Home » Virus List
Trojan.Agent
Risk Level 1
 
File Size : 202752 KB
File Type : Portable Executable file
File Name

0000ec779f094addde2eac73fe946cc0.exe

MD5

0000ec779f094addde2eac73fe946cc0

SHA1

bef565ad8659541f2f5b80318f334879abde2eaa

SHA256

4c6669eb71c446dea985bae4b7b8e70428f667b8e51b5f1387

General information:

* File name: C:\Users\vmware\Desktop\malware\0000ec779f094addde2eac73fe946cc0.exe

Changes to registry :

* Creates value "NukeOnDelete=00000001" in key HKEY_LOCAL_MACHINE\software\microsoft\Windows\CurrentVersion\Explorer\BitBucket
* Creates value "UseGlobalSettings=00000001" in key HKEY_LOCAL_MACHINE\software\microsoft\Windows\CurrentVersion\Explorer\BitBucket
* Creates value "DontShowUI=00000001" in key HKEY_LOCAL_MACHINE\software\microsoft\Windows\Windows Error Reporting
* Creates Registry key HKEY_LOCAL_MACHINE\software\microsoft\Windows\Windows Error Reporting\LocalDumps
* Creates value "Type=00000010" in key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\spsrv
* Creates value "Start=00000002" in key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\spsrv
* Creates value "ErrorControl=00000001" in key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\spsrv
* Creates value "DisplayName=Windows Protection" in key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\spsrv
binary data=570069006E0064006F00770073002000500072006F00740065006300740069006F006E000000
* Creates value "ImagePath=C:\Windows\system32\attrftp.exe -k" in key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\spsrv
binary data=43003A005C00570069006E0064006F00770073005C00730079007300740065006D00330032005C0061007400740072006600740070002E0065007800650020002D006B000000
* Modifies value "NukeOnDelete=00000001" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{d830145d-1c80-11e6-b8aa-806e6f6e6963}
old value empty
* Creates value "FXSUfunc=C:\Users\vmware\AppData\Roaming\BdeHHost\bcdbtcfg.exe" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Run
binary data=43003A005C00550073006500720073005C0076006D0077006100720065005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C00420064006500480048006F00730074005C00620063006400620074006300660067002E006500780065000000
* Creates value "(Default)=31" in key HKEY_CURRENT_USER\software\SandboxAutoExec
* Creates value "SandboxieRpcSs.exe=Sandboxie COM Services (RPC)" in key HKEY_CURRENT_USER\software\classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\Sandboxie
binary data=530061006E00640062006F00780069006500200043004F004D002000530065007200760069006300650073002000280052005000430029000000
* Creates value "cmd.exe=Windows Command Processor" in key HKEY_CURRENT_USER\software\classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Windows\System32
binary data=570069006E0064006F0077007300200043006F006D006D0061006E0064002000500072006F0063006500730073006F0072000000

Changes to filesystem:

* Creates file C:\Windows\system32\attrftp.exe
* Creates file C:\Users\vmware\AppData\Roaming\BdeHHost\bcdbtcfg.exe
* Modifies file (empty) C:\Users\vmware\Desktop\malware\0000ec779f094addde2eac73fe946cc0.exe

Network services:

* No changes

Process/window/string information:

* Gets volume information.
* Gets computer name.
* Checks for debuggers.
* Creates process "C:\Users\vmware\AppData\Roaming\BdeHHost\bcdbtcfg.exe, null, C:\Users\vmware\AppData\Roaming".
* Injects code into process "C:\Sandbox\vmware\DefaultBox\user\current\AppData\Roaming\BdeHHost\bcdbtcfg.exe".
* Enumerates running processes.
* Creates process "C:\Users\vmware\AppData\Local\Temp\~5A81.tmp, null, C:\Users\vmware\AppData\Local\Temp\".
* Injects code into process "C:\Sandbox\vmware\DefaultBox\user\current\AppData\Local\Temp\~5A81.tmp".
* Creates an event named "6d25f688357048c1bfeecb6afc2344a9".
* Creates an event named "5bf1c81470a844aca3d3ed6f03315cf9".
* Creates process "C:\Windows\system32\cmd.exe, /C 12410690.cmd, C:\Users\vmware\Desktop\malware".
* Injects code into process "C:\Windows\System32\cmd.exe".
* Creates process "C:\Windows\system32\config\systemprofile\AppData\Local\Temp, null, C:\Windows\system32\config\systemprofile\AppData\Local\Temp\".
* Creates process "C:\Windows\system32\attrib.exe, attrib -r -s -h "0000ec779f094addde2eac73fe946cc0.exe", C:\Users\vmware\Desktop\malware".
* Injects code into process "C:\Windows\System32\attrib.exe".
* Sleeps 3 seconds.

Additional Information:

How To Remove 0000ec779f094addde2eac73fe946cc0.exe

1.Download Sniper Antivirus
2.Install the exe file on your system.
3.Full Scan your Computer OR Folder where 0000ec779f094addde2eac73fe946cc0.exe located.
4.Once the scan is finished, you’ll get the message “scan is complete”.
Click OK button to get the results.
5.Then Delete the threat from table.

Top