Trojan.Win32.Nedsym_1a16ef39d1
Trojan-Dropper.Win32.Agent.gxjk (Kaspersky), Trojan.Generic.KDV.684680 (B) (Emsisoft), Trojan.Generic.KDV.684680 (AdAware), Trojan.Win32.Nedsym.FD, TrojanNedsym.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: 1a16ef39d1bc379cef069fc5965871cd
SHA1: 90232570b7efbcd46915ee291b96899754b9879c
SHA256: 7b8bf60b13c631fe6b4e584909e2748dcb2940c6a21fe07037275837b7754691
SSDeep: 3072:0 xGY6Bcau6ewbX Ds3bi9dwACY8 kbexTD:LgizSODsIdwtYkmTD
Size: 101888 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PackerUPXCompresorGratuitowwwupxsourceforgenet, UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
svcnost.exe:1520
wuauclt.exe:1880
%original file name%.exe:1516
%original file name%.exe:424
The Trojan injects its code into the following process(es):
svcnost.exe:252
File activity
The process svcnost.exe:252 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\ntuser.dat (55 bytes)
%Documents and Settings%\%current user%\Application Data\desktop.ini (9 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Application Data\desktop.ini (0 bytes)
The process wuauclt.exe:1880 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\SoftwareDistribution\DataStore\Logs\edb.chk (100 bytes)
%WinDir%\SoftwareDistribution\DataStore\Logs\edb.log (2448 bytes)
%WinDir%\SoftwareDistribution\DataStore\DataStore.edb (100 bytes)
The Trojan deletes the following file(s):
%WinDir%\SoftwareDistribution\DataStore\Logs\tmp.edb (0 bytes)
The process %original file name%.exe:1516 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\drivers\etc\hosts (5 bytes)
The Trojan deletes the following file(s):
%System%\drivers\etc\hosts (0 bytes)
Registry activity
The process svcnost.exe:252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F1 75 F9 6A 42 BD 8D 58 4D 2E 38 71 7C 15 9D 54"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Internet Explorer\LowRegistry]
"SavedLegacySettingsML" = "37 37 34 33 33 36 37 31 36"
Adds a rule to the firewall Windows which allows any network activity:
[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%Documents and Settings%\%current user%\Application Data\xfkzjo12lguiypv1tfln3lntlxsib1qb2]
"svcnost.exe" = "%Documents and Settings%\%current user%\Application Data\xfkzjo12lguiypv1tfln3lntlxsib1qb2\svcnost.exe:*:Enabled:ldrsoft"
The process svcnost.exe:1520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "11 38 E3 EB 26 77 51 2A D0 28 1A 0B 67 65 17 DE"
The process %original file name%.exe:1516 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Init" = "%Documents and Settings%\%current user%\Application Data\xfkzjo12lguiypv1tfln3lntlxsib1qb2\svcnost.exe"
The process %original file name%.exe:424 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E C6 E2 69 52 DC F6 28 6B F5 78 FC 6D E5 D7 4D"
Dropped PE files
| MD5 | File path |
|---|---|
