Full Analysis Report of skype-password-hack.exe

Summary:

  • Summary of the findings

      No. What's been found Severity
      1Downloads/requests other files from Internet.

Technical details:

  • General

    • User : \\TEST-R7CHD9Q826\Administrator
    • Application type : Windows application
    • Priority : Normal
    • Size : 234784
    • Path : C:\Samples\skype-password-hack.exe
    • Command : "C:\Samples\skype-password-hack.exe"
    • MD5: 27262b65a57676c16d7e1757d341202a
    • SHA1: dbad1e829fb87d44e6b1ae90a90e5175eefe78fe
    • Alias

      • MalSign.Generic.6A4 [AVG]
      • Adware/iBryte.A.4082 [AntiVir]
      • Packed.Win32.TDSS.2!O [CMC]
      • Application.Win32.iBryte.IHT [Comodo]
      • a variant of Win32/AdWare.iBryte.U [ESET-NOD32]
      • Unwanted-Program ( 004972941 ) [K7GW]
      • not-a-virus:Downloader.Win32.Agent.bkfx [Kaspersky]
      • PUP.Optional.OptimumInstaller.A [Malwarebytes]
      • Downloader [Norman]
      • PE:Malware.iBryte!6.14B5 [Rising]
      • iBryte Optimum Installer [Sophos]
      • suspected of Trojan.Downloader.gen.h [VBA32]
      • Optimum Installer (fs) [VIPRE]
    • Version details

      • Company : Fusion Install
      • File version : 2.4.8.1
      • Product version : 2.4.8.1
      • Desciption : Fusion Install
      • Product name : Fusion Install
      • Legal copyright : Copyright (C) 2013 Fusion Install
      • Internal name :
    • File times

      • Creation time : Tuesday, April 01, 2014 - 21:19:16
      • Modification time : Tuesday, April 01, 2014 - 21:19:20
      • Last access time : Tuesday, April 01, 2014 - 21:19:35
    • Process times

      • Start time : 21 : 19 : 35
      • Exit time : 21 : 19 : 45
      • Kernel time : 1.328125 (s)
      • User time : 0.312500 (s)
    • IO counters

      • Read operation : 7
      • Write operation : 5
      • Other operation : 1077
      • Read transfer : 460
      • Write transfer : 580
      • Other transfer : 107504
    • Memory details

      • Page fault count : 85508
      • Page file usage : 0
      • Peak page file usage : 3686400
      • Peak working set size : 6905856
      • Quota non paged pool usage : 0
      • Quota paged pool usage : 0
      • Quota peak non paged pool usage : 8304
      • Quota peak paged pool usage : 70860
      • Working set size : 28672
    • Process privileges

      • SeChangeNotifyPrivilege
      • SeSecurityPrivilege
      • SeBackupPrivilege
      • SeRestorePrivilege
      • SeSystemtimePrivilege
      • SeShutdownPrivilege
      • SeRemoteShutdownPrivilege
      • SeTakeOwnershipPrivilege
      • SeDebugPrivilege
      • SeSystemEnvironmentPrivilege
      • SeSystemProfilePrivilege
      • SeProfileSingleProcessPrivilege
      • SeIncreaseBasePriorityPrivilege
      • SeLoadDriverPrivilege
      • SeCreatePagefilePrivilege
      • SeIncreaseQuotaPrivilege
      • SeUndockPrivilege
      • SeManageVolumePrivilege
      • SeImpersonatePrivilege
      • SeCreateGlobalPrivilege
  • Events statistics

      Event Count
      OpenKey 25
      DeleteValueKey 1
      SetValueKey 27
      CreateFile 1
      Process Create 1
      Process Exit 1
      Thread Create 1
      Thread Exit 1
      Load Image 40
  • Modules

