Trojan.Script.688137_5ba6628334
Trojan.VBS.Crypt.ab (Kaspersky), Trojan.Script.688137 (AdAware), Backdoor.Win32.PcClient.FD, SearchProtectToolbar_pcap.YR, mzpefinder_pcap_file.YR, SearchProtectToolbar.YR, PUPSpigot.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor, PUP
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 5ba6628334cc996ec961a5fc69354d3f
SHA1: 131854dc420d05132e65b50f1458cec256d95d3b
SHA256: 45c1a6c50de60fff79cd430b444f1078a83b6634b4e4d361bdd8919ff2e0b81f
SSDeep: 49152:DDXujGIaiMgkQ5clCWeYCnOraE IxkpL0pRQA5v4lS544zjdQfH:DDC8CkUYCW9COr IxEs2U4wKeQf
Size: 2487059 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-12-27 07:38:55
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
cscript.exe:1936
cscript.exe:2196
WScript.exe:1988
ping.exe:1012
%original file name%.exe:972
DFR54rg.Exe:440
netsh.exe:624
The Trojan injects its code into the following process(es):
server.exe:1588
RunDll32.exe:1312
uTorrent.exe:448
mshta.exe:1508
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process WScript.exe:1988 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\DFR54rg.Exe (3650 bytes)
The process %original file name%.exe:972 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Galaxy.vbs (3466 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uTorrent.exe (81685 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsf1.tmp (0 bytes)
The process DFR54rg.Exe:440 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\server.exe (24 bytes)
The process RunDll32.exe:1312 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\wbem\Logs\wbemprox.log (152 bytes)
The process uTorrent.exe:448 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\yandex_browser_setup.bmp (204 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\bt_icon_48px.png (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\uninstall.hta (575 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\index.hta (522 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\firefox.png (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\main_utorrent.ico (107 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\search_protect.png (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\main_bittorrent.ico (103 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\install.js (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\yandex_horz.png (8 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\styles\installer.css (296 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\pt.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\shell_scripts\check_if_cscript_is_working.js (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\es.json (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\internetexplorer.png (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\yandex_horz_ru.png (7 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\initialize.js (978 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\ru.json (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\fr.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\utt2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\logo_Yandex_RU_UA_vertical.png (6 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@localhost[1].txt (169 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\main_icon.png (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\it.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\loading.gif (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\chrome.png (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\index.hta.log (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\br.json (6 bytes)
%Documents and Settings%\%current user%\Application Data\uTorrent\settings.dat.new (71 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\de.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\install.1476485583.zip (279261 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@localhost[2].txt (169 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\screenshot.png (40 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\styles\common.css (101 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\es5-shim.js (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\en.json (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll (218 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (1928 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\uninstall.js (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\logo.png (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCSetupHlp.dll (5442 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\shell_scripts\shell_ping_after_close.js (312 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\common.js (1681 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\1f91d2d17ea675d4c2c3192e241743f9_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\shell_scripts\shell_install_offer.js (7 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@localhost[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\utt2.tmp (0 bytes)
The process mshta.exe:1508 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\index.hta.log (33 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\json[1] (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\featuredcontent[1].htm (21 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
Registry activity
The process cscript.exe:1936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "48 F0 6D 56 B1 43 43 C2 20 9D 7A BD 2A B6 56 DE"
The process cscript.exe:2196 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 D9 67 0D 1B 96 63 0B 5A 02 F6 DD 1C 05 8A 88"
The process WScript.exe:1988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 D5 96 4E DA 9F F2 61 84 BD 4C 90 28 0B BB C1"
The process ping.exe:1012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 28 9C 29 D8 EE 21 7A 14 D9 A9 D4 AB 6B CD CC"
The process server.exe:1588 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A0 8A B5 82 1F 15 8B 1B 46 DA 7D C4 F5 6F ED 14"
[HKCU]
"di" = "!"
[HKCU\Software\ac6ecc1a65b9b2f25c94a0fc8c655a1d]
"[kl]" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Environment]
"SEE_MASK_NOZONECHECKS" = "1"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ac6ecc1a65b9b2f25c94a0fc8c655a1d" = "%Documents and Settings%\%current user%\Local Settings\Temp\server.exe .."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"ac6ecc1a65b9b2f25c94a0fc8c655a1d" = "%Documents and Settings%\%current user%\Local Settings\Temp\server.exe .."