| 7e8e966927e04a35aec644602b8a9e05 | c:\Documents and Settings\"%CurrentUserName%"\Application Data\ntuser.dat |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 5915 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | downloads4.kaspersky-labs.com |
| 127.0.0.1 | downloads3.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads-us1.kaspersky-labs.com |
| 127.0.0.1 | rads.mcafee.com |
| 127.0.0.1 | www.secuser.com |
| 127.0.0.1 | a188.x.akamai.net |
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantec.d4p.net |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | ftp.nai.com |
| 127.0.0.1 | www.grisoft.cz |
| 127.0.0.1 | www.grisoft.com |
| 127.0.0.1 | free.grisoft.cz |
| 127.0.0.1 | tds.diamondcs.com.au |
| 127.0.0.1 | ieupdate.gdata.de |
| 127.0.0.1 | ieupdate6.gdata.de |
| 127.0.0.1 | ieupdate5.gdata.de |
| 127.0.0.1 | ieupdate4.gdata.de |
| 127.0.0.1 | ieupdate3.gdata.de |
| 127.0.0.1 | ieupdate2.gdata.de |
| 127.0.0.1 | ieupdate1.gdata.de |
| 127.0.0.1 | www.iavs.cz |
| 127.0.0.1 | download7.avast.com |
| 127.0.0.1 | download6.avast.com |
| 127.0.0.1 | download5.avast.com |
| 127.0.0.1 | download4.avast.com |
| 127.0.0.1 | download3.avast.com |
| 127.0.0.1 | download2.avast.com |
| 127.0.0.1 | download1.avast.com |
| 127.0.0.1 | upgrade.bitdefender.com |
| 127.0.0.1 | windowsupdate.microsoft.com |
| 127.0.0.1 | www.lavasoftusa.com |
| 127.0.0.1 | www.a-2.org |
| 127.0.0.1 | updates.a-2.org |
| 127.0.0.1 | niuone.norman.no |
| 127.0.0.1 | www.diamondcs.com.au |
| 127.0.0.1 | www.attechnical.com |
| 127.0.0.1 | www.zeylstra.nl |
| 127.0.0.1 | fractus.mat.uson.mx |
| 127.0.0.1 | www.toonbox.de |
| 127.0.0.1 | radius.turvamies.com |
| 127.0.0.1 | diamondcs.fileburst.com |
| 127.0.0.1 | downloads.My-eTrust.com |
| 127.0.0.1 | acs.pandasoftware.com |
| 127.0.0.1 | v4.windowsupdate.microsoft.com |
| 127.0.0.1 | www.NoAdware.net |
| 127.0.0.1 | www.nod32.com |
| 127.0.0.1 | www.eset.sk |
| 127.0.0.1 | avu.zonelabs.com |
| 127.0.0.1 | retail.sp.f-secure.com |
| 127.0.0.1 | retail01.sp.f-secure.com |
| 127.0.0.1 | retail02.sp.f-secure.com |
| 127.0.0.1 | www.moosoft.com |
| 127.0.0.1 | secuser.model-fx.com |
| 127.0.0.1 | secuser.com |
| 127.0.0.1 | downloads-eu1.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | downloads4.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | pccreg.antivirus.com |
| 127.0.0.1 | dl1.antivir.de |
| 127.0.0.1 | dl2.antivir.de |
| 127.0.0.1 | dl3.antivir.de |
| 127.0.0.1 | dl4.antivir.de |
| 127.0.0.1 | ad.doubleclick.net |
| 127.0.0.1 | ad.fastclick.net |
| 127.0.0.1 | ads.fastclick.net |
| 127.0.0.1 | ar.atwola.com |
| 127.0.0.1 | atdmt.com |
| 127.0.0.1 | avp.ch |
| 127.0.0.1 | avp.com |
| 127.0.0.1 | avp.com |
| 127.0.0.1 | avp.ru |
| 127.0.0.1 | awaps.net |
| 127.0.0.1 | banner.fastclick.net |
| 127.0.0.1 | banners.fastclick.net |
| 127.0.0.1 | ca.com |
| 127.0.0.1 | ca.com |
| 127.0.0.1 | click.atdmt.com |
| 127.0.0.1 | clicks.atdmt.com |
| 127.0.0.1 | customer.symantec.com |
