Posted October 15, 200915 yr Hi All I found the attached malware in one of my test machine. It looks like it drops itself to the system32 directory with some random name and adds entries to the registry so that it can start as a service every time the machine boots. I don't seem to go further after, can you look into this. Seems like it does do some damage so analyzing this in a virtual environment is recommended. Attached is a malware so pls exercise care!!! password - infected EDIT: Nobody looked at this yet? MNR8TTI7OP.zip Edited October 16, 200915 yr by quosego
October 16, 200915 yr Patience, though reversers do some malware analysis here, it's purely voluntarily.. So it might take a while for some to have the time to look at your piece of malware. Combined your posts.. Not really necessary to bump it.
October 29, 200915 yr VMware + maltrap == pure wonders..DLLPath: C:\Documents and Settings\Administrator\Desktop\maltrap_v0.2a\maltrap.dllProcess injected! PID: 3660PID: 3660, All hooks are now in place!PID: 3660, 0x00406D6E: RegOpenKeyExA(key: HKEY_LOCAL_MACHINE, subkey: SYSTEM\CurrentControlSet\Services\ferst) -> FAILPID: 3660, 0x00406ECB: CopyFileA(existing: C:\Documents and Settings\Administrator\Desktop\G001.exe, new: C:\WINDOWS\system32\qokqe.exe, overwrite: 00000000)PID: 3660, 0x00406F2F: OpenSCManagerA(machName: (null), dbName: (null), access: 000F003F) -> h:0025EB58PID: 3660, 0x00406F64: CreateServiceA(ServiceName: ferst, DisplayName: ces, Type: 00000010, StartType: 00000002, StartName: (null), Path: C:\WINDOWS\system32\qokqe.exe, Password: (null)) -> h:0025E8A0PID: 3660, --- Service runs in its own processPID: 3660, --- Is started automatically by the SCM during system startupPID: 3660, 0x00406FB0: StartServiceA(hService: 0025E8A0, serviceArgs: (null)) -> SUCCESSPID: 3660, 0x00407027: RegOpenKeyA(key: HKEY_LOCAL_MACHINE, subkey: SYSTEM\CurrentControlSet\Services\ferst) -> SUCCESSPID: 3660, --- handle: 00000754PID: 3660, 0x00407049: RegSetValueExA(keyHandle: 00000754, valueName: Description, data: fsr) -> SUCCESSPID: 3660, 0x7C81F2AE: GetFileAttributesW(C:\Documents and Settings\Administrator\Desktop\G001.exe)PID: 3660, 0x7C910A16: CreateProcessA(appName: (null), cmdLine: C:\WINDOWS\system32\cmd.exe /c del C:\DOCUME~1\ADMINI~1\Desktop\G001.exe > nul)PID: 3660, --- Creating the process in suspended state...PID: 3660, --- Resulting PID: 3692PID: 3660, --- Escalating privileges so the process can be opened...PID: 3660, --- Opening the process...PID: 3660, --- Allocating memory in the process...PID: 3660, --- Writing the DLL into memory...PID: 3660, --- Resuming the suspended process...PID: 3660, 0x00407548: ExitProcess(exitcode: 0)[Termination] PID 3660 has terminated!So:1. Kill process in memory;2. Delete file from system32;3. Start > Run > services.msc -> then find "ces" service (in my case) and set it to disabled (you can also wipe the registry key above)Cheers,Sun Edited October 29, 200915 yr by SunBeam
October 30, 200915 yr Author Thanks for your time SunBeam much appreciated.... I was actually wondering what is it capable of doing?
November 19, 200915 yr My analysis to this malware with ollydbg1 Grab all the information of the computer2 Manipulate the Registry 3 Execute the function Random to create 5 different words4 copy the same Malware [ exe ]5 System32 is where goes the new exeevery time that a person got infected the Malware change the name with the function Random for example: ybdaw.exe <== 5 words6 The Malware proceed to communicate with some page,web, etc.7 If the the Malware do not get connected then proceed to sleep 8 if the Malware got connected then change the password for user 1then change the password for user 2resume:Basically this Malware is some kind of Trojan Hrse . Edited November 19, 200915 yr by delldell
November 20, 200915 yr Author My analysis to this malware with ollydbg1 Grab all the information of the computer2 Manipulate the Registry 3 Execute the function Random to create 5 different words4 copy the same Malware [ exe ]5 System32 is where goes the new exeevery time that a person got infected the Malware change the name with the function Random for example: ybdaw.exe <== 5 words6 The Malware proceed to communicate with some page,web, etc.7 If the the Malware do not get connected then proceed to sleep 8 if the Malware got connected then change the password for user 1then change the password for user 2resume:Basically this Malware is some kind of Trojan Hrse .I keep track of this malware till step 5, after which I'm losing track, the process just exits :S
Create an account or sign in to comment