      Index Name Path Load Address Image Size Entry Point Version Size Company Description
      1 ntdll.dll %System%\ntdll.dll 0x7C930000 0xD2000 0x00000000 5.2.3790.3290 (srv03_sp1_gdr.090203-1205) 841216 Microsoft Corporation NT Layer DLL
      2 KERNEL32.dll %System%\kernel32.dll 0x7C800000 0x12C000 0x7C825FB4 5.2.3790.3311 (srv03_sp1_gdr.090321-1245) 1206784 Microsoft Corporation Windows NT BASE API Client DLL
      3 USER32.dll %System%\user32.dll 0x77E10000 0x91000 0x77E1947C 5.2.3790.2892 (srv03_sp1_gdr.070301-0030) 584192 Microsoft Corporation Windows USER API Client DLL
      4 GDI32.dll %System%\gdi32.dll 0x77BD0000 0x49000 0x77BDB23E 5.2.3790.3233 (srv03_sp1_gdr.081022-1216) 286208 Microsoft Corporation GDI Client DLL
      5 ADVAPI32.dll %System%\advapi32.dll 0x77F30000 0xAC000 0x77F4DFCD 5.2.3790.3290 (srv03_sp1_gdr.090203-1205) 686592 Microsoft Corporation Advanced Windows 32 Base API
      6 RPCRT4.dll %System%\rpcrt4.dll 0x77C20000 0x9F000 0x77C45061 5.2.3790.2971 (srv03_sp1_gdr.070709-2334) 642560 Microsoft Corporation Remote Procedure Call Runtime
      7 IMM32.DLL %System%\imm32.dll 0x76180000 0x1D000 0x761812D0 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 110592 Microsoft Corporation Windows IMM32 API Client DLL
      8 LPK.DLL %System%\lpk.dll 0x63090000 0x9000 0x63092EB2 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 22016 Microsoft Corporation Language Pack
      9 USP10.dll %System%\usp10.dll 0x74AE0000 0x61000 0x74B189AC 1.0422.3790.1830 (srv03_sp1_rtm.050324-1447) 364032 Microsoft Corporation Uniscribe Unicode script processor
      10 msvcrt.dll %System%\msvcrt.dll 0x77B70000 0x5A000 0x77B7F78B 7.0.3790.1830 (srv03_sp1_rtm.050324-1447) 348672 Microsoft Corporation Windows NT CRT DLL
      11 WININET.dll %System%\wininet.dll 0x779E0000 0xA4000 0x779E1596 6.00.3790.3304 (srv03_sp1_gdr.090303-1204) 648192 Microsoft Corporation Internet Extensions for Win32
      12 SHLWAPI.dll %System%\shlwapi.dll 0x77EB0000 0x52000 0x77ED86F9 6.00.3790.3304 (srv03_sp1_gdr.090303-1204) 320512 Microsoft Corporation Shell Light-weight Utility Library
      13 CRYPT32.dll %System%\crypt32.dll 0x760A0000 0x91000 0x760A156D 5.131.3790.1830 (srv03_sp1_rtm.050324-1447) 587264 Microsoft Corporation Crypto API32
      14 MSASN1.dll %System%\msasn1.dll 0x76080000 0x12000 0x7608436D 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 57856 Microsoft Corporation ASN.1 Runtime APIs
      15 OLEAUT32.dll %System%\oleaut32.dll 0x775F0000 0x8C000 0x775F3F9B 5.2.3790.3057 557568 Microsoft Corporation
      16 ole32.dll %System%\ole32.dll 0x774B0000 0x134000 0x774F5C37 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 1244672 Microsoft Corporation Microsoft OLE for Windows
      17 Comctl32.dll %Windir%\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.1830_x-ww_7AE38CCF\comctl32.dll 0x77CD0000 0x103000 0x77D5A81E 6.0 (srv03_sp1_rtm.050324-1447) 1051136 Microsoft Corporation User Experience Controls Library
      18 Secur32.dll %System%\secur32.dll 0x76EB0000 0x13000 0x76EB318F 5.2.3790.3290 (srv03_sp1_gdr.090203-1205) 65536 Microsoft Corporation Security Support Provider Interface
      19 shell32.dll %System%\shell32.dll 0x7CA10000 0x7E1000 0x7CA90660 6.00.3790.3158 (srv03_sp1_gdr.080617-1231) 8242176 Microsoft Corporation Windows Shell Common Dll
      20 WSOCK32.dll %System%\wsock32.dll 0x71B10000 0xB000 0x71B11060 5.2.3790.0 (srv03_rtm.030324-2048) 28672 Microsoft Corporation Windows Socket 32-Bit DLL
      21 WS2_32.dll %System%\ws2_32.dll 0x71B60000 0x17000 0x71B61276 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 83968 Microsoft Corporation Windows Socket 2.0 32-Bit DLL
      22 WS2HELP.dll %System%\ws2help.dll 0x71B50000 0x8000 0x71B5123D 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 19968 Microsoft Corporation Windows Socket 2.0 Helper for Windows NT
      23 RASAPI32.dll %System%\rasapi32.dll 0x76DF0000 0x3F000 0x76DF2779 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 244224 Microsoft Corporation Remote Access API
      24 rasman.dll %System%\rasman.dll 0x76DA0000 0x12000 0x76DA1220 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 62976 Microsoft Corporation Remote Access Connection Manager
      25 NETAPI32.dll %System%\netapi32.dll 0x71BA0000 0x58000 0x71BAA4A5 5.2.3790.3229 (srv03_sp1_gdr.081016-1620) 350208 Microsoft Corporation Net Win32 API DLL
      26 TAPI32.dll %System%\tapi32.dll 0x76DC0000 0x2F000 0x76DE55A5 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 183808 Microsoft Corporation Microsoft(R) Windows(TM) Telephony API Client DLL
      27 rtutils.dll %System%\rtutils.dll 0x76D90000 0xC000 0x76D9194D 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 35328 Microsoft Corporation Routing Utilities
      28 WINMM.dll %System%\winmm.dll 0x769E0000 0x2A000 0x769E33A6 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 164352 Microsoft Corporation MCI API DLL
      29 sensapi.dll %System%\sensapi.dll 0x72230000 0x5000 0x722310A0 5.2.3790.0 (srv03_rtm.030324-2048) 6144 Microsoft Corporation SENS Connectivity API DLL
      30 USERENV.dll %System%\userenv.dll 0x75870000 0xBF000 0x758725F9 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 769024 Microsoft Corporation Userenv
      31 urlmon.dll %System%\urlmon.dll 0x77250000 0xAD000 0x77251809 6.00.3790.3304 (srv03_sp1_gdr.090303-1204) 689664 Microsoft Corporation OLE32 Extensions for Win32
      32 VERSION.dll %System%\version.dll 0x77B60000 0x8000 0x77B61186 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 18432 Microsoft Corporation Version Checking and File Installation Libraries
      33 MSWSOCK.dll %System%\mswsock.dll 0x71A80000 0x40000 0x71A815C6 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 251904 Microsoft Corporation Microsoft Windows Sockets 2.0 Service Provider
      34 DNSAPI.dll %System%\dnsapi.dll 0x76E30000 0x2A000 0x76E35CB5 5.2.3790.3092 (srv03_sp1_gdr.080218-1401) 159744 Microsoft Corporation DNS Client API DLL
      35 winrnr.dll %System%\winrnr.dll 0x76ED0000 0x7000 0x76ED379E 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 17408 Microsoft Corporation LDAP RnR Provider DLL
      36 wldap32.dll %System%\wldap32.dll 0x76E70000 0x2E000 0x76E7112A 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 177152 Microsoft Corporation Win32 LDAP API DLL
      37 rasadhlp.dll %System%\rasadhlp.dll 0x76EE0000 0x5000 0x76EE19F0 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 7680 Microsoft Corporation Remote Access AutoDial Helper
      38 hnetcfg.dll %System%\hnetcfg.dll 0x69660000 0x56000 0x69699708 5.2.3790.1830 (srv03_sp1_rtm.050324-1447) 341504 Microsoft Corporation Home Networking Configuration Manager
      39 wshtcpip.dll %System%\wshtcpip.dll 0x71A40000 0x8000 0x71A41176 5.2.3790.0 (srv03_rtm.030324-2048) 18432 Microsoft Corporation Windows Sockets Helper DLL

