Malware Analysis

Hacking 2010. 4. 23. 17:53

Submission Summary:

  • Submission details:
    • Submission received: 22 April 2010, 21:45:06
    • Processing time: 7 min 30 sec
    • Submitted sample:
      • File MD5: 0x504CB0E268EAB6F47BD35780C537BCB1
      • File SHA-1: 0x8EA44DC3C9B379A0E580074C5C325797BFEE83B6
      • Filesize: 95,819 bytes
      • Alias:
  • Summary of the findings:

What's been found Severity Level
Downloads/requests other files from Internet.
Creates a startup registry entry.
Registers a 32-bit in-process server DLL.
Registers a Browser Helper Object (Microsoft's Internet Explorer plugin module).
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk
  • Attention! Characteristics of the following security risks were identified in the system:

Security Risk Description
Trojan-PWS.Magania.AHIW Trojan-PWS.Magania.AHIW is threat that tries to monitors user activities in hopes to obtain valuable information from the affected user, specifically gaming login informations.
Trojan.Generic Common Components that may be used by Trojans Small, DRSN Search, Binet, Euniverse, Adrotator and Dloader among others.

  • Attention! The following threat categories were identified:

Threat Category Description
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment
A program that downloads files to the local computer that may represent security risk

 

File System Modifications
  • The following files were created in the system:

# Filename(s) File Size File Hash Alias
1 %Windir%\AhnRpta.exe 69,120 bytes MD5: 0x388B8FBC36A8558587AFC90FB23A3B99
SHA-1: 0xED55AD0A7078651857BD8FC0EEDD8B07F94594CC
(not available)
2 %System%\anhdo.exe 159,024 bytes MD5: 0xA7A748E6017E471FC36E9332627C147C
SHA-1: 0x1FDF53F443BA029941D14BD3DB566FA0F7C069A5
Worm:Win32/Taterf.B [Microsoft]
packed with PE_Patch [Kaspersky Lab]
3 %System%\ansb10.dll
%System%\ansb11.dll
64,598 bytes MD5: 0x34503D6515C78FE759986E73F2482B06
SHA-1: 0xB0D9857230D10193DC0BCE290866266248AADFC2
PWS:Win32/Frethog.gen!G [Microsoft]
packed with PE_Patch [Kaspersky Lab]
4 %System%\ansb20.dll 78,270 bytes MD5: 0x58DBD396A3DF3E1FB0B54EA57242555A
SHA-1: 0x30597FA342034EB381EE117941F1BA343207BD91
PWS:Win32/OnLineGames.AH [Microsoft]
packed with PE_Patch [Kaspersky Lab]
5 [file and pathname of the sample #1] 95,819 bytes MD5: 0x504CB0E268EAB6F47BD35780C537BCB1
SHA-1: 0x8EA44DC3C9B379A0E580074C5C325797BFEE83B6
Trojan.Gen [Symantec]
Trojan-GameThief.Win32.Magania.dbxc [Kaspersky Lab]
New Malware.bx [McAfee]
TrojanDropper:Win32/Frethog.K [Microsoft]
Dropper/Killav.95819 [AhnLab]
6 %System%\softqq0.dll 64,521 bytes MD5: 0x39D3F8C3E522F07803A629E68D0B2E35
SHA-1: 0x4C5CE618A8DF1C1E70EC579BB58BA12C2842B391
Downloader [Symantec]
TrojanDownloader:Win32/Frethog.C [Microsoft]
Win-Trojan/Killav.64521 [AhnLab]
packed with PE_Patch [Kaspersky Lab]

  • Notes:
    • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
    • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

 

Memory Modifications
  • There was a new process created in the system:

Process Name Process Filename Main Module Size
AhnRpta.exe %Windir%\ahnrpta.exe 81,920 bytes

  • The following modules were loaded into the address space of other process(es):

Module Name Module Filename Address Space Details
softqq0.dll %System%\softqq0.dll Process name: explorer.exe
Process filename: %Windir%\explorer.exe
Address space: 0x1E80000 - 0x1EA8000
ansb10.dll %System%\ansb10.dll Process name: explorer.exe
Process filename: %Windir%\explorer.exe
Address space: 0x22A0000 - 0x22D1000
softqq0.dll %System%\softqq0.dll Process name: dllhost.exe
Process filename: %System%\dllhost.exe
Address space: 0x2530000 - 0x2558000
softqq0.dll %System%\softqq0.dll Process name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0x1500000 - 0x1528000
softqq0.dll %System%\softqq0.dll Process name: AhnRpta.exe
Process filename: %Windir%\ahnrpta.exe
Address space: 0x10000000 - 0x10028000
softqq0.dll %System%\softqq0.dll Process name: VMwareUser.exe
Process filename: %ProgramFiles%\vmware\vmware tools\vmwareuser.exe
Address space: 0x10000000 - 0x10028000
softqq0.dll %System%\softqq0.dll Process name: AhnRpta.exe
Process filename: %Windir%\ahnrpta.exe
Address space: 0x890000 - 0x8B8000

  • Notes:
    • %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.

 

Registry Modifications
  • The following Registry Keys were created:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\NOD32KVBIT
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}\InprocServer32
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B03A4BE6-5E5A-B9B3-483E-C484D4B20B72}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\InprocServer32
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\ProgID
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\Programmable
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\VersionIndependentProgID
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}
  • The newly created Registry Values are:
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\NOD32KVBIT]
      • KVBIT_2 = "xxxkkmm"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}\InprocServer32]
      • (Default) = "%System%\softqq0.dll"
      • ThreadingModel = "Apartment"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B03A4BE6-5E5A-B9B3-483E-C484D4B20B72}]
      • VcbitExeModuleName = "[file and pathname of the sample #1]"
      • VcbitDllModuleName = "%System%\softqq0.dll"
      • VcbitSobjEventName = "CVBASDDOOPADSAMN_0"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\VersionIndependentProgID]
      • (Default) = "IEHlprObj.IEHlprObj"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\ProgID]
      • (Default) = "IEHlprObj.IEHlprObj.1"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}\InprocServer32]
      • (Default) = "%System%\ansb20.dll"
      • ThreadingModel = "Apartment"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}]
      • (Default) = "IEHlprObj Class"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer]
      • (Default) = "IEHlprObj.IEHlprObj.1"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj]
      • (Default) = "IEHlprObj Class"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID]
      • (Default) = "{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636}"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1]
      • (Default) = "IEHlprObj Class"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
      • {B03A4BE6-5E5A-483E-B9B3-C484D4B20B72} = "hook dll rising"
    • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
      • anhdo = "%System%\anhdo.exe"

      so that anhdo.exe runs every time Windows starts

 

Other details
  • Analysis of the file resources indicate the following possible country of origin:

China

  • There was registered attempt to establish connection with the remote host. The connection details are:

Remote Host Port Number
114.31.57.82 80

  • The data identified by the following URLs was then requested from the remote web server:
    • http://bebehouse.geniemom.com/images_old/board/play.txt
    • http://bebehouse.geniemom.com/images_old/board/copy.rar

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2010 ThreatExpert. All rights reserved.


'Hacking' 카테고리의 다른 글

Java Applet Security Model  (0) 2010.04.23
SSH JAVA APPLET http://javassh.org/space/start  (1) 2010.04.23
Computer Security Consulting  (0) 2010.04.02
Update Snort  (0) 2010.03.04
BASE 2010.3.3. Wed  (1) 2010.03.04
Posted by CEOinIRVINE
l