The process %original file name%.exe:972 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A 26 10 2A 93 1D D8 5E F7 F9 65 E0 5A 4A F9 A6"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"utorrent.exe" = "µTorrent"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"wscript.exe" = "Microsoft (R) Windows Based Script Host"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process DFR54rg.Exe:440 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 6F 1F 61 66 D2 16 97 0E 48 7B E0 56 BE 14 96"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU]
"di" = "!"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Local Settings\Temp]
"server.exe" = "server"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process RunDll32.exe:1312 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 20 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCR\TypeLib\{A8A8FC8F-45DF-4720-B6D9-F8CE7E1483A2}\1.0\0\win32]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCSetupHlp.dll"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCR\TypeLib\{A8A8FC8F-45DF-4720-B6D9-F8CE7E1483A2}\1.0\HELPDIR]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty"
[HKCR\TypeLib\{A8A8FC8F-45DF-4720-B6D9-F8CE7E1483A2}\1.0]
"(Default)" = "OCValidateLib"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCR\TypeLib\{A8A8FC8F-45DF-4720-B6D9-F8CE7E1483A2}\1.0\FLAGS]
"(Default)" = "0"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8B 6A E7 35 C5 FC 69 F7 E0 F3 41 63 39 85 0F 8A"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process uTorrent.exe:448 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}]
"(Default)" = "_IComSDKEvents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCR\OCComSDK.ComSDK.1\CLSID]
"(Default)" = "{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}"
[HKCR\CLSID\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\InProcServer32]
"ThreadingModel" = "Both"
[HKCU\Software\Classes\FalconBetaAccount]
"remote_access_client_id" = "8449376715"
[HKCR\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCU\Software\BitTorrent\uTorrent]
"OfferProvider" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCR\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\TypeLib]
"(Default)" = "{1112F282-7099-4624-A439-DB29D6551552}"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCR\OCComSDK.ComSDK]
"(Default)" = "ComSDK Class"
[HKCR\OCComSDK.ComSDK.1]
"(Default)" = "ComSDK Class"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCR\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKCR\TypeLib\{1112F282-7099-4624-A439-DB29D6551552}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\TypeLib\{1112F282-7099-4624-A439-DB29D6551552}\1.0]
"(Default)" = "OCComSDK 1.0 Type Library"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\ProgID]
"(Default)" = "OCComSDK.ComSDK.1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\BitTorrent\uTorrent]
"OfferViaCAU" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCR\OCComSDK.ComSDK\CLSID]
"(Default)" = "{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}]
"(Default)" = "ComSDK Class"
[HKCR\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}]
"(Default)" = "IComSDK"
[HKCR\OCComSDK.ComSDK\CurVer]
"(Default)" = "OCComSDK.ComSDK.1"
[HKCR\AppID\{257AE6D8-A9F3-4113-9AA8-5EED67D44267}]
"(Default)" = "OCComSDK"
[HKCR\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\CLSID\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}]
"(Default)" = "PSFactoryBuffer"
[HKCR\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\TypeLib]
"Version" = "1.0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCR\TypeLib\{1112F282-7099-4624-A439-DB29D6551552}\1.0\HELPDIR]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\Version]
"(Default)" = "1.0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCR\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}\TypeLib]
"Version" = "1.0"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\VersionIndependentProgID]
"(Default)" = "OCComSDK.ComSDK"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}]
"AppID" = "{257AE6D8-A9F3-4113-9AA8-5EED67D44267}"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\TypeLib]
"(Default)" = "{1112F282-7099-4624-A439-DB29D6551552}"
[HKCR\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\NumMethods]
"(Default)" = "50"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"mshta.exe" = "Microsoft (R) HTML Application host"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 45 DC CE E0 16 72 E3 03 0D 44 BC B2 9F 29 DB"
[HKCR\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}\TypeLib]
"(Default)" = "{1112F282-7099-4624-A439-DB29D6551552}"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\MiscStatus\1]
"(Default)" = "131473"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\ToolboxBitmap32]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll, 102"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\InprocServer32]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCR\AppID\OCComSDK.DLL]
