Trojan-PSW.Win32.Zbot.4_f81175ed62
Trojan.Win32.Bublik.aksh (Kaspersky), Trojan.Generic.KDZ.12607 (B) (Emsisoft), Trojan.Generic.KDZ.12607 (AdAware), Trojan-PSW.Win32.Zbot.4.FD, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: f81175ed621b7c44ed51e15e5664b966
SHA1: 73c68ba4b50f4d1db7a97c715321446832f75a3c
SHA256: bb7b28f549dbf041a810acb3a1ef1e9dcc7cfcc9e39d82f6b075d84e1e916535
SSDeep: 6144:quNIxvF5M6XEcEUCBy9q17h1VOtR5WbtGX R5vStT:qeS5M60cE3By9q17hHOt6btGuR5
Size: 334848 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2013-04-01 07:22:51
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan-PSW creates the following process(es):
%original file name%.exe:196
exza.exe:3584
The Trojan-PSW injects its code into the following process(es):
Explorer.EXE:1948
File activity
The process %original file name%.exe:196 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\tmp1c23a52e.bat (177 bytes)
%Documents and Settings%\%current user%\Application Data\Ahmiz\exza.exe (1615 bytes)
The Trojan-PSW deletes the following file(s):
%Documents and Settings%\%current user%\Application Data\Ahmiz\exza.exe (0 bytes)
Registry activity
The process %original file name%.exe:196 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "98 62 B7 F1 F1 F5 C1 A1 C3 BE 65 23 0B 6D 65 87"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
The process exza.exe:3584 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "81 E6 A7 34 98 0A F5 A4 4D 3F E5 CA 96 19 99 BD"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKCU\Software\Microsoft\Woga]
"2c7id9cf" = "38 18 AB EE 7A 16 B8 EE A6 6C B6 6D"
Dropped PE files
| MD5 | File path |
|---|---|
| d61558241ce56832a1ed6fddb5728a31 | c:\Documents and Settings\"%CurrentUserName%"\Application Data\Ahmiz\exza.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan-PSW installs the following user-mode hooks in WININET.dll:
HttpSendRequestExW
HttpSendRequestExA
InternetWriteFile
InternetReadFileExA
InternetReadFileExW
HttpSendRequestA
HttpSendRequestW
InternetQueryDataAvailable
HttpQueryInfoW
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
The Trojan-PSW installs the following user-mode hooks in CRYPT32.dll:
PFXImportCertStore
The Trojan-PSW installs the following user-mode hooks in USER32.dll:
GetClipboardData
TranslateMessage
The Trojan-PSW installs the following user-mode hooks in Secur32.dll:
UnsealMessage
SealMessage
DeleteSecurityContext
The Trojan-PSW installs the following user-mode hooks in WS2_32.dll:
WSAGetOverlappedResult
WSASend
recv
gethostbyname
WSARecv
send
closesocket
freeaddrinfo
getaddrinfo
GetAddrInfoW
The Trojan-PSW installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
NtCreateThread
Propagation
VersionInfo
Company Name: ?????????? ??????????
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name: OOBEBALN.EXE
File Version: 5.1.2600.5512 (xpsp.080413-2111)
File Description: ??????????? Windows OOBE
Comments:
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 304054 | 304128 | 5.27319 | 934a34bee9a32c5e5e466c58acf8fee6 |
| .data | 311296 | 164 | 512 | 0.69449 | 0eda059bcbcc075ce7c0d77fba4dc166 |
| .rdata3 | 315392 | 1000 | 1024 | 0 | 0f343b0931126a20f133d67c2b018a3b |
| .rdata2 | 319488 | 1000 | 1024 | 0 | 0f343b0931126a20f133d67c2b018a3b |
| .rsrc | 323584 | 27064 | 27136 | 3.80344 | f6d0c56038e861286cccf22f48088a28 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 2
175792878c8b5c77077143dcf61a95c4
64809150da203938a2884fc87efc728f
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
.text
`.data
.reloc
Invalid parameter passed to C runtime function.
gdiplus.dll
GdiplusShutdown
REPORT
0123456789
5$5,545<5
HTTP/1.1
RegDeleteKeyExW
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
http://www.google.com/
http://www.bing.com/
Gjhseov.Icm`l`dl
$*((8-,7>
-&0,3.8
*!7 4)?,
;=<43;'""
~{283)Ryr%2, Ypu452?@kl'#.Nef1&8t_Xpufjwdx.jvh
"7&8"8=' "
m9.td
t.Ht$HHt
ntdll.dll
KERNEL32.dll
ExitWindowsEx
MsgWaitForMultipleObjects
GetKeyboardState
USER32.dll
RegCreateKeyExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
CryptGetKeyParam
CryptImportKey
CryptDestroyKey
ADVAPI32.dll
PathIsURLW
UrlUnescapeA
SHLWAPI.dll
ShellExecuteW
SHELL32.dll
Secur32.dll
ole32.dll
GDI32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
InternetCrackUrlA
HttpOpenRequestA
HttpEndRequestA
HttpAddRequestHeadersA
WININET.dll
OLEAUT32.dll
NETAPI32.dll
IPHLPAPI.DLL
VERSION.dll
msvcrt.dll
zcÁ
00o0x0
0 0,000<0@0
kernel32.dll
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\%s
shell32.dll
\StringFileInfo\xx\%s
Wadvapi32.dll
"%s" %s
/c "%s"
%sx.%s
%sx
urlmon.dll
cabinet.dll
%Documents and Settings%\%current user%\Application Data
%Documents and Settings%\%current user%\Local Settings\Application Data
Global\{01E22063-0823-4088-6532-C4CE7D78E7DC}
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:196
exza.exe:3584 - Delete the original Trojan-PSW file.
- Delete or disinfect the following files created/modified by the Trojan-PSW:
%Documents and Settings%\%current user%\Local Settings\Temp\tmp1c23a52e.bat (177 bytes)
%Documents and Settings%\%current user%\Application Data\Ahmiz\exza.exe (1615 bytes) - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.