Trojan-Downloader.Win32.Agent (VIPRE), Trojan.Win32.Swrort.3.FD (Lavasoft MAS)Behaviour: Trojan-Downloader, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: d2c5bc5366f318fd80ce0fcbe693a0e6
SHA1: 12ee9dd23565865e49369d67dce187d114764519
SHA256: f5c4d587a277a6749a2578fa119fada9286fd1953aea283ee225efd448a6e0ff
SSDeep: 12288:LTHiFlkI9s6dRi7X4 C9rr5TLeqvkQnoSNo8x:LTHEkBORij4 yrrlL 0oe
Size: 401768 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Softonic
Created at: 2013-11-12 11:47:15
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):No processes have been created.The Trojan injects its code into the following process(es):
%original file name%.exe:1856
File activity
The process %original file name%.exe:1856 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\CAQR4LMZ.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\universaldownloader-prefetch[1].htm (39566 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@softonic[2].txt (883 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\blank[1].gif (35 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@microsoft-security-essentials-64-bit.sd.softonic[2].txt (3140 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\sd_100401_ae4b9[1].jpg (41945 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\gpt[1].js (17480 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@softonic[1].txt (1190 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CA7YO3JP.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CAS1M95Y.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\f06de-97197[1].js (391011 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\sd_100710_46b91[1].jpg (60766 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\pubads_impl_32[1].js (26947 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\fec0e-b109c[1].css (4893 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CASD6DL2.gif (35 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@sd.softonic[1].txt (97 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CAWT2BW9.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\pubads_impl_32[2].js (74317 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\CATS7EZB.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\gradientbg[1].png (2958 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@microsoft-security-essentials-64-bit.sd.softonic[1].txt (3007 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\sd_sprite[1].png (6811 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\gpt[1].js (56547 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\campaign-100401,100710[1].htm (71056 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\microsoft-security-essentials-32[1].png (18593 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@sd.softonic[2].txt (108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\sd_100401_ae4b9[1].jpg (44883 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\fec0e-b109c[2].css (20205 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\campaign-100401,100710[1] (20949 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (323584 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014030620140307\index.dat (32768 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\loading[1].gif (1553 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\sd_icon_100401_907c2[1].jpg (1370 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\sd_100710_46b91[1].jpg (63703 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Cookies\Current_User@sd.softonic[1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@microsoft-security-essentials-64-bit.sd.softonic[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\gpt[1].js (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CAWT2BW9.gif (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@softonic[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012013041120130412\index.dat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\fec0e-b109c[1].css (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\pubads_impl_32[1].js (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@softonic[2].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CAS1M95Y.gif (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@microsoft-security-essentials-64-bit.sd.softonic[2].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\CAQR4LMZ.gif (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\CATS7EZB.gif (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CA7YO3JP.gif (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012013041120130412 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CASD6DL2.gif (0 bytes)
Registry activity
The process %original file name%.exe:1856 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Softonic\Universal Downloader]
"uuid" = "DDE7EAB3-E383-4E63-AE72-C63846EB22C8"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65324"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65324"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014030620140307]
"CacheLimit" = "8192"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "ÃÂâ€ÂøðóýþÑÂÂтøúð ÿрþñûõü ÿþôúûючõýøÑÂÂ..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{91167d45-103d-11db-8c91-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{91167d42-103d-11db-8c91-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65324"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014030620140307]
"CachePath" = "%USERPROFILE%\Local Settings\History\History.IE5\MSHist012014030620140307\"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 0C 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014030620140307]
"CachePrefix" = ":2014030620140307:"
"CacheOptions" = "11"
"CacheRepair" = "0"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 84 DF 9C 9D 99 5B 40 75 72 45 9F 59 62 23 2A"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65324"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d8c0d8da-77bd-11e0-bb02-000c293bc0fd}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{ebcf8d94-66db-11de-b228-806d6172696f}]
"BaseClass" = "Drive"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following registry key(s):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012013041120130412]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Network activity (URLs)
URL | IP |
---|---|
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/universaldownloader-prefetch | 46.28.209.70 |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/pl/js/generated/f06de-97197.js | |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/universaldownloader-track | |
hxxp://softonic-analytics.net/blank.gif?product=st_activity&event=prefetch:campaigns:selected&id_session=DDE7EAB3-E383-4E63-AE72-C63846EB22C8t1394081411f93642¶ms={"1":{"id_campaign":"100401"},"2":{"id_campaign":"100710"}}&ts=1394081411735 | 46.28.209.74 |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=1&utmn=777558618&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmhid=751557666&utmr=-&utmp=/prefetch:session:create&utmht=1394081411563&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACg~ | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=2&utmn=16110555&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmhid=751557666&utmr=http://unknown_browser_unknown_version&utmp=/prefetch:campaigns:selected&utmht=1394081411719&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/universaldownloader/campaign-100401,100710?sd_timestamp=1394081411 | |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/pl/css/generated/fec0e-b109c.css | |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/shared/img/universaldownloader/gradientbg.png | |
