SHA256: | bd425e2fe69b29bf4480112ce0480760a75ecf25dfab0539cbab83d76fbe857a |
File name: | invoiceTHGDH13RTJ24MXSGE1.JPG.exe |
Detection ratio: | 21 / 46 |
Analysis date: | 2013-02-05 00:04:52 UTC ( 2 時間, 1 分 ago ) View latest |
Antivirus | Result | Update |
---|---|---|
MicroWorld-eScan | Trojan.Agent.AYJT | 20130205 |
nProtect | - | 20130204 |
CAT-QuickHeal | (Suspicious) - DNAScan | 20130204 |
McAfee | RDN/Generic.bfr!d | 20130205 |
Malwarebytes | Trojan.Ransom.ED | 20130204 |
K7AntiVirus | - | 20130204 |
TheHacker | - | 20130205 |
Agnitum | - | 20130204 |
F-Prot | - | 20130201 |
Symantec | Trojan.Zbot | 20130205 |
Norman | Injector.DDPE | 20130204 |
TotalDefense | - | 20130204 |
TrendMicro-HouseCall | TROJ_GEN.R47H1B4 | 20130204 |
Avast | - | 20130205 |
eSafe | - | 20130204 |
ClamAV | - | 20130205 |
Kaspersky | Trojan-Spy.Win32.Zbot.isgd | 20130204 |
BitDefender | Trojan.Agent.AYJT | 20130205 |
NANO-Antivirus | - | 20130204 |
ViRobot | - | 20130204 |
ByteHero | - | 20130204 |
Emsisoft | PWS.Win32.Zbot.AMN (A) | 20130205 |
Comodo | - | 20130204 |
F-Secure | - | 20130204 |
DrWeb | Trojan.Winlock.6412 | 20130205 |
VIPRE | Win32.Malware!Drop | 20130204 |
AntiVir | - | 20130204 |
TrendMicro | - | 20130205 |
McAfee-GW-Edition | Artemis!DBE45C0E9B24 | 20130204 |
Sophos | - | 20130204 |
Jiangmin | - | 20121221 |
Antiy-AVL | - | 20130204 |
Kingsoft | Win32.Troj.Zbot.is.(kcloud) | 20130204 |
Microsoft | PWS:Win32/Zbot.gen!Y | 20130204 |
SUPERAntiSpyware | - | 20130204 |
GData | Trojan.Agent.AYJT | 20130205 |
Commtouch | - | 20130204 |
AhnLab-V3 | - | 20130204 |
VBA32 | - | 20130204 |
PCTools | Trojan.Zbot | 20130204 |
ESET-NOD32 | Win32/Spy.Zbot.YW | 20130204 |
Rising | - | 20130204 |
Ikarus | Trojan-PWS.Win32.Zbot | 20130204 |
Fortinet | W32/Zbot.ANQ!tr | 20130205 |
AVG | - | 20130204 |
Panda | Suspicious file | 20130204 |
You have not signed in. Only registered users can leave comments, sign in and have a voice!
