756a6cc4394c305 |
| .edata | 2646016 | 171789 | 127488 | 5.53567 | a5adda8ead2f1a2135d1aa63d952477a |
| .rsrc | 2818048 | 5416 | 5632 | 2.93491 | aa860e1cfeff892c7285511c0cbbbe48 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
fd1fdd75bec6cf4d4e1d811dbc3f506f
URLs
| URL | IP |
|---|---|
| hxxp://xugiqonenuz.eu/login.php |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN Win32.Shiz.fxm/Agent-TBT Checkin
ET POLICY Unsupported/Fake Windows NT Version 5.0
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 2.
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:548
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%WinDir%\AppPatch\heoavg.exe (1961 bytes)
%System%\config\software (2374 bytes)
%System%\config\SOFTWARE.LOG (5347 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.