       

  • File system modifications

    • The following files were created by Adware/iBryte.A.4082

      • %Windir%\Debug\UserMode\ChkAcc.log
    • %Windows% is a variable that refers to the windows root folder. By default, this is C:\windows (Windows 95/98/Me/xp/vista/win7), C:\winnt (Windows NT/2000/2003/2008).

  • Memory modifications

    • There were new processes created in the system:
        Process Name Command Line
        Process Create C:\Samples\skype-password-hack.exe
  • Registry modifications

    • The following Registry entry was deleted:

      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\autoconfigurl
    • The following Registry value was modified:

      • HKEY_LOCAL_MACHINE\software\microsoft\cryptography\rng\seed = 2B 60 36 53 26 B8 17 36 ...
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\cache = "C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\internet settings\cache\paths\directory = "C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\internet settings\cache\paths\path1\cachelimit = 0x0004FFB3
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\cookies = "C:\Documents and Settings\Administrator\Cookies"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\history = "C:\Documents and Settings\Administrator\Local Settings\History"
      • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shell folders\common appdata = "C:\Documents and Settings\All Users\Application Data"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\shell folders\appdata = "C:\Documents and Settings\Administrator\Application Data"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\migrateproxy = 0x00000001
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\proxyenable = 0x00000001
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\proxyserver = "127.0.0.1:8087"
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\proxyoverride = ""
      • HKEY_LOCAL_MACHINE\system\controlset001\hardware profiles\0001\software\microsoft\windows\currentversion\internet settings\proxyenable = 0x00000001
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\connections\savedlegacysettings = 3C 00 00 00 E2 00 00 00 ...
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\proxybypass = 0x00000001
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\intranetname = 0x00000001
      • HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\uncasintranet = 0x00000001
  • Network activity

    • There was registered attempt to establish connection with the remote host. The connection details are:
        Remote Host Port
        54.243.145.25280
    • The following Internet download was started (the retrieved bits are saved into the local file):
        URL to be downloaded
        http://install.fusioninstall.com/o/dynamic_ptn3/Skype-Password-Hack.exe?mode=dl&sf=0&&callback&browser=--&useragent=downloadreqexasync
  • How to get rid of Adware/iBryte.A.4082

    • Terminate these following process:

      • C:\Samples\skype-password-hack.exe
    • Remove these following files:

      • C:\WINDOWS\Debug\UserMode\ChkAcc.log
  • How to protect yourself in the future

This report was created with Ax3soft Scout.