| 127.0.0.1 | dispatch.mcafee.com |
| 127.0.0.1 | dispatch.mcafee.com |
| 127.0.0.1 | download.mcafee.com |
| 127.0.0.1 | download.mcafee.com |
| 127.0.0.1 | download.mcafee.com |
| 127.0.0.1 | download.microsoft.com |
| 127.0.0.1 | downloads.microsoft.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads1.kaspersky-labs.com |
| 127.0.0.1 | downloads2.kaspersky-labs.com |
| 127.0.0.1 | downloads3.kaspersky-labs.com |
| 127.0.0.1 | downloads4.kaspersky-labs.com |
| 127.0.0.1 | downloads-us1.kaspersky-labs.com |
| 127.0.0.1 | downloads-us2.kaspersky-labs.com |
| 127.0.0.1 | downloads-us3.kaspersky-labs.com |
| 127.0.0.1 | engine.awaps.net |
| 127.0.0.1 | fastclick.net |
| 127.0.0.1 | f-secure.com |
| 127.0.0.1 | f-secure.com |
| 127.0.0.1 | ftp.avp.ch |
| 127.0.0.1 | ftp.downloads2.kaspersky-labs.com |
| 127.0.0.1 | ftp.f-secure.com |
| 127.0.0.1 | ftp.kasperskylab.ru |
| 127.0.0.1 | ftp.sophos.com |
| 127.0.0.1 | go.microsoft.com |
| 127.0.0.1 | ids.kaspersky-labs.com |
| 127.0.0.1 | kaspersky.com |
| 127.0.0.1 | kaspersky-labs.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantec.com |
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | liveupdate.symantecliveupdate.com |
| 127.0.0.1 | mast.mcafee.com |
| 127.0.0.1 | mast.mcafee.com |
| 127.0.0.1 | mcafee.com |
| 127.0.0.1 | mcafee.com |
| 127.0.0.1 | media.fastclick.net |
| 127.0.0.1 | msdn.microsoft.com |
| 127.0.0.1 | my-etrust.com |
| 127.0.0.1 | my-etrust.com |
| 127.0.0.1 | nai.com |
| 127.0.0.1 | nai.com |
| 127.0.0.1 | networkassociates.com |
| 127.0.0.1 | networkassociates.com |
| 127.0.0.1 | office.microsoft.com |
| 127.0.0.1 | phx.corporate-ir.net |
| 127.0.0.1 | rads.mcafee.com |
| 127.0.0.1 | secure.nai.com |
| 127.0.0.1 | secure.nai.com |
| 127.0.0.1 | securityresponse.symantec.com |
| 127.0.0.1 | securityresponse.symantec.com |
| 127.0.0.1 | service1.symantec.com |
| 127.0.0.1 | sophos.com |
| 127.0.0.1 | sophos.com |
| 127.0.0.1 | spd.atdmt.com |
| 127.0.0.1 | support.microsoft.com |
| 127.0.0.1 | symantec.com |
| 127.0.0.1 | symantec.com |
| 127.0.0.1 | trendmicro.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | update.symantec.com |
| 127.0.0.1 | updates.symantec.com |
| 127.0.0.1 | updates.symantec.com |
| 127.0.0.1 | updates1.kaspersky-labs.com |
| 127.0.0.1 | updates1.kaspersky-labs.com |
| 127.0.0.1 | updates2.kaspersky-labs.com |
| 127.0.0.1 | updates3.kaspersky-labs.com |
| 127.0.0.1 | updates3.kaspersky-labs.com |
| 127.0.0.1 | updates4.kaspersky-labs.com |
| 127.0.0.1 | updates5.kaspersky-labs.com |
| 127.0.0.1 | us.mcafee.com |
| 127.0.0.1 | us.mcafee.com |
| 127.0.0.1 | vil.nai.com |
| 127.0.0.1 | viruslist.com |
| 127.0.0.1 | viruslist.ru |
| 127.0.0.1 | windowsupdate.microsoft.com |
| 127.0.0.1 | www.avp.ch |
| 127.0.0.1 | www.avp.com |
| 127.0.0.1 | www.avp.com |
| 127.0.0.1 | www.avp.ru |
| 127.0.0.1 | www.awaps.net |
| 127.0.0.1 | www.ca.com |
