Monday, April 11, 2011

Apr. 8 CVE-2011-0611 Flash Player Zero day - SWF in DOC/ XLS - Disentangling Industrial Policy..

Common Vulnerabilities and Exposures (CVE)number

CVE-2011-0611


This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system.

  General File Information

File 1
File
    Disentangling Industrial Policy and Competition Policy.doc 

MD5   96cf54e6d7e228a2c6418aba93d6bd49 

SHA1   820699d9999ea3ba07e7f0d0c7f08fe10eae1d2d 

File size : 176144 bytes 

Type:   DOC with SWF

Distribution:  Email attachment

File 2
File
    Japan Nuclear Weapons Program.doc

MD5   78C628FC44FE40BFF47176613D3E1776

File size167440 bytes

Type:   DOC with SWF

Distribution:  Email attachment

File 3
File
    Message from Anne.doc

MD5   A51EDD010F3C0D33249BE771891265CB

SHA1   820699d9999ea3ba07e7f0d0c7f08fe10eae1d2d 

File size : 167440 bytes

Type:   DOC with SWF

Distribution:  Email attachment

File 4

this file has been first detected on or before April 12 (thanks to anonymous for the donation)

  File    JOB_DESCRIPTION.doc

MD5    9bdefcc465c73fc5eedf41ebf47b5f6c

SHA1   6f969aad92fe9340d00b31eab95355088767b9ed

File size : 167440 bytes

Type:   DOC with SWF

Distribution:  Email attachment

File 5

this file has been first detected on or before April 11 (thanks to anonymous for the donation)

  File   plan.doc

MD5    d1bfe000e745207c32343bfe5abd94c9

SHA1   45573ee5d89c1d7e7adb98149cca2dfee48b5d1f

File size : 186896 bytes

Type:   DOC with SWF

Distribution:  Email attachment

 

File 6

this file has been first detected on April 14

  File   namelist.xls

MD5   aaff5eabe5d803742dbb8b405e7a7c4cb659f12c

SHA1   45573ee5d89c1d7e7adb98149cca2dfee48b5d1f

File size : 162316 bytes

Type:   XLS with SWF

Distribution:  Email attachment

 

File 7

this file has been first detected on April 15

  File   Response 2011.doc

MD5   a421d074611188cfcfcedba55cc7e194

SHA1   ca044e91761e633a0580c947adc39a6ca248e5e9

File size : 167440 bytes

Type:  DOC with SWF

Distribution:  Email attachment

 

Download

The recipients of this message included people whose names you can find in Wikipedia and assistants of former high ranked politicians who are now working at global consulting companies.

Update April 29, 2011 
According to Cédric Gilbert (SkyRecon R&D), the shellcode’s last command include a “taskkill /im hwp.exe”. This hwp.exe file could be related to a South-Korean Word Processor Software :
“Hangul Word Processor or HWP”. According to Wikipedia :
It is used extensively in South Korea, especially by the government.
Which could match a targeted attack towards this region.
According to Hangul’s website, this word processor handle Microsoft .DOC & .DOCX documents.
So the questions are
  1.  Is the infected doc with zero-day also ‘compatible’ with it ?
  2.  Was it used in Korea?
  3. Was it made in Korea?

Your comments and thoughts are welcome.
thanks,
Mila


Using "volatility" to study the CVE-2011-6011 Adobe Flash 0-day by Andre' DiMino

Please see analysis of the exploit code at http://bugix-security.blogspot.com/2011/04/cve-2011-0611-adobe-flash-zero-day.html by Villy

Disentangling Industrial Policy and Competition Policy.swf - Trojan-Dropper.MSWord.SwfDrop.a by Kimberly 

Analysis of the CVE-2011-0611 Adobe Flash Player vulnerability exploitation  -- Microsoft


Original Message


From: chengconstance [mailto:cheng_constance@hotmail.com]
Sent: Friday, April 08, 2011 6:02 AM
XXXXXXXXXXXXXXXXXXXXX
Subject: Disentangling Industrial Policy and Competition Policy in China

Given the interest on the list in China's Anti-Monopoly Law, the current issue of the ABA Antitrust Section's Antitrust Source may be of interest.  It contains interviews of the heads of the sections devoted to AML enforcement within MOFCOM, NDRC and SAIC.  In addition, it contains a worthwhile article on "Disentangling Industrial Policy and Competition Policy in China" by Nate Bush and Yue Bo.

