Full Analysis Report of sdx98az-107-16-50593.exe

Summary:

  • Summary of the findings

      No. What's been found Severity
      1 The browser's homepage has been changed to "http://www.p100.pw"

Technical details:

  • General

    • User : \\TEST-R7CHD9Q826\Administrator
    • Application type : Windows application
    • Priority : Normal
    • Size : 74915
    • Path : C:\Samples\sdx98az-107-16-50593.exe
    • Command : "C:\Samples\sdx98az-107-16-50593.exe"
    • MD5: 367a046e835dc7bc5bc2564d9fd31cef
    • SHA1: 33d3b42713052f430fbc9c637e7ed4d1c7b243c4
    • Alias

      • NSIS/TrojanDownloader.Grinidou.E [ESET-NOD32]
      • W32/StartPage.NY!tr [Fortinet]
      • Virus ( 6b49d2001 ) [K7GW]
      • Generic Downloader.sd [McAfee]
      • StartPage-NY [McAfee-GW-Edition]
      • Mal/NsisDl-A [Sophos]
      • Trojan-Downloader.NSIS.Agent.nos (v) [VIPRE]
    • Version details

      • Company :
      • File version :
      • Product version :
      • Desciption :
      • Product name :
      • Legal copyright :
      • Internal name :
    • File times

      • Creation time : Tuesday, April 15, 2014 - 21:39:26
      • Modification time : Tuesday, April 15, 2014 - 21:39:27
      • Last access time : Tuesday, April 22, 2014 - 19:06:50
    • Process times

      • Start time : 19 : 06 : 50
      • Exit time : 19 : 07 : 30
      • Kernel time : 0.281250 (s)
      • User time : 0.031250 (s)
    • IO counters

      • Read operation : 232
      • Write operation : 12
      • Other operation : 8014
      • Read transfer : 308870
      • Write transfer : 20724
      • Other transfer : 105875
    • Memory details

      • Page fault count : 2266
      • Page file usage : 0
      • Peak page file usage : 3076096
      • Peak working set size : 5496832
      • Quota non paged pool usage : 0
      • Quota paged pool usage : 0
      • Quota peak non paged pool usage : 4840
      • Quota peak paged pool usage : 75260
      • Working set size : 28672
    • Process privileges

      • SeChangeNotifyPrivilege
      • SeSecurityPrivilege
      • SeBackupPrivilege
      • SeRestorePrivilege
      • SeSystemtimePrivilege
      • SeShutdownPrivilege
      • SeRemoteShutdownPrivilege
      • SeTakeOwnershipPrivilege
      • SeDebugPrivilege
      • SeSystemEnvironmentPrivilege
      • SeSystemProfilePrivilege
      • SeProfileSingleProcessPrivilege
      • SeIncreaseBasePriorityPrivilege
      • SeLoadDriverPrivilege
      • SeCreatePagefilePrivilege
      • SeIncreaseQuotaPrivilege
      • SeUndockPrivilege
      • SeManageVolumePrivilege
      • SeImpersonatePrivilege
      • SeCreateGlobalPrivilege
  • Events statistics

      Event Count
      OpenKey 48
      SetValueKey 34
      CreateFile 23
      CreateFolder 1
      WriteFile 8
      Process Create 1
      Process Exit 1
      Thread Create 20
      Thread Exit 20
      Load Image 96
  • Modules