ssdeep3072:Y1KB13fQa57HR8fCJvgH3cIqBuh50+toivBjGjFil/rQkvM:Y1KX3P57mfCJvgPqUvRoISjFil/rzk |
TrIDWin32 Dynamic Link Library (generic) (65.4%)Generic Win/DOS Executable (17.2%) DOS Executable Generic (17.2%) Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%) |
ExifToolMIMEType.................: application/octet-stream Subsystem................: Windows GUI MachineType..............: Intel 386 or later, and compatibles TimeStamp................: 2012:08:07 07:08:52+01:00 FileType.................: Win32 EXE PEType...................: PE32 CodeSize.................: 32768 LinkerVersion............: 11.1 EntryPoint...............: 0x8bc5 InitializedDataSize......: 119296 SubsystemVersion.........: 5.1 ImageVersion.............: 0.0 OSVersion................: 5.1 UninitializedDataSize....: 0 |
Sigcheckverified.................: |
Portable Executable structural informationCompilation timedatestamp.....: 2012-08-07 06:08:52 Target machine................: 0x14C (Intel 386 or later processors and compatible processors) Entry point address...........: 0x00008BC5 PE Sections...................: Name Virtual Address Virtual Size Raw Size Entropy MD5 .text 4096 32438 32768 7.27 d76cc2d229bbb68de4afd88dda0d0c49 .crt 36864 80189 80384 6.77 d499e4d4de87a00ad373fa4b4d54ddb5 .dlgi 118784 64 512 0.72 71ab7b529df2d31bb0ea17cca3e80018 .data 122880 154624 31744 6.79 aa159f768146fe5c39e503eb404b35a5 .rsrc 278528 3308 3584 4.26 e7c3c8ba1c43f3b02ddc5f93365555c8 .reloc 282624 2786 3072 6.34 970eb740fa6d3ed136381269eccff17d PE Imports....................: [[KERNEL32.dll]] GetWindowsDirectoryW [[SHLWAPI.dll]] PathIsSameRootW, PathIsURLA [[USER32.dll]] UnhookWindowsHookEx, GetMessagePos, IsWindowVisible, RegisterWindowMessageA PE Exports....................: TimersContacE, ?NervanGonesty@@YG_JEPAXUfurrone2897320391401938091831@@WE, ?NervanLogicalA@@YG_JEPAXUfurrone2897320391401938091831@@WE, ?NervanLogicalW@@YG_JEPAXUfurrone2897320391401938091831@@WE, ?NervanMathOP@@YG_JEPAXUfurrone2897320391401938091831@@WE PE Resources..................: Resource type Number of resources RT_BITMAP 2 RT_CURSOR 2 RT_GROUP_CURSOR 1 Resource language Number of resources ENGLISH US 5 |
Symantec ReputationSuspicious.Insight |
F-Secure DeepguardSuspicious:W32/Malware!Online |
First seen by VirusTotal2013-02-04 12:28:03 UTC ( 13 時間, 38 分 ago ) |
Last seen by VirusTotal2013-02-05 00:35:17 UTC ( 1 時間, 30 分 ago ) |
File names (max. 25)
|
The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
File system activity |
Opened files...\\.\PIPE\lsarpc (successful) |
Read files...C:\bd425e2fe69b29bf4480112ce0480760a75ecf25dfab0539cbab83d76fbe857a (successful) |
Written files...C:\Documents and Settings\<USER>\Application Data\Ryro\lybiyp.exe (successful) |
Copied files...SRC: C:\DOCUME~1\<USER>~1\LOCALS~1\Temp\MPS1.tmp |
Deleted files...C:\Documents and Settings\<USER>\Local Settings\Application Data\Identities\{B0BB3B42-3666-47AA-8D85-B94B99DB4C9B}\Microsoft\Outlook Express\Inbox.dbx (successful) |
Registry activity |
Set keys...KEY: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%windir%\explorer.exe |
Process activity |
Created processes...C:\Documents and Settings\<USER>\Application Data\Ryro\lybiyp.exe"" (successful) |
Shell commands...((null)) C:\DOCUME~1\<USER>~1\LOCALS~1\Temp\tmp5b9879be\Psupdate.exe(null) [(null)] (successful) |
Code injections in the following processes...explorer.exe (successful) |
Mutex activity |
Created mutexes...Global\{40A337F4-2BB8-2CD5-CB58-0DCBD23068AD} (successful) |
Opened mutexes...Local\{29817068-6C24-45F7-CB58-0DCBD23068AD} (failed) |
Application windows activity |
Searched windows...CLASS: Shell_TrayWnd |
Windows service activity |
Opened service managers...MACHINE: localhost |
Opened services...RASMAN (successful) |
Runtime DLLsshlwapi (successful) |
Additional details
|
Network activity |
HTTP requests...URL: http://web.wwwdnsup.com/web/newsfeeds.php |
DNS requests...web.wwwdnsup.com (46.17.97.54) |
TCP connections...46.17.97.54:80 |
UDP communications...<MACHINE_DNS_SERVER>:53 |