"AppID" = "{257AE6D8-A9F3-4113-9AA8-5EED67D44267}"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCR\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}\MiscStatus]
"(Default)" = "0"
[HKCR\CLSID\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}\InProcServer32]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCR\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCU\Software\BitTorrent\uTorrent]
"OfferName" = ""
[HKCR\TypeLib\{1112F282-7099-4624-A439-DB29D6551552}\1.0\0\win32]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll"
[HKCU\Software\BitTorrent\uTorrent]
"OfferAccepted" = "0"
The process netsh.exe:624 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"BitNames" = " NAP_TRACE_BASE NAP_TRACE_NETSH"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"Guid" = "710adbf0-ce88-40b4-a50d-231ada6593f0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"Guid" = "b0278a28-76f1-4e15-b1df-14b209a12613"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 4B 15 92 E7 1C 9A 15 BA A3 0C 59 DC 4B 33 58"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"
Adds a rule to the firewall Windows which allows any network activity:
[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%Documents and Settings%\%current user%\Local Settings\Temp]
"server.exe" = "%Documents and Settings%\%current user%\Local Settings\Temp\server.exe:*:Enabled:server.exe"
The process mshta.exe:1508 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1F 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"cscript.exe" = "Microsoft (R) Console Based Script Host"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"ping.exe" = "TCP/IP Ping Command"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1208111505"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 8A E6 7F 71 9D C5 5F 7D 5F F7 D0 37 90 9E EA"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "mshta.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| cb881839640b9ee1f55ac74b8a13e2a4 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\DFR54rg.Exe |
| 7a51490de5906042b3f440ae9600fd76 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll |
| 428a5d062b8665ff64b8024a487a4604 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCSetupHlp.dll |
| cb881839640b9ee1f55ac74b8a13e2a4 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\server.exe |
| a62c3553d4f443edc5f68762bc474cd2 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\uTorrent.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 24124 | 24576 | 4.45853 | 1a13b408c917b27c9106545148d3b8d3 |
| .rdata | 28672 | 4714 | 5120 | 3.46982 | 921acf8cb0aea87c0603fa899765fcc2 |
| .data | 36864 | 154936 | 1536 | 2.97482 | 797517c6ef57aa95d53df2cf07568953 |
| .ndata | 192512 | 32768 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 225280 | 109224 | 109568 | 5.08459 | b9b783dc48c462e844d933ca3a0e49a4 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://com-utorrent-prod-bench-290894750.us-east-1.elb.amazonaws.com/e?i=50 | |
| hxxp://download-new.utorrent.com/endpoint/hydra-ut/os/winxp/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/5.1/enc-ver/110208517/ | |
| hxxp://ip-api.com/json?callback=jQuery1910351474732677794_1476485595829&_=1476485595830 | |
| hxxp://update.utorrent.com/featuredcontent.php?w=5.1 | |
| hxxp://download-lb.utorrent.com/endpoint/hydra-ut/os/winxp/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/5.1/enc-ver/110208517/ | |
| hxxp://i-50.b-000.xyz.bench.utorrent.com/e?i=50 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile
Traffic
GET /endpoint/hydra-ut/os/winxp/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/5.1/enc-ver/110208517/ HTTP/1.1
Host: download-lb.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 0
HTTP/1.1 200 OK
Server: nginx/1.6.1
Date: Fri, 14 Oct 2016 22:52:51 GMT
Content-Type: application/octet-stream
Content-Length: 2397689
Connection: close
X-bt-sig: 6280eb8890af3f03bce5acbc7887c10c05697ddeee48ef03c41cbf3d4b52b0fadf6fa51d9387dc46e6ee2b55de245bd5829ee53d4aab8724f6e6530f7123858adfbf1a401eee9122e32776588b30687e7254665ace20eb2415cb2b60c5f6276edabebecc5c2ce0d6a30690508383fad15eeccc470a73548a8f34d78b246c8f2593434e5220329fe7541c4525c258a3444979f9b2b6a40fda4f5af7c96b51b93e3226859fb380c86f0ffd5646b0910289250aa34ff4830dad8e3e46f9821d29047aa0f15d38e1008628ca2e1f525a77c5eb63d4425e084f9cc7f26086083a8ea7e8cd3475ce0d8f60a5186ab7608a01ec48127c379f8b17b61156c209fe352c69
Last-Modified: Sat, 18 Jun 2016 05:45:18 0000
Accept-Ranges: none
Content-Disposition: attachment; filename="hta.zip"
X-bt-size: 2397689
Cache-Control: private
X-rl-mx: true
Rule-UUID: d7d79ca9-1978-4573-a82b-a0adc05e3e13
Content-MD5: a941fc2419a987ff4de7c86cbf782c8f
Expires: Tue, 01 Jan 1980 00:00:00 0000
X-bt-hash: c5b7fd00cac128923973150476f3f3549d55ae17PK.........{.H.d..............index.hta<html>..<head>.