      Index Name Path Load Address Image Size Entry Point Version Size Company Description
      1 ntdll.dll %System%\ntdll.dll 0x7C930000 0xD2000 0x00000000 5.2.3790.3290 (srv03_sp1_gdr.090203-1205) 841216 Microsoft Corporation NT Layer DLL
      2 KERNEL32.dll %System%\kernel32.dll 0x7C800000 0x12C000 0x7C825FB4 5.2.3790.3311 (srv03_sp1_gdr.090321-1245) 1206784 Microsoft Corporation Windows NT BASE API Client DLL
      3 USER32.dll %System%\user32.dll 0x77E10000 0x91000 0x77E1947C 5.2.3790.2892 (srv03_sp1_gdr.070301-0030) 584192 Microsoft Corporation Windows USER API Client DLL
      4 GDI32.dll %System%\gdi32.dll 0x77BD0000 0x49000 0x77BDB23E 5.2.3790.3233 (srv03_sp1_gdr.081022-1216) 286208 Microsoft Corporation GDI Client DLL
      5 ADVAPI32.dll %System%\advapi32.dll 0x77F30000 0xAC000 0x77F4DFCD 5.2.3790.3290 (srv03_sp1_gdr.090203-1205) 686592 Microsoft Corporation Advanced Windows 32 Base API
      6 RPCRT4.dll %System%\rpcrt4.dll 0x77C20000 0x9F000 0x77C45061 5.2.3790.2971 (srv03_sp1_gdr.070709-2334) 642560 Microsoft Corporation Remote Procedure Call Runtime
      7 shell32.dll %System%\shell32.dll 0x7CA10000 0x7E1000 0x7CA90660 6.00.3790.3158 (srv03_sp1_gdr.080617-1231) 8242176 Microsoft Corporation Windows Shell Common Dll
      8 msvcrt.dll %System%\msvcrt.dll 0x77B70000 0x5A000 0x77B7F78B 7.0.3790.1830 (srv03_sp1_rtm.050324-1447) 348672 Microsoft Corporation Windows NT CRT DLL
      9 SHLWAPI.dll %System%\shlwapi.dll 0x77EB0000 0x52000 0x77ED86F9 6.00.3790.3304 (srv03_sp1_gdr.090303-1204) 320512 Microsoft Corporation Shell Light-weight Utility Library
      10 Comctl32.dll %Windir%\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.1830_x-ww_7AE38CCF\comctl32.dll 0x77CD0000 0x103000 0x77D5A81E 6.0 (srv03_sp1_rtm.050324-1447) 1051136 Microsoft Corporation User Experience Controls Library
      11 ole32.dll %System%\ole32.dll 0x774B0000 0x134000 0x774F5C37 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 1244672 Microsoft Corporation Microsoft OLE for Windows
      12 VERSION.dll %System%\version.dll 0x77B60000 0x8000 0x77B61186 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 18432 Microsoft Corporation Version Checking and File Installation Libraries
      13 IMM32.DLL %System%\imm32.dll 0x76180000 0x1D000 0x761812D0 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 110592 Microsoft Corporation Windows IMM32 API Client DLL
      14 LPK.DLL %System%\lpk.dll 0x63090000 0x9000 0x63092EB2 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 22016 Microsoft Corporation Language Pack
      15 USP10.dll %System%\usp10.dll 0x74AE0000 0x61000 0x74B189AC 1.0422.3790.1830 (srv03_sp1_rtm.050324-1447) 364032 Microsoft Corporation Uniscribe Unicode script processor
      16 MSCTF.dll %System%\MSCTF.dll 0x4B210000 0x51000 0x4B2113EE 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 317440 Microsoft Corporation MSCTF Server DLL
      17 rta1.tmp %Temp%rta1.tmp 0x00A70000 0x73000 0x00AE1910 176128
      18 MPR.dll %System%\mpr.dll 0x71B30000 0x11000 0x71B311E0 5.2.3790.0 (srv03_rtm.030324-2048) 57344 Microsoft Corporation Multiple Provider Router DLL
      19 OLEAUT32.dll %System%\oleaut32.dll 0x775F0000 0x8C000 0x775F3F9B 5.2.3790.3057 557568 Microsoft Corporation
      20 WSOCK32.dll %System%\wsock32.dll 0x71B10000 0xB000 0x71B11060 5.2.3790.0 (srv03_rtm.030324-2048) 28672 Microsoft Corporation Windows Socket 32-Bit DLL
      21 WS2_32.dll %System%\ws2_32.dll 0x71B60000 0x17000 0x71B61276 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 83968 Microsoft Corporation Windows Socket 2.0 32-Bit DLL
      22 WS2HELP.dll %System%\ws2help.dll 0x71B50000 0x8000 0x71B5123D 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 19968 Microsoft Corporation Windows Socket 2.0 Helper for Windows NT
      23 SHFOLDER.dll %System%\shfolder.dll 0x76610000 0x9000 0x7661121F 6.00.3790.1830 (srv03_sp1_rtm.050324-1447) 25088 Microsoft Corporation Shell Folder Service
      24 SETUPAPI.dll %System%\setupapi.dll 0x770D0000 0x176000 0x770D15D6 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 1522688 Microsoft Corporation Windows Setup API
      25 MSWSOCK.dll %System%\mswsock.dll 0x71A80000 0x40000 0x71A815C6 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 251904 Microsoft Corporation Microsoft Windows Sockets 2.0 Service Provider
      26 CLBCatQ.DLL %System%\clbcatq.dll 0x77680000 0x83000 0x776844B0 2001.12.4720.1830 (srv03_sp1_rtm.050324-1447) 514560 Microsoft Corporation COM+ Configuration Catalog
      27 COMRes.dll %System%\comres.dll 0x76F70000 0x15A000 0x76F71048 2001.12.4720.0 (srv03_rtm.030324-2048) 1401344 Microsoft Corporation COM+ Resources
      28 USERENV.dll %System%\userenv.dll 0x75870000 0xBF000 0x758725F9 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 769024 Microsoft Corporation Userenv
      29 NETAPI32.dll %System%\netapi32.dll 0x71BA0000 0x58000 0x71BAA4A5 5.2.3790.3229 (srv03_sp1_gdr.081016-1620) 350208 Microsoft Corporation Net Win32 API DLL
      30 apphelp.dll %System%\apphelp.dll 0x75D60000 0x27000 0x75D61239 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 150016 Microsoft Corporation Application Compatibility Client Library
      31 SHDOCVW.dll %System%\shdocvw.dll 0x77860000 0x175000 0x778A9481 6.00.3790.3304 (srv03_sp1_gdr.090303-1204) 1514496 Microsoft Corporation Shell Doc Object and Control Library
      32 CRYPT32.dll %System%\crypt32.dll 0x760A0000 0x91000 0x760A156D 5.131.3790.1830 (srv03_sp1_rtm.050324-1447) 587264 Microsoft Corporation Crypto API32
      33 MSASN1.dll %System%\msasn1.dll 0x76080000 0x12000 0x7608436D 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 57856 Microsoft Corporation ASN.1 Runtime APIs
      34 CRYPTUI.dll %System%\cryptui.dll 0x75290000 0x70000 0x752915FD 5.131.3790.1830 (srv03_sp1_rtm.050324-1447) 444416 Microsoft Corporation Microsoft Trust UI Provider
      35 WINTRUST.dll %System%\wintrust.dll 0x76B10000 0x2B000 0x76B11551 5.131.3790.1830 (srv03_sp1_rtm.050324-1447) 164864 Microsoft Corporation Microsoft Trust Verification APIs
      36 imagehlp.dll %System%\imagehlp.dll 0x76B70000 0x29000 0x76B7127A 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 148992 Microsoft Corporation Windows NT Image Helper
      37 wldap32.dll %System%\wldap32.dll 0x76E70000 0x2E000 0x76E7112A 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 177152 Microsoft Corporation Win32 LDAP API DLL
      38 xpsp2res.dll %System%\xpsp2res.dll 0x10000000 0x549000 0x00000000 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 5535744 Microsoft Corporation Service Pack 2 Messages
      39 hnetcfg.dll %System%\hnetcfg.dll 0x69660000 0x56000 0x69699708 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 341504 Microsoft Corporation Home Networking Configuration Manager
      40 wshtcpip.dll %System%\wshtcpip.dll 0x71A40000 0x8000 0x71A41176 5.2.3790.0 (srv03_rtm.030324-2048) 18432 Microsoft Corporation Windows Sockets Helper DLL

