Submission Summary:
Submission details:
Submission received: 29 March 2009, 22:12:16
Processing time: 10 min 7 sec
Submitted sample:
File MD5: 0xAACA1EB2EF0DBAD6440891A87DD7C534
File SHA-1: 0xE6988028273464342C114B1F22B286ABA50ABE13
Filesize: 1,402,585 bytes
Alias:
Trojan:Win32/Meredrop [Microsoft]
Trojan-Spy.Win32.Montp.y [Ikarus]
Win-Trojan/Xema.variant [AhnLab]
Summary of the findings:
What's been found Severity Level
Downloads/requests other files from Internet.
Registers a 32-bit in-process server DLL.
Contains characteristics of an identified security risk.
Technical Details:
Possible Security Risk
Attention! Characteristics of the following security risk was identified in the system:
Security Risk Description
Trojan-PWS.Stealer.HF This trojan steals login and password information stored on an infected machine and sends the stolen information to the attacker without the users permission.
File System Modifications
The following files were created in the system:
# Filename(s) File Size File Hash Alias
1 %ProgramFiles%\WAIGUA\Script\XX.Script 1,510 bytes MD5: 0x20A29DAE88F0BE599C9DE92D7498DF0F
SHA-1: 0xE3B7CEA4ACBA88FE2F7766DDEB72EE466BE5328F (not available)
2 %ProgramFiles%\WAIGUA\Tes.dll 188,416 bytes MD5: 0x13525467781BFCB558372E19DC32FFF6
SHA-1: 0xA4739E6C3E2A96E5401B25FFF8A5C301E4ED528B packed with PE_Patch.UPX [Kaspersky Lab]
3 %ProgramFiles%\WAIGUA\XX.ini 1,585 bytes MD5: 0x98FAFA20AF8ADEC66AAA3C1E08AFF235
SHA-1: 0x4A513448891F6DC1399973B4257A4A9271091FDA (not available)
4 %ProgramFiles%\WAIGUA\Ѱ��.exe 863,744 bytes MD5: 0xD1716CE62F3475E5F83EC7C825513D3C
SHA-1: 0xF2C7A9E9088414A3CE4AA1A66E764EC54F716FB8 (not available)
5 %FontsDir%\gzqqxx01.dat 42 bytes MD5: 0xFDB2399D052C1A7E43F1F0C0AEFA8E48
SHA-1: 0x3615E7CE14A0CEA160FBB96A12014DB46433D957 (not available)
6 %FontsDir%\oefhemdi.dll 49,152 bytes MD5: 0xDFE595335726A370A8BF28A5221BFF62
SHA-1: 0x896B0DEB8394E1D4A7FC8EDCC43A7648A5084A9C PWS-QQPass.dll [McAfee]
Mal/Behav-010, Mal/Behav-027 [Sophos]
PWS:Win32/OnLineGames.CQ [Microsoft]
Generic.PWS.Games [Ikarus]
Win-Trojan/OnlineGameHack.49152.FY [AhnLab]
7 [file and pathname of the sample #1] 1,402,585 bytes MD5: 0xAACA1EB2EF0DBAD6440891A87DD7C534
SHA-1: 0xE6988028273464342C114B1F22B286ABA50ABE13 Trojan:Win32/Meredrop [Microsoft]
Trojan-Spy.Win32.Montp.y [Ikarus]
Win-Trojan/Xema.variant [AhnLab]
8 %System%\YingInstall\409.ini 3,829 bytes MD5: 0x743F4CFCFAAEF1A3BDAF49C23F69E5EB
SHA-1: 0xF3EC13632490C6D20EDB7BAE8CA11544952AC047 (not available)
9 %Windir%\Ying-UnInstall.exe 450,048 bytes MD5: 0x23BA5FA2CC6714373B37A189BDD4BC18
SHA-1: 0x9CADD66B8F1145BFA5DD0CA459CCA7739AA186DE (not available)
Notes:
%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
%FontsDir% is a variable that refers to a virtual folder containing fonts. A typical path is C:\Windows\Fonts.
%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
%Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
The following directories were created:
%ProgramFiles%\WAIGUA
%ProgramFiles%\WAIGUA\Config
%ProgramFiles%\WAIGUA\Script
%System%\YingInstall
Memory Modifications
There were new processes created in the system:
Process Name Process Filename Main Module Size
xxwg.exe %ProgramFiles%\WAIGUA\xxwg.exe 81,920 bytes
[generic host process] [generic host process filename] 20,480 bytes
ying-uninstall.exe %Windir%\ying-uninstall.exe 475,136 bytes
[filename of the sample #1] [file and pathname of the sample #1] 634,880 bytes
Notes:
[generic host process filename] is a full path filename of [generic host process].
The following modules were loaded into the address space of other process(es):
Module Name Module Filename Address Space Details
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: explorer.exe
Process filename: %Windir%\explorer.exe
Address space: 0x19C0000 - 0x19CF000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: msmsgs.exe
Process filename: %ProgramFiles%\messenger\msmsgs.exe
Address space: 0xBA0000 - 0xBAF000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: dllhost.exe
Process filename: %System%\dllhost.exe
Address space: 0x2530000 - 0x253F000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: sdnsmain.exe
Process filename: %Windir%\dns\sdnsmain.exe
Address space: 0x1620000 - 0x162F000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0x1B30000 - 0x1B3F000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: Ѱ��.exe
Process filename: %ProgramFiles%\waigua\���.exe
Address space: 0x390000 - 0x39F000
Registry Modifications
The following Registry Keys were created:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\ProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\Programmable
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\VersionIndependentProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\0\win32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\FLAGS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\HELPDIR
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CurVer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1\CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA\1.1
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\VersionIndependentProgID]
(Default) = "QQXX.qqxxatl"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\TypeLib]
(Default) = "{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\ProgID]
(Default) = "QQXX.qqxxatl.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\InprocServer32]
(Default) = "%FontsDir%\oefhemdi.dll"
ThreadingModel = "Apartment"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}]
(Default) = "qqxxatl Class"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\TypeLib]
(Default) = "{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}"
Version = "1.0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid32]
(Default) = "{00020424-0000-0000-C000-000000000046}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid]
(Default) = "{00020424-0000-0000-C000-000000000046}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}]
(Default) = "Iqqxxatl"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\0\win32]
(Default) = "%FontsDir%\oefhemdi.dll"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\HELPDIR]
(Default) = "%FontsDir%\"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\FLAGS]
(Default) = "0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0]
(Default) = "QQXX 1.0 Type Library"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CurVer]
(Default) = "QQXX.qqxxatl.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CLSID]
(Default) = "{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl]
(Default) = "qqxxatl Class"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1\CLSID]
(Default) = "{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1]
(Default) = "qqxxatl Class"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C} = ""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
%FontsDir%\oefhemdi.dll = "{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}"
[HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA\1.1]
ProgramFolder = ""
[HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA]
Path = "%ProgramFiles%\WAIGUA"
Version = "1.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall]
LastVersion = "5.8" |