Gen.Variant.Kazy.57666_f5940b45e3

by malwarelabrobot on November 3rd, 2014 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Kazy.57666 (B) (Emsisoft), Gen:Variant.Kazy.57666 (AdAware), Backdoor.Win32.Shiz.FD, Shiz.YR, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: f5940b45e3c270335804ae522cc18a14
SHA1: 60965d4731351dd8b9f79862955e5487078974c5
SHA256: fd423ef2240f11ced2cf30d0a8f7e2e9b967a0292173193e4d5012297ff81d92
SSDeep: 3072:y8nW6fb/CH1pGLP7c7pJ1GE7am88d5Bt9pTlNg8pPD4Cqykp/v35aYV1kOOkSCWc:ZWQ6HWLs Eum1RNrkCqddcGRW4P
Size: 268800 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: Bechiro
Created at: 1992-05-14 04:12:33
Analyzed on: WindowsXPESX SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

%original file name%.exe:548

The Trojan injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:548 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%WinDir%\AppPatch\heoavg.exe (1961 bytes)
%System%\config\software (2374 bytes)
%System%\config\SOFTWARE.LOG (5347 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\B2.tmp (0 bytes)

Registry activity

The process %original file name%.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB 83 D8 FB AB 93 7E 06 9C 2F 33 7C FC A4 B4 00"

[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\%WinDir%\apppatch\heoavg.exe_, \??\%WinDir%\apppatch\heoavg.exe"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"a8a67a25" = "pEìX£bÀ¸¬qÄHF‡KöJü|2¥¥oD¬<»¹œ³ŒQ\´òd¼Œ¤Kô1,Å $ë›ÛÌ«”¹l}Ë {Å“zΙC%é[qñl4ì;û´[Ã’#»Û:ÑU„„ԝ\±ª²DÆ’uÅ“¡Ü¼); ¼\Æ’tµ2”kDù”a”*›cü$}Sô|ë$¤ô {¬q³#sÃ…Ã¥\yuJÛËu©|ù ¢rKã!$’‹‹b±ÃÄ £ãÍ‚ “ÉUcdÁÄZ¡r»ô”)Û©Š ]“QlYÛl]$$D´ƒÌ£Q$aŒ‚*â„¢ü›ÙóÍÁ=éÔÑщ¬ q9|áíù’‘íÁ©šÄR"

Dropped PE files

MD5 File path
bb0c23da41054ea6f90d28a06777249f c:\WINDOWS\AppPatch\heoavg.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

The Trojan installs the following user-mode hooks in CRYPT32.dll:

CertVerifyCertificateChainPolicy

The Trojan installs the following user-mode hooks in WININET.dll:

HttpSendRequestExA
HttpSendRequestW
InternetReadFileExA
InternetWriteFileExA
InternetQueryDataAvailable
HttpSendRequestExW
InternetReadFile
HttpSendRequestA
InternetCloseHandle

The Trojan installs the following user-mode hooks in USER32.dll:

GetWindowTextA
GetClipboardData
SendInput
GetMessageA
GetMessageW
TranslateMessage

The Trojan installs the following user-mode hooks in ADVAPI32.dll:

CryptEncrypt

The Trojan installs the following user-mode hooks in WS2_32.dll:

WSASend
recv
gethostbyname
WSARecv
send

The Trojan installs the following user-mode hooks in kernel32.dll:

CreateFileW

Propagation

VersionInfo

Company Name: unevidential
Product Name: Beneficialness
Product Version: 1.6.9.1
Legal Copyright: piso
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 3.3.1.7
File Description: charlatanically
Comments:
Language: Spanish (Spain, International Sort)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
UPX0 4096 4777 5120 3.95381 8bdd4180e5780da6e75ab176df2a25c4
.text 12288 11500 11776 4.16017 4d4d3dd63677b8344281c761b2c635bb
.FojB 24576 959777 4608 0 b1e27aa018409de6bfd73f8afb883a65
.BUlqb 987136 145285 2048 0 c99a74c555371a433d121f551d6c6398
.rdata 1134592 50852 1536 2.69337 85c718428510b9e35aa50969e3274467
.VYMzqI 1187840 345906 2048 0 c99a74c555371a433d121f551d6c6398
.edata 1536000 117603 96256 5.52935 1e6f744a866dd86c8e1a4c337dbff9ea
.wVqnBj 1654784 811549 4608 4.20754 2a3747063ef36d2d2ac8a4e53e2f44cb
.data 2469888 174503 6656 4.88703 7f40ea5fe335b5575756a6cc4394c305
.edata 2646016 171789 127488 5.53567 a5adda8ead2f1a2135d1aa63d952477a
.rsrc 2818048 5416 5632 2.93491 aa860e1cfeff892c7285511c0cbbbe48

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 1
fd1fdd75bec6cf4d4e1d811dbc3f506f

URLs

URL IP
hxxp://xugiqonenuz.eu/login.php 69.195.129.70


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET TROJAN Win32.Shiz.fxm/Agent-TBT Checkin
ET POLICY Unsupported/Fake Windows NT Version 5.0
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 2.

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

Strings from Dumps were not found.


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Scan a system with an anti-rootkit tool.
  2. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:548

  3. Delete the original Trojan file.
  4. Delete or disinfect the following files created/modified by the Trojan:

    %WinDir%\AppPatch\heoavg.exe (1961 bytes)
    %System%\config\software (2374 bytes)
    %System%\config\SOFTWARE.LOG (5347 bytes)

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now