       

  • File system modifications

    • The following files were created

      • %Temp%nsoFE.tmp
      • %Temp%nsdFF.tmp
      • %Temp%nsdFF.tmp\NSISdl.dll
      • %Temp%nsdFF.tmp\kao.ini
      • %Temp%nsdFF.tmp\kao.ini.log
      • %Windir%\Debug\UserMode\ChkAcc.log
      • %Temp%llxicxn.exe
      • %Temp%tqomfn_70567.exe
      • %Temp%KXWebBox_3409_RBF.exe
      • %Temp%-8531_1_mny.exe
      • %Temp%pczh_98_2.exe
      • %Temp%kuping_b_52850.exe
      • %Temp%setup_a7158.exe
      • %Temp%setup_3128.exe
      • %Temp%GzQixiangPlatInstall_227.exe
      • %Temp%BaiduPlayerNetSetup_284.exe
      • %Temp%setup_3r6r_gz_7212.exe
      • %Temp%sOnlineTime_1318.exe
      • %Temp%9377chiyue_Y_gzllq.exe
      • %Temp%SoHuVA_4.2.0.16-c203948913-run-s-x.exe
      • %Temp%xkss_50041.exe
      • %Temp%_kkzm05_s.exe
      • %Temp%xkly_73.exe
    • The following folders were created

