Analysis Date2015-10-13 00:20:31
MD5da0597e80d80022070f805acd078842d
SHA13a28d8b0d7b194367fe0f50bac7e494b1ddd8654

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
SectionUPX0 md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
SectionUPX1 md5: 70960e57eb45f8ade6cc8d7ef5bc7c95 sha1: 81e8786da2130b1f404a5ff816532fa352c2816c size: 21504
Section.rsrc md5: e997ba6e11b11cd324e93a079284be5d sha1: 64b9af09bb1f70e1137bd1bf1037c627e08a44c9 size: 2560
Timestamp2014-07-06 18:22:51
VersionLegalCopyright: (c) 2000-2014 Martin Prikryl
InternalName: winscp
FileVersion: 5.5.3.4214
CompanyName: Martin Prikryl
ReleaseType: stable
WWW: http://winscp.net/
ProductName: WinSCP
ProductVersion: 5.5.3.0
FileDescription: WinSCP: SFTP, FTP and SCP client
OriginalFilename: winscp.exe
PackerUPX -> www.upx.sourceforge.net
PEhash6fa98d17dbc21dd593e30f343c4e251faaebf51c
IMPhash06d92d662f64304b53228e40b8aadea8
AVAd-AwareGeneric.ServStart.E603F420
AVClamAVWin.Trojan.Dropped-1488
AVMicroWorld (escan)Generic.ServStart.E603F420
AVMalwareBytesTrojan.ServStart
AVPadvishno_virus
AVZillya!Worm.ServStart.Win32.60
AVGrisoft (avg)DoS.FEZ
AVBullGuardGeneric.ServStart.E603F420
AVCAT (quickheal)no_virus
AVAlwil (avast)Evo-gen [Susp]
AVFrisk (f-prot)W32/Heuristic-114!Eldorado
AVTrend MicroTROJ_NITOL.SMN1
AVFortinetW32/ServStart.GL!tr
AVIkarusTrojan.Win32.ServStart
AVMcafeeTrojan-FGAH!F2786695F02A
AVRisingBackdoor.Overie!486D
AVEmsisoftGeneric.ServStart.E603F420
AVBitDefenderGeneric.ServStart.E603F420
AVTwisterTrojan.Cap1471811.wnmt
AVDr. WebTrojan.DownLoader11.21065
AVAuthentiumW32/Heuristic-114!Eldorado
AVKasperskyTrojan.Win32.Generic
AVCA (E-Trust Ino)no_virus
AVSymantecBackdoor.Nitol
AVMicrosoft Security EssentialsDDoS:Win32/Nitol.A
AVF-SecureGeneric.ServStart.E603F420
AVArcabit (arcavir)Generic.ServStart.E603F420
AVAvira (antivir)TR/Graftor.146258
AVEset (nod32)Win32/ServStart.D worm
AVK7Trojan-Downloader ( 0040f8ad1 )
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mnopqr Tuvwxyab Def\Description ➝
Mnopqrst Vwxyabcde Ghijklm Opqrstuv Xya
Creates FileC:\WINDOWS\kkiogq.exe
Creates ProcessC:\WINDOWS\system32\cmd.exe /c del C:\3A28D8~1.EXE > nul
Creates MutexC:\malware.exe
Creates ServiceMnopqr Tuvwxyab Defghijk Mnop - C:\WINDOWS\kkiogq.exe

Process
↳ C:\WINDOWS\system32\cmd.exe /c del C:\3A28D8~1.EXE > nul

Creates Filenul
Deletes FileC:\malware.exe

Process
↳ Pid 812

Process
↳ Pid 860

Process
↳ C:\WINDOWS\System32\svchost.exe

Process
↳ Pid 1120

Process
↳ Pid 1216

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1876

Process
↳ Pid 1168

Process
↳ C:\WINDOWS\kkiogq.exe

Creates Filepipe\net\NtControlPipe10
Creates File\Device\Afd\Endpoint
Creates MutexMnopqr Tuvwxyab Def
Creates MutexC:\WINDOWS\kkiogq.exe
Creates MutexDBWinMutex

Network Details:

DNSlinfeng.sytes.net
Type: A

Raw Pcap

Strings