Malware Analysis Part 1 : Basic Static Analysis

File Name: 64.exe
MD5 2241f43eca01bf059daada7a537d754b

       Virus engine was  identified this sample as malware as per uploaded to the VirusTotal.com.

AVG
Generic11_c.LGF
20140806
AVware
Trojan.Win32.Generic!BT
20140807
Ad-Aware
Dropped:Trojan.Generic.11321666
20140807
Agnitum
Trojan.Reconyc!
20140806
AhnLab-V3
Trojan/Win32.Generic
20140806
AntiVir
TR/Agent.1986048.3
20140807
Antiy-AVL
Trojan/Win32.Reconyc
20140806
Avast
Win32:Malware-gen
20140807
Baidu-International
Trojan.BAT.CoinMiner.bHN
20140806
BitDefender
Dropped:Trojan.Generic.11321666
20140807
Bkav
HW32.InfFil.dmys
20140806
CAT-QuickHeal
Trojan.Reconyc.g3
20140806
CMC
Packed.Win32.Zcrypt.3!O
20140806
Comodo
UnclassifiedMalware
20140806
DrWeb
Trojan.KillFiles.13982
20140807
ESET-NOD32
BAT/CoinMiner.HN
20140806
Emsisoft
Dropped:Trojan.Generic.11321666 (B)
20140807
F-Secure
Dropped:Trojan.Generic.11321666
20140807
GData
Dropped:Trojan.Generic.11321666
20140807
Ikarus
Trojan.BAT.CoinMiner
20140806
K7AntiVirus
Trojan ( 0049e6e41 )
20140806
K7GW
Trojan ( 0049e6e41 )
20140806
Kaspersky
Trojan.Win32.Reconyc.cbcn
20140806
Kingsoft
Win32.Troj.Undef.(kcloud)
20140807
Malwarebytes
Trojan.Agent
20140807
McAfee
Artemis!2241F43ECA01
20140807
McAfee-GW-Edition
Artemis!2241F43ECA01
20140806
MicroWorld-eScan
Dropped:Trojan.Generic.11321666
20140807
Microsoft
Trojan:Win32/Sulunch!gmb
20140807
NANO-Antivirus
Trojan.Win32.Reconyc.ddkcla
20140807
Norman
Suspicious_Gen2.VXPSS
20140806
Panda
Trj/CI.A
20140806
Qihoo-360
HEUR/Malware.QVM18.Gen
20140807
Sophos
Mal/Generic-S
20140807
Symantec
Trojan.Gen
20140807
Tencent
Win32.Trojan.Reconyc.Hoej
20140807
TrendMicro
TROJ_SPNR.3CGS14
20140807
TrendMicro-HouseCall
TROJ_SPNR.3CGS14
20140807
VBA32
Trojan.Siscos
20140806
VIPRE
Trojan.Win32.Generic!BT
20140807



When were these files compiled?

Next we open the files in PEview. Foe each file, we navigate to the IMAGE_NT_HEADERS > IMAGE_FILE_HEADER > Time Date Stamp field, which tell us the compile time. So based on our analysis, this files were compiled on February 7, 2009, on Saturday, 06:33:08 UTC.

Are they ay indications that either of these files is packed or obfuscated? If so, what are these indicators?



By using PEview, several indicators tell us that this file is packed. The most obvious indicators are sections named UPX0 and UPX1 – section names for UPX-packed malware. 


Even if PEiD fails to identify the file as UPX-packed, notice the relatively small number of imports and that the first section, UPX0, has a virtual size of 0x17000 but a raw data size of 0. UPX0 is the largest section, and it’s marked executable, so it’s probably where the original unpacked code belongs.


Having identified the program as packed, we can pack it by using UPX:



 The –d option says decompress the file, and the –o option specifies the output filename.


    Do any import hint at what this malware does? If so, which imports are they?



After unpacking, we look at the imports sections and the strings. The imports from kernel32.dll and msvcrt.dll are imported by nearly every program, so they tell us little about this specific program
- The imports from GDI32.dll are graphics-related and simply confirm that the program probably has a GUI.
- The imports from Shell32.dll (ShellExecuteExA) tell us that this program can launch other programs-a feature common to both malware and legitimate programs.                                
The library file Ole2.dll, is required by windows and is used when performing OLE (Object Linking and Embedding) operations. OLE allows objects created in one application to be embedded in documents/objects created by a different application e.g. embedding an Excel spreadsheet inside a Word document. OLE is used fairly extensively in windows applications, so if possible you should not remove this file. Ole32.dll is flagged as a system process and does not appear to be a security risk. However, removing Microsoft OLE Library may adversely impact your system.




When we look at the strings, we see several commands (taskkill, del, and move) that been executed once the malware was infected.  There is one line that malware was modified the registry key.

Comments

Popular posts from this blog

Port Scanning, Intrusion Detections, and Packet Analysis by Using Nmap, Snort and Wireshark

Penetration Testing on Windows XP SP2/ SP3 by Exploiting a Vulnerability in Windows Samba Service {ms08-67}.

Malware Analysis Part 2: Using RemNux