<title>Loading...</title>. <meta charset="utf-8">
. <meta http-equiv="X-UA-Compatible" content="IE=9">. <
meta http-equiv="MSThemeCompatible" content="yes">.. <script
src="scripts/initialize.js"></script>.. <link rel="styl
esheet" href="styles/common.css"/>.. <!--[if lte IE 8]>.
<script src="scripts/es5-shim.js"></script>. <![en
dif]-->..</head>..<body class="installer_body">.</bo
dy>..<script src="scripts/common.js"></script>..<scr
ipt src="scripts/install.js"></script>..</html>.PK.....
....{.Hw[Yy?...?.......uninstall.hta<html>..<head>. <
;title>Loading...</title>. <meta charset="utf-8">.
<meta http-equiv="X-UA-Compatible" content="IE=9">. <met
a http-equiv="MSThemeCompatible" content="yes">.. <script src
="scripts/initialize.js"></script>.. <link rel="stylesh
eet" href="styles/common.css"/>... <!--[if lte IE 8]>.
<script language="javascript" type="text/javascript" src='scrip
ts/es5-shim.js'></script>. <![endif]-->..</head&g
t;..<body class="installer_body">.</body>..<script src=
"scripts/common.js"></script>...<script src="scripts/unins
tall.js"></script>..</html>.PK.........{.H.....V...V...
...3rdparty/OCComSDK.dllMZ......................@.................<<< skipped >>>
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 233
{"eventName":"hydra1","action":"begin","type":"i","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"2","v":"110208517","cl":"uTorrent","osv":"5.1","l":"en","pid":"448","h":"yRHe52710sEaDp_E","sid":"yRHe52710sEaDp_E1476485583","order":"0"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Fri, 14 Oct 2016 22:52:50 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 247
{"eventName":"hydra1","action":"packDownloadStarted","type":"i","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"2","v":"110208517","cl":"uTorrent","osv":"5.1","l":"en","pid":"448","h":"yRHe52710sEaDp_E","sid":"yRHe52710sEaDp_E1476485583","order":"1"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Fri, 14 Oct 2016 22:52:50 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
GET /json?callback=jQuery1910351474732677794_1476485595829&_=1476485595830 HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Content-Type: text/javascript; charset=utf-8
Date: Fri, 14 Oct 2016 22:53:07 GMT
Content-Length: 320jQuery1910351474732677794_1476485595829({"as":"AS31561 PITLINE-AS","ci
ty":"Kharkiv","country":"Ukraine","countryCode":"UA","isp":"Pitline Lt
d","lat":49.9808,"lon":36.2527,"org":"Pitline Ltd","query":"194.242.96
.226","region":"63","regionName":"Kharkivs'ka Oblast'","status":"succe
ss","timezone":"Europe/Kiev","zip":""});HTTP/1.1 200 OK..Access-Contro
l-Allow-Origin: *..Content-Type: text/javascript; charset=utf-8..Date:
Fri, 14 Oct 2016 22:53:07 GMT..Content-Length: 320..jQuery19103514747
32677794_1476485595829({"as":"AS31561 PITLINE-AS","city":"Kharkiv","co
untry":"Ukraine","countryCode":"UA","isp":"Pitline Ltd","lat":49.9808,
"lon":36.2527,"org":"Pitline Ltd","query":"194.242.96.226","region":"6
3","regionName":"Kharkivs'ka Oblast'","status":"success","timezone":"E
urope/Kiev","zip":""});..