| 127.0.0.1 | www.ca.com |
| 127.0.0.1 | www.fastclick.net |
| 127.0.0.1 | www.f-secure.com |
| 127.0.0.1 | www.f-secure.com |
| 127.0.0.1 | www.grisoft.com |
| 127.0.0.1 | www.kaspersky.com |
| 127.0.0.1 | www.kaspersky.ru |
| 127.0.0.1 | www.kaspersky.ru |
| 127.0.0.1 | www.kaspersky-labs.com |
| 127.0.0.1 | www.mcafee.com |
| 127.0.0.1 | www.mcafee.com |
| 127.0.0.1 | www.my-etrust.com |
| 127.0.0.1 | www.my-etrust.com |
| 127.0.0.1 | www.nai.com |
| 127.0.0.1 | www.nai.com |
| 127.0.0.1 | www.networkassociates.com |
| 127.0.0.1 | www.networkassociates.com |
| 127.0.0.1 | www.sophos.com |
| 127.0.0.1 | www.sophos.com |
| 127.0.0.1 | www.symantec.com |
| 127.0.0.1 | www.symantec.com |
| 127.0.0.1 | www.trendmicro.com |
| 127.0.0.1 | www.trendmicro.com |
| 127.0.0.1 | www.viruslist.com |
| 127.0.0.1 | www.viruslist.ru |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 81920 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 86016 | 102400 | 99840 | 5.42093 | bb37af4d8dc8decc2a73003246348a44 |
| .rsrc | 188416 | 4096 | 1024 | 2.11382 | a51405084fa3b9e868cebd367eb57897 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
`.rsrc
kernel32.dll
PSAPI.dll
shell32.dll
\svcnost.exe
2\svcnost.exe"
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Init
.text
`.rdata
@.data
.reloc
1.2.3
LDR.ML.STARTED
user32.dll
ws2_32.dll
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
advapi32.dll
FindCloseUrlCache
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryA
wininet.dll
ole32.dll
dnsapi.dll
crypt32.dll
Mailer.dll
87.75.44.12
:9:::>:::
':::*:::
*%:*"%:*
s:\5E;
::;:::<:::<:::
9::::;::>:::
q.jlk
y.hlj
.lmD]
:*>:>:2:>:
:*>:?:*:2:
:*>:>:*:*:*
:8;8;:**
: =7::2^::2
:*==::2`::2 ::3
: =5::2\::2
:*=0::2[::2
: =7::2_::2
: =5::2]::2
(?3: ?;2,?
(?7: ?;6,?
::9:>:?:<:=:2:3:0:1:7:5: :):-:!:%:
:::;:8:9:>:?:=:3:7: :#:
;;8;9;>;<;2;6;*;";
:2:):3:);3:
;3:1:3:1;3:
;3:!:3:!;3:
;3:=:3:=;3:
;3:}:3:};3:
;3:]:3:];3:
;3:-:3:-;3:
;3:5:3:5;3:
;3:%:3:%;3:
;:::8:::9:::>:::<:::2:::6:::*:::":::
::::;:8:9:>:?:<:=:2:3:0:1:6:7:4:5:*: :(:):.:/:,:-:":#: :!:&:':$:%:
::;:8:;:::8:8:;:::8:
6h6C6V6i6
2'2-23292C2I2}2
KWindows
RegOpenKeyExA
RegCreateKeyExA
GetKeyboardType
.idata
.rdata
P.reloc
P.rsrc
>">0>5>;
`]VY\URLW
KERNEL32.DLL
gdi32.dll
SHFolder.dll
svcnost.exe_252_rwx_00400000_00062000:
`.rsrc
kernel32.dll
PSAPI.dll
shell32.dll
\svcnost.exe
2\svcnost.exe"
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Init
.text
`.rdata
@.data
.reloc
1.2.3
LDR.ML.STARTED
user32.dll
ws2_32.dll
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
advapi32.dll
FindCloseUrlCache
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryA
wininet.dll
ole32.dll
dnsapi.dll
crypt32.dll
Mailer.dll
87.75.44.12
:9:::>:::
':::*:::
*%:*"%:*
s:\5E;
::;:::<:::<:::
9::::;::>:::
q.jlk
y.hlj
.lmD]
:*>:>:2:>:
:*>:?:*:2:
:*>:>:*:*:*
:8;8;:**
: =7::2^::2
:*==::2`::2 ::3
: =5::2\::2
:*=0::2[::2
: =7::2_::2
: =5::2]::2
(?3: ?;2,?