hxxp://screenshots.en.sftcdn.net/campaign/scrn/100000/100401/sd_100401_ae4b9.jpg | 46.28.209.52 |
hxxp://screenshots.en.sftcdn.net/campaign/scrn/100000/100401/sd_icon_100401_907c2.jpg | |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/shared/img/universaldownloader/sd_sprite.png | |
hxxp://microsoft-security-essentials-64-bit.sd.softonic.pl/shared/img/universaldownloader/loading.gif | |
hxxp://screenshots.en.sftcdn.net/campaign/scrn/100000/100710/sd_100710_46b91.jpg | |
hxxp://zdjecia.pl.sftcdn.net/pl/scrn/93000/93642/microsoft-security-essentials-32.png | 46.28.209.56 |
hxxp://pagead46.l.doubleclick.net/tag/js/gpt.js | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=3&utmn=1752948993&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmdt=Microsoft Security Essentials installation assistant&utmhid=2057003581&utmr=http://unknown_browser_unknown_version&utmp=/init_startup&utmht=1394081413298&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=4&utmn=820694362&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmdt=Microsoft Security Essentials installation assistant&utmhid=2057003581&utmr=http://unknown_browser_unknown_version&utmp=/start_api&utmht=1394081413329&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=5&utmn=913352265&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmdt=Microsoft Security Essentials installation assistant&utmhid=2057003581&utmr=http://unknown_browser_unknown_version&utmp=/legal_start&utmht=1394081413391&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=6&utmn=391522108&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmdt=Microsoft Security Essentials installation assistant&utmhid=2057003581&utmr=http://unknown_browser_unknown_version&utmp=/legal_timestamp&utmht=1394081413423&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://screenshots.en.sftcdn.net/campaign/scrn/100000/100401/sd_100401_ae4b9.jpg?v=0.4160054477168598 | |
hxxp://screenshots.en.sftcdn.net/campaign/scrn/100000/100710/sd_100710_46b91.jpg?v=0.9426370369099961 | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=7&utmn=665252804&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmdt=Microsoft Security Essentials installation assistant&utmhid=2057003581&utmr=http://unknown_browser_unknown_version&utmp=/C100401--load1&utmht=1394081413454&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://www-google-analytics.l.google.com/__utm.gif?utmwv=5.4.6&utms=8&utmn=1014515039&utmhn=microsoft-security-essentials-64-bit.sd.softonic.pl&utmcs=utf-8&utmsr=1280x768&utmvp=650x450&utmsc=32-bit&utmul=ru&utmje=1&utmfl=6.0 r79&utmdt=Microsoft Security Essentials installation assistant&utmhid=2057003581&utmr=http://unknown_browser_unknown_version&utmp=/C100710--load2&utmht=1394081413485&utmac=UA-20034990-2&utmcc=__utma=255397524.2008969847.1394081411.1394081411.1394081411.1;+__utmz=255397524.1394081411.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);&utmmt=1&utmu=qACgAAAAC~ | |
hxxp://partnerad.l.doubleclick.net/gpt/pubads_impl_32.js | |
static.sd.softonic.pl | 46.28.209.70 |
www.googletagservices.com | 74.125.226.154 |
www.google-analytics.com | 204.9.80.20 |
partner.googleadservices.com | 74.125.226.109 |
IDS verdicts
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Screenshot
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\CAQR4LMZ.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\universaldownloader-prefetch[1].htm (39566 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@softonic[2].txt (883 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\blank[1].gif (35 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@microsoft-security-essentials-64-bit.sd.softonic[2].txt (3140 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\sd_100401_ae4b9[1].jpg (41945 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\gpt[1].js (17480 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@softonic[1].txt (1190 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CA7YO3JP.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CAS1M95Y.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\f06de-97197[1].js (391011 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\sd_100710_46b91[1].jpg (60766 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\pubads_impl_32[1].js (26947 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\fec0e-b109c[1].css (4893 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CASD6DL2.gif (35 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@sd.softonic[1].txt (97 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\CAWT2BW9.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\pubads_impl_32[2].js (74317 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\CATS7EZB.gif (35 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\gradientbg[1].png (2958 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@microsoft-security-essentials-64-bit.sd.softonic[1].txt (3007 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\sd_sprite[1].png (6811 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\gpt[1].js (56547 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\campaign-100401,100710[1].htm (71056 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\microsoft-security-essentials-32[1].png (18593 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@sd.softonic[2].txt (108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\sd_100401_ae4b9[1].jpg (44883 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XWHK1GPI\fec0e-b109c[2].css (20205 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (323584 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014030620140307\index.dat (32768 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\X7VALIDZ\loading[1].gif (1553 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\R5BRBDUV\sd_icon_100401_907c2[1].jpg (1370 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OEBBOQ59\sd_100710_46b91[1].jpg (63703 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
Company Name: Softonic
Product Name: Softonic Downloader
Product Version: 1, 40, 1, 0
Legal Copyright: Copyright (C) 2013
Legal Trademarks:
Original Filename: SoftonicDownloader.exe
Internal Name: Softonic Downloader
File Version: 1, 40, 1, 0
File Description: Softonic Downloader
Comments:
Language: English (United States)
Company Name: Softonic Product Name: Softonic Downloader Product Version: 1, 40, 1, 0Legal Copyright: Copyright (C) 2013Legal Trademarks: Original Filename: SoftonicDownloader.exe Internal Name: Softonic Downloader File Version: 1, 40, 1, 0File Description: Softonic Downloader Comments: Language: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
fuW714gk | 4096 | 1081344 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
G236u756 | 1085440 | 360448 | 357376 | 5.54398 | 2c489e12caa702c2dfa7f44dc2c4edb1 |
.rsrc | 1445888 | 16384 | 15872 | 3.56349 | e390b951e5ed8da27bbe035a8e2a5d07 |
Network Activity
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker: