Submission Summary:

What's been foundSeverity Level
Sets the drive to autoplay by creating autorun.inf file in its root directory. If the drive is shared across the network then other remote computers can be infected any time they try to access this share.
Downloads/requests other files from Internet.
Modifies some system settings that may have negative impact on overall system security state.
Creates a startup registry entry.
Registers a 32-bit in-process server DLL.
Registers a Browser Helper Object (Microsoft's Internet Explorer plugin module).
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Security RiskDescription
Adware.URLBlaze_Adware_Bundler URLBlaze bundles various adware/spyware products including Bargain Buddy, TurboDownload and other malware applications. If this was installed for a purpose then it is advisable that you add it to the Ignore List.
Trojan.Generic Common Components that may be used by Trojans Small, DRSN Search, Binet, Euniverse, Adrotator and Dloader among others.
Trojan-PWS.OnlineGames.ARUN Trojan-PWS.OnlineGames.ARUN attempts to steal password information associated to popular online games such as MapleStory, Legend of Mir and World of Warcraft. It has the ability to spread itself via removable disk such as USB drives.
Trojan-Spy.Gampass Trojan-Spy.Gampass is a malicious application that attempts to steal passwords, login details, and other confidential information. It can also downloads other malicious files and automatically execute it into victim's machine.

Threat CategoryDescription
A network-aware worm that attempts to replicate across the existing network(s)
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 c:\autorun.inf 492 bytes MD5: 0x444C67073F372BA6788C906C8DDE0F3F
SHA-1: 0x561E1C76DA993A6E6785DF7083BB06BAA2658CC2
Worm.Win32.AutoRun.rbm [Kaspersky Lab]
Mal/AutoInf-A, Mal/AutoInf-B [Sophos]
Worm.Win32.AutoRun [Ikarus]
2 c:\uaacifr.cmd
%System%\kxvo.exe
[file and pathname of the sample #1]
169,984 bytes MD5: 0x2F6F5C8A7362168A009D3C53C096C963
SHA-1: 0xC99EC50B757B08D0B2307F46B0E0F5E4F7990E01
Trojan Horse [Symantec]
Packed.Win32.Krap.b [Kaspersky Lab]
PWS-Gamania.gen.c [McAfee]
Mal/Frethog-B [Sophos]
Worm:Win32/Taterf.B [Microsoft]
Dropper/Krap.169862 [AhnLab]
3 %System%\dse235rgd0.dll 86,016 bytes MD5: 0xD566362A0CC99584F2302736800CFA6E
SHA-1: 0x3B631C3575A3CA672BD6BC164D67FC4372AC1C08
Trojan.Packed.NsAnti [Symantec]
Packed.Win32.Krap.b [Kaspersky Lab]
PWS-Banker.dll [McAfee]
Mal/Generic-A [Sophos]
TrojanDownloader:Win32/Frethog.C [Microsoft]
Packed.Win32.Krap [Ikarus]
4 %System%\wedasgads0.dll
%System%\wedasgads2.dll
113,664 bytes MD5: 0x93563C294AD0F7F2A67300B16BB1E356
SHA-1: 0x945F26B69CE925726D4DD8B819647DF4ABABC8A4
Trojan.Packed.NsAnti [Symantec]
Packed.Win32.Krap.b [Kaspersky Lab]
Generic PWS.ak [McAfee]
Mal/Generic-A [Sophos]
Worm:Win32/Taterf.gen!A [Microsoft]
Win-Trojan/Krap.113664.F [AhnLab]

 

Memory Modifications

Process NameProcess FilenameMain Module Size
[generic host process][generic host process filename]20,480 bytes
iexplore.exe%ProgramFiles%\Internet Explorer\iexplore.exe102,400 bytes
kxvo.exe%System%\kxvo.exe397,312 bytes
[filename of the sample #1][file and pathname of the sample #1]397,312 bytes

Module NameModule FilenameAddress Space Details
wedasgads2.dll%System%\wedasgads2.dllProcess name: explorer.exe
Process filename: %Windir%\explorer.exe
Address space: 0x2130000 - 0x2164000
wedasgads0.dll%System%\wedasgads0.dllProcess name: dllhost.exe
Process filename: %System%\dllhost.exe
Address space: 0x2530000 - 0x2564000
wedasgads0.dll%System%\wedasgads0.dllProcess name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0x1B00000 - 0x1B34000

 

Registry Modifications

 

Other details

URL to be downloadedFilename for the downloaded bits
http://zxs35.com/hg2/ll.rar%Temp%\ll.rar

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.