Trojan-Dropper.Win32.Vtimrun_ff7d1d262a
HEUR:Trojan.Win32.Generic (Kaspersky), MemScan:Backdoor.Mosucker.N (B) (Emsisoft), MemScan:Backdoor.Mosucker.N (AdAware), TrojanDropperVtimrun.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: ff7d1d262a62a789933f9921f5dbe72b
SHA1: e64471803558fef0466d17905cda5ab1b77b1812
SHA256: 1ee2907ede7f7641d0571d0e449c19d4e248b73af8953f4d2bd5cdf77c18acaa
SSDeep: 3072:rGu9BlfzWIbXWm w0Jh5iK6 ld2lPEAZtGm0XMwRsG0oEd:r/0uob6 ld2lPRZJ63R0b
Size: 138752 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Premium Installer
Created at: 2008-04-13 21:32:45
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Payload
No specific payload has been found.
Process activity
The Trojan-Dropper creates the following process(es):
%original file name%.exe:636
07SERV~1.EXE:1068
The Trojan-Dropper injects its code into the following process(es):
No processes have been created.
File activity
The process %original file name%.exe:636 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\07SERV~1.EXE (4232 bytes)
The Trojan-Dropper deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\07SERV~1.EXE (0 bytes)
The process 07SERV~1.EXE:1068 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%WinDir%\Fonts\lsass.exe (15902 bytes)
The Trojan-Dropper deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\~DF74CB.tmp (0 bytes)
Registry activity
The process %original file name%.exe:636 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B5 7E 12 F6 6B 8F A9 41 4C 48 40 5B 21 35 C7 FE"
To automatically run itself each time Windows is booted, the Trojan-Dropper adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"
The Trojan-Dropper deletes the following value(s) in system registry:
The Trojan-Dropper disables automatic startup of the application by deleting the following autorun value:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0"
The process 07SERV~1.EXE:1068 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"NetHood" = "%Documents and Settings%\%current user%\NetHood"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\VB and VBA Program Settings\IECBGVCIS47920310000RUTKWC\IECBGVCIS47920310000RUTKWC]
"#" = "•Œ˜¥vƒ’¬Î²¼¨¾ÎÆ|¾¿Å½Ã »Ê´“Ë~¼Ã³"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\VB and VBA Program Settings\IECBGVCIS47920310000RUTKWC\IECBGVCIS47920310000RUTKWC]
"1" = "‘š¢švU‡‚‰x€t€‹sS’ÂÂÅ’Æ’{o˜ "
"2" = "£ŸŒâ€Âžvc’¬›¸±¹¼¼ÃÂâ€ÂËp¸·²d¢¼Çâ€Âþ¾¼ª¥³Ä¯ldz¸µnâ€â€Ã‚´Ã‹Ã‡â€°Ã†Â·ÃŠÂ¥Â¢Â©Â¼Ã‡Â¯i° ‡y~r£¤£|ˆ‡ªŽ šÃˆÂÂe°•"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Templates" = "%Documents and Settings%\%current user%\Templates"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%WinDir%\Fonts]
"lsass.exe" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"SendTo" = "%Documents and Settings%\%current user%\SendTo"
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 14 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Fonts" = "%WinDir%\Fonts"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "77 9E EA 77 3D B7 F4 F7 88 C9 2D 6E F6 CC 68 95"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\VB and VBA Program Settings\Options\Windows XP]
"1" = "£™œ›™¡g{@}{@}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Recent" = "%Documents and Settings%\%current user%\Recent"
The Trojan-Dropper modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-Dropper modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-Dropper modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Trojan-Dropper deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
The Trojan-Dropper modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 698 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | rads.mcafee.com |
| 127.0.0.1 | downloads-us1.kaspersky-labs.com |
| 127.0.0.1 | updates1.kaspersky-labs.com |
| 127.0.0.1 | updates2.kaspersky-labs.com |
| 127.0.0.1 | updates3.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads3.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | ftp.downloads1.kaspersky-labs.com |
| 127.0.0.1 | ftp.downloads2.kaspersky-labs.com |
| 127.0.0.1 | ftp.downloads3.kaspersky-labs.com |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Microsoft Corporation
Product Name: HD Player
Product Version: 6.00.2900.5512