      • %Temp%nsdFF.tmp
    • The following files were modified

      • %Temp%nsdFF.tmp\NSISdl.dll
      • %Temp%nsdFF.tmp\kao.ini
      • %Temp%nsdFF.tmp\kao.ini.log
      • %ProgramFiles%\greendou\1.txt
      • %Programs%\̶\̶.lnk
      • %Desktop%\̶.lnk
      • %Desktop%\Internet Explorer.lnk
      • %Desktop%\36
    • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
      %Windows% is a variable that refers to the windows root folder. By default, this is C:\windows (Windows 95/98/Me/xp/vista/win7), C:\winnt (Windows NT/2000/2003/2008).
      %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
      %Desktop% is a variable that refers to the file system directory used to physically store file objects on the desktop (not to be confused with the desktop folder itself). A typical path is C:\Documents and Settings\username\Desktop.
      %Programs% is a variable that refers to a file system directory that contains the user's program groups (which are themselves file system directories). A typical path is C:\Documents and Settings\[username]\Start Menu\Programs.

  • Memory modifications

  • Registry modifications

    • The following Registry value was modified:

      • HKEY_LOCAL_MACHINE\software\microsoft\cryptography\rng\seed = 77 10 3A B6 56 6B 30 1C ...
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{db21b9c4-ec68-11e1-844d-806e6f6e6963}\baseclass = "Drive"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{db21b9c1-ec68-11e1-844d-806e6f6e6963}\baseclass = "Drive"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{db21b9c0-ec68-11e1-844d-806e6f6e6963}\baseclass = "Drive"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\programs = "C:\Documents and Settings\Administrator\ʼ˵\"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\desktop = "C:\Documents and Settings\Administrator\"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\start menu = "C:\Documents and Settings\Administrator\ʼ˵"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\common start menu = "C:\Documents and Settings\All Users\ʼ˵"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\common desktop = "C:\Documents and Settings\All Users\"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\common appdata = "C:\Documents and Settings\All Users\Application Data"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\appdata = "C:\Documents and Settings\Administrator\Application Data"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\my pictures = ""
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\commonpictures = ""
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\commonmusic = "C:\Documents and Settings\All Users\Documents\My Music"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\personal = "C:\Documents and Settings\Administrator\My Documents"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\common documents = "C:\Documents and Settings\All Users\Documents"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\commonvideo = ""
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\̶\displayname = "̶ 1.0.0.0"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\̶\displayversion = "1.0.0.0"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\̶\publisher = "9.nsi_nsis-2.44_88937"
      • HKEY_CURRENT_USER\software\microsoft\internet explorer\main\start page = "http://www.p100.pw"
      • HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
  • Network activity

  • How to get rid of

    • Remove these following files:

      • C:\Documents and Settings\Administrator\Local Settings\Temp\nsoFE.tmp
      • C:\WINDOWS\Debug\UserMode\ChkAcc.log
      • C:\Documents and Settings\Administrator\Local Settings\Temp\llxicxn.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\tqomfn_70567.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\KXWebBox_3409_RBF.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\-8531_1_mny.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\pczh_98_2.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\kuping_b_52850.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\setup_a7158.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\setup_3128.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\GzQixiangPlatInstall_227.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\BaiduPlayerNetSetup_284.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\setup_3r6r_gz_7212.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\sOnlineTime_1318.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\9377chiyue_Y_gzllq.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\SoHuVA_4.2.0.16-c203948913-run-s-x.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\xkss_50041.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\_kkzm05_s.exe
      • C:\Documents and Settings\Administrator\Local Settings\Temp\xkly_73.exe
    • Remove these following folders:

      • C:\Documents and Settings\Administrator\Local Settings\Temp\nsoFE.tmp
  • How to protect yourself in the future

This report was created with Ax3soft Scout.