- Submission details:
- Submission received: 18 October 2011, 07:19:29
- Processing time: 10 min 36 sec
- Submitted sample:
- File MD5: 0x359E9F82AB0077430F831A88B416BE12
- File SHA-1: 0xEF9A77D98A524DBEEC2CDA4CF79F4C8E35A9946C
- Filesize: 614,400 bytes
|What's been found||Severity Level|
|Capability to block security-related software by modifying firewall settings and by disabling security services, such as Windows Update, Norton Autoprotect, Kaspersky Anti-Virus, etc.|
|Produces outbound traffic.|
|Downloads/requests other files from Internet.|
|There were some system executable files modified, which might indicate the presence of a PE-file infector.|
|Contains characteristics of an identified security risk.|
|Possible Security Risk|
- Attention! Characteristics of the following security risks were identified in the system:
||Worm.IM.Sohanad spreads via Yahoo Messenger and infects Windows. It sends a message to all Yahoo Messenger contacts of an infected user. The message contains a link enticing users to download the worm. The worm also disable certain Windows functionalities abd hijacks Internet Explorer homepage. It also downloads other maware and it will also attempt to propagate via the means of creating copies of itself onto removable devices such as USB flash and hard drives.
||These common components have files and keys that are in different threats but the threats are not related to one another in that the author of the signature is not the same. It is recommended that all these entries be removed.
||Trojan-Downloader.Injecter.LR contacts a remote server in order to log an infection and attempts to download code and may install other malware.
||Backdoor.Rbot.ADF is a trojan which opens network ports and allows attackers to gain unauthorized access to the system. It also spreads to network shares by exploiting weak passwords.
||Trojan.PSW.QQPass.AM steals login information such as usernames and passwords and sends them via e-mail to a remote location.
- Attention! The following threat category was identified:
||A virus capable to modify other files by infecting, prepending, or overwriting them them with its own body
|File System Modifications|
- The following files were created in the system:
- %CommonPrograms% is a variable that refers to the file system directory that contains the directories for the common program groups that appear on the Start menu for all users. A typical path is C:\Documents and Settings\All Users\Start Menu\Programs (Windows NT/2000/XP).
- %Programs% is a variable that refers to the file system directory that contains the user's program groups. A typical path is C:\Documents and Settings\[UserName]\Start Menu\Programs.
- %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
- %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
- The following files were modified:
- [pathname with a string SHARE]\msinfo32.exe
- [pathname with a string SHARE]\sapisvr.exe
- %ProgramFiles%\Internet Explorer\Connection Wizard\icwconn1.exe
- %ProgramFiles%\Internet Explorer\Connection Wizard\icwconn2.exe
- %ProgramFiles%\Internet Explorer\Connection Wizard\icwrmind.exe
- %ProgramFiles%\Internet Explorer\Connection Wizard\icwtutor.exe
- %ProgramFiles%\Internet Explorer\Connection Wizard\inetwiz.exe
- %ProgramFiles%\Internet Explorer\Connection Wizard\isignup.exe
- %ProgramFiles%\Internet Explorer\iedw.exe
- %ProgramFiles%\Outlook Express\msimn.exe
- %ProgramFiles%\Outlook Express\oemig50.exe
- %ProgramFiles%\Outlook Express\setup50.exe
- %ProgramFiles%\Outlook Express\wab.exe
- %ProgramFiles%\Outlook Express\wabmig.exe
- %ProgramFiles%\Web Publish\WPWIZ.EXE
- %ProgramFiles%\Windows Media Player\migrate.exe
- %ProgramFiles%\Windows Media Player\mplayer2.exe
- %ProgramFiles%\Windows Media Player\setup_wm.exe
- %ProgramFiles%\Windows Media Player\wmplayer.exe
- %ProgramFiles%\Windows NT\Accessories\wordpad.exe
- %ProgramFiles%\Windows NT\dialer.exe
- %ProgramFiles%\Windows NT\hypertrm.exe
- %ProgramFiles%\Windows NT\Pinball\PINBALL.EXE
- %Windir%\Cache\Adobe Reader 6.0.1\ENUBIG\setup.exe
- %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
- The following directories were created:
- c:\System Volume Information\.
- c:\System Volume Information\..
- c:\New Folder
- There were new processes created in the system:
- The following Registry Keys were created:
- The newly created Registry Values are:
- UpdateHost = 00 50 5F 8F C1 76
- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
- v0lut47 = "%AppData%\3kvq.exe"
- tgs90gv74rexepath = "%AppData%\3kvq.exe"
- tgs90gv74rpath = "%AppData%\"
- Security = 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 0
- Type = 0x00000110
- Start = 0x00000002
- ErrorControl = 0x00000000
- ImagePath = "%AppData%\MouseDriver.bat"
- DisplayName = "MouseDriver"
- ObjectName = "LocalSystem"
- Description = "Enables a computer to use mouse from USB port. Stopping or disabling this service will result in system instability."
- The following Registry Value was modified:
- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
- Cookies =
- Cache =
- History =
- There were registered attempts to establish connection with the remote hosts. The connection details are:
|Remote Host||Port Number|
- The data identified by the following URL was then requested from the remote web server:
|Outbound traffic (potentially malicious)|
- There was an outbound traffic produced on port 80:
All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.
The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.
Copyright © 2013 ThreatExpert. All rights reserved.