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename: WEXTRACT.EXE
Internal Name: Wextract
File Version: 6.00.2900.5512 (xpsp.080413-2105)
File Description: Win32 Cabinet Self-Extractor
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 39368 | 39424 | 4.55933 | fd7744c26c2bf4d279968be94b283b11 |
| .data | 45056 | 7140 | 1024 | 2.94449 | 99858e86526942a66950c7139f78a725 |
| .rsrc | 53248 | 98304 | 97280 | 5.17702 | b1d9cd787322db072ce8d7e7842d0b6c |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan-Dropper connects to the servers at the folowing location(s):
.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
COMCTL32.dll
VERSION.dll
advapi32.dll
advpack.dll
wininit.ini
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupx.dll
IXPd.TMP
TMP4351$.TMP
FINISHMSG
USRQCMD
ADMQCMD
msdownld.tmp
wextract.pdb
PSSSSSSh
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
GetWindowsDirectoryA
ExitWindowsEx
MsgWaitForMultipleObjects
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
33333330
3333333
33333333
07SERV~1.EXE
Cn.Wk
).yPUA
@ek%X
F,%cI@d
Jq-vX}
.cx!rN
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process <%s>. Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C:-- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.5512
lsass.exe_1096:
.text
`.data
.idata
@.rsrc
@.reloc
MSVBVM50.DLL
date.eMMP07
MMP07.CommandLine1
tmrKeyBuffer
tmrPassword
lblURL
MSocketSupport
WindowsBAS
MoKeylog
VBA5.DLL
advapi32.dll
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyA
MapVirtualKeyA
ExitWindowsEx
shell32.dll
SHFileOperationA
wininet.dll
GetWindowsDirectoryA
avicap32.dll
momo.dll
urlmon
URLDownloadToFileA
user32.dll
GetAsyncKeyState
imagehlp.dll
GetKeyState
ShellExecuteA
keybd_event
%Program Files%\DevStudio\VB5\VB5.OLB
TCPServer
TCPTransfer
TCPCapture
TCPCapture_OnSendComplete
TCPServer_OnConnect
TCPServer_OnConnectionRequest
TCPCapture_OnConnectionRequest
TCPTransfer_OnConnectionRequest
TCPServer_OnSendComplete
TCPServer_OnClose
TCPServer_OnError
TCPTransfer_OnError
TCPServer_OnDataArrival
TCPCapture_OnError
tmrKeyBuffer_Timer
tmrPassword_Timer
TCPTransfer_OnDataArrival
TCPTransfer_OnSendComplete
kernel32.dll
GdiplusShutdown
ws2_32.dll
getservbyport
vbzip11.dll
PasswordRequest
RemotePort
LocalPort
cmdSendChat
cmdSendChat_Click
txtSend_KeyPress
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardState
winmm.dll
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
CreatePipe
TCPServer
sMsg
sPassword
lMaxPasswordLength
lngRemotePort
lngLocalPort
KeyAscii
>(?,?0?4?8?
1 1$1(1,141
6064686<6@6
6 6$6(6,6064686<6
*\AC:\DOCUME~1\Guido\Desktop\CAPPRO~1\VB5SER~2\MINIMO~1.VBP
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\
Software\Microsoft\Windows\CurrentVersion\Policies\
.Class1
.image\
keys.log
regedit.exe
127.0.0.1
ActiveXExe\
moupdate.exe
http://
was executed
scrcap.jpg
The operation was canceled.
MSocketSupport.RegisterSocket
MSocketSupport.ResolveHost
.ResolveMessage
.WinsockMessage
|0.70|||
http://web.icq.com/friendship/email_thank_you?failed_url=/friendship/send_by_email&folder_id=
&Extra_Params_Counte=0&nick_name=
&user_uin=1999&friend_nickname=
&friend_nickname=&friend_conta
?ip=%IP&port=%PT&nick=%NM&country=%NY&visible=%VS&protected=%PP&about=
Connected to Webcam
\cam.jpg
\cam.bmp
\scrcap.jpg
cam.jpg
4IN_KEYS
@hotmail.com
update.txt
upload.tmp
7MO_CMDLINE
shell32.dll,
windows
win.ini
system.ini
Explorer.exe
C:/Windows/wininit.ini
HTTP/1.0
HttpOpenRequest failed
http protocol
CSocket.SendData
CSocket.PeekData
CSocket.Listen
CSocket.GetData
CSocket.Connect
CSocket.CSocket.Connect
CSocket.CloseSocket
CSocket.Bind
CSocket.Accept
CSocket.RemoteHost
CSocket.vbSocket
CSocket.PostSocketEvent
CSocket.PostGetHostEvent
CSocket.RecvToBuffer
CSocket.DestroySocket
rundll32.exe shell32.dll,Control_RunDLL
CreatePipe failed.
@*\AC:\DOCUME~1\Guido\Desktop\CAPPRO~1\VB5SER~2\MINIMO~1.VBP
internet explorer.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:636
07SERV~1.EXE:1068 - Delete the original Trojan-Dropper file.
- Delete or disinfect the following files created/modified by the Trojan-Dropper:
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\07SERV~1.EXE (4232 bytes)
%WinDir%\Fonts\lsass.exe (15902 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.