(?7: ?;6,?
::9:>:?:<:=:2:3:0:1:7:5: :):-:!:%:
:::;:8:9:>:?:=:3:7: :#:
;;8;9;>;<;2;6;*;";
:2:):3:);3:
;3:1:3:1;3:
;3:!:3:!;3:
;3:=:3:=;3:
;3:}:3:};3:
;3:]:3:];3:
;3:-:3:-;3:
;3:5:3:5;3:
;3:%:3:%;3:
;:::8:::9:::>:::<:::2:::6:::*:::":::
::::;:8:9:>:?:<:=:2:3:0:1:6:7:4:5:*: :(:):.:/:,:-:":#: :!:&:':$:%:
::;:8:;:::8:8:;:::8:
6h6C6V6i6
2'2-23292C2I2}2
KWindows
RegOpenKeyExA
RegCreateKeyExA
GetKeyboardType
.idata
.rdata
P.reloc
P.rsrc
>">0>5>;
`]VY\URLW
KERNEL32.DLL
gdi32.dll
SHFolder.dll
svcnost.exe_252_rwx_00901000_0001C000:
1.2.3
LDR.ML.STARTED
kernel32.dll
user32.dll
ws2_32.dll
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
advapi32.dll
FindCloseUrlCache
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryA
wininet.dll
ole32.dll
dnsapi.dll
crypt32.dll
Mailer.dll
87.75.44.12
/stat1.php
/stat2.php
/smtps.php
/u.php?
/error.php?
/logacc.php
774336716
:9:::>:::
':::*:::
*%:*"%:*
s:\5E;
::;:::<:::<:::
9::::;::>:::
q.jlk
y.hlj
.lmD]
:*>:>:2:>:
:*>:?:*:2:
:*>:>:*:*:*
:8;8;:**
: =7::2^::2
:*==::2`::2 ::3
: =5::2\::2
:*=0::2[::2
: =7::2_::2
: =5::2]::2
(?3: ?;2,?
(?7: ?;6,?
::9:>:?:<:=:2:3:0:1:7:5: :):-:!:%:
:::;:8:9:>:?:=:3:7: :#:
;;8;9;>;<;2;6;*;";
:2:):3:);3:
;3:1:3:1;3:
;3:!:3:!;3:
;3:=:3:=;3:
;3:}:3:};3:
;3:]:3:];3:
;3:-:3:-;3:
;3:5:3:5;3:
;3:%:3:%;3:
;:::8:::9:::>:::<:::2:::6:::*:::":::
::::;:8:9:>:?:<:=:2:3:0:1:6:7:4:5:*: :(:):.:/:,:-:":#: :!:&:':$:%:
::;:8:;:::8:8:;:::8:
6h6C6V6i6
2'2-23292C2I2}2
svcnost.exe_252_rwx_00920000_0001A000:
kernel32.dll
|user32.dll
A~ws2_32.dll
qadvapi32.dll
wwininet.dll
wole32.dll
Nwdnsapi.dll
vcrypt32.dll
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
svcnost.exe:1520
wuauclt.exe:1880
%original file name%.exe:1516
%original file name%.exe:424 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Application Data\ntuser.dat (55 bytes)
%Documents and Settings%\%current user%\Application Data\desktop.ini (9 bytes)
%WinDir%\SoftwareDistribution\DataStore\Logs\edb.chk (100 bytes)
%WinDir%\SoftwareDistribution\DataStore\Logs\edb.log (2448 bytes)
%WinDir%\SoftwareDistribution\DataStore\DataStore.edb (100 bytes)
%System%\drivers\etc\hosts (5 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Init" = "%Documents and Settings%\%current user%\Application Data\xfkzjo12lguiypv1tfln3lntlxsib1qb2\svcnost.exe" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.