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 260
{"eventName":"hydra1","action":"packDownloadResult","type":"i","result":"1","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"12","v":"110208517","cl":"uTorrent","osv":"5.1","l":"en","pid":"448","h":"yRHe52710sEaDp_E","sid":"yRHe52710sEaDp_E1476485583","order":"2"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Fri, 14 Oct 2016 22:53:00 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 269
{"eventName":"hydra1","action":"INFO","type":"i","res":"1916x902","cts":"1476485593","pv":"","cau":"0","cc":"0","bkt1":"0","ssb":"12","v":"110208517","cl":"uTorrent","osv":"5.1","l":"en","pid":"448","h":"yRHe52710sEaDp_E","sid":"yRHe52710sEaDp_E1476485583","order":"3"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Fri, 14 Oct 2016 22:53:00 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
GET /featuredcontent.php?w=5.1 HTTP/1.1
Accept-Encoding: gzip, deflate
Accept-Language: en-us
Referer: file://C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\HYD3.tmp.1476485583\HTA\index.hta
Accept: application/json, text/javascript, */*; q=0.01
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: update.utorrent.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx/1.4.7
Date: Fri, 14 Oct 2016 22:53:08 GMT
Content-Type: text/html
Content-Length: 21
Connection: close
X
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
clsid\{25336920-03f9-11cf-8fd0-00aa00686f13}\InProcServer32mscoree.dll
Please contact the application's support team for more information.
GetProcessWindowStation
user32.dll
kernel32.dll
mshta.pdb
RegCloseKey
RegOpenKeyExA
GetCPInfo
%WinDir%\System32\mshta.exe
6.00.2900.5512 (xpsp.080413-2105)
MSHTA.EXE
Windows
Operating System
6.00.2900.5512
RunDll32.exe_1312:
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
IMAGEHLP.dll
rundll32.pdb
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
.manifest
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
Windows
Operating System
5.1.2600.5512
YThere is not enough memory to run the file %s.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Missing entry:%s
Error loading %s
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
cscript.exe:1936
cscript.exe:2196
WScript.exe:1988
ping.exe:1012
%original file name%.exe:972
DFR54rg.Exe:440
netsh.exe:624 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\DFR54rg.Exe (3650 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Galaxy.vbs (3466 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uTorrent.exe (81685 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\server.exe (24 bytes)
%System%\wbem\Logs\wbemprox.log (152 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\yandex_browser_setup.bmp (204 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\bt_icon_48px.png (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\uninstall.hta (575 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\index.hta (522 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\firefox.png (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\main_utorrent.ico (107 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\search_protect.png (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\main_bittorrent.ico (103 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\install.js (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\yandex_horz.png (8 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\styles\installer.css (296 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\pt.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\shell_scripts\check_if_cscript_is_working.js (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\es.json (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\internetexplorer.png (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\yandex_horz_ru.png (7 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\initialize.js (978 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\ru.json (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\fr.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\utt2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\logo_Yandex_RU_UA_vertical.png (6 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@localhost[1].txt (169 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\main_icon.png (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\it.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\loading.gif (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\chrome.png (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\index.hta.log (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\br.json (6 bytes)
%Documents and Settings%\%current user%\Application Data\uTorrent\settings.dat.new (71 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\de.json (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\install.1476485583.zip (279261 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@localhost[2].txt (169 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\screenshot.png (40 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\styles\common.css (101 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\es5-shim.js (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\i18n\en.json (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCComSDK.dll (218 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (1928 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\uninstall.js (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\images\mediacaster\logo.png (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\3rdparty\OCSetupHlp.dll (5442 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\shell_scripts\shell_ping_after_close.js (312 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\scripts\common.js (1681 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\1f91d2d17ea675d4c2c3192e241743f9_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYD3.tmp.1476485583\HTA\shell_scripts\shell_install_offer.js (7 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\json[1] (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\featuredcontent[1].htm (21 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ac6ecc1a65b9b2f25c94a0fc8c655a1d" = "%Documents and Settings%\%current user%\Local Settings\Temp\server.exe .."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"ac6ecc1a65b9b2f25c94a0fc8c655a1d" = "%Documents and Settings%\%current user%\Local Settings\Temp\server.exe .." - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.