A copy of the article is attached.
Regards,


Cheng 

File 2


From: sj [mailto:adohayan@hotmail.com]
Sent: Tuesday, April 12, 2011 1:43 PM
Subject: Japan Nuclear Reactor Secret: not for energy but nuclear weapons

Japan Nuclear Weapons Program.

File 3

From: anne@xxxxxxxxxxxxxxxx 
Sent: Tuesday, April 12, 2011 11:55 AM
Subject: Message from Anne regarding xxxxxxxxxx Organizational Announcement!

Dear colleagues,

Attached you will find Per-Inge Birgerssons comments to the Organizational Announcement from xxxxxxxxxxxxx Corporation.

The information will be published on our Intranet as soon as we can (we have technical problems at the HQ at the moment).

Best Regards,
Anne

[signature redacted]

File 6


From: AnnMarie Thomas [mailto:athomas@GoUrban.net]
Sent: Thursday, April 14, 2011 4:41 PM
To: XXXXXXXXX
Subject: 2011-lmwtfx New Name list!

dkoenhemsi !
The Name list is update!
 
 
     AnnMarie Thomas
  Gloss Project.
http://www.glossproject.net/english/index.htm

 

 


File 7




 From: Edwin (Ted) M. Truman [mailto:XXXXXXXX@piie.com]    << All spooofed
Sent: Friday, April 15, 2011 9:05 AM
Subject: ICMB Geneva Conference on May 6 - Request for response slip
 Dear colleagues,
I sent you my response some time ago and you responded on March 28.
 Here is another copy.
 http://www.iie.com/index.cfm?publications/interviews/interview.cfm?ResearchID=1615
 Ted
Edwin (Ted) M. Truman
Senior Fellow
Peterson Institute for International Economics
1750 Massachusetts Ave., NW
Washington, DC 20036-1903
(202) 454-1366
XXX@piie.com
http://www.iie.com


  Message Headers

File 1

Received: (qmail 11880 invoked from network); 8 Apr 2011 10:02:20 -0000
Received: from snt0-omc4-s11.snt0.hotmail.com (HELO snt0-omc4-s11.snt0.hotmail.com) (65.55.90.214)
  byXXXXXXXXXXXXXXXXP; 8 Apr 2011 10:02:20 -0000
Received: from SNT138-W57 ([65.55.90.200]) by snt0-omc4-s11.snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675);
     Fri, 8 Apr 2011 03:02:20 -0700
Message-ID:
Return-Path: cheng_constance@hotmail.com
Content-Type: multipart/mixed;
    boundary="_4818e4e7-7ebe-4732-9506-fb91d508bc21_"
X-Originating-IP: [63.223.113.63]
From: chengconstance
To: XXXXXXXXXXXXXXXXXXXXX
Subject: Disentangling Industrial Policy and Competition Policy in China
Date: Fri, 8 Apr 2011 10:02:19 +0000
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 08 Apr 2011 10:02:20.0372 (UTC) FILETIME=[0C9DA140:01CBF5D4]


 File 2
Received: (qmail 24065 invoked from network); 12 Apr 2011 17:42:37 -0000
Received: from blu0-omc4-s2.blu0.hotmail.com (HELO blu0-omc4-s2.blu0.hotmail.com) (65.55.111.141)
  by XXXXXXXXXXXXXXXX with SMTP; 12 Apr 2011 17:42:37 -0000
Received: from BLU0-SMTP197 ([65.55.111.137]) by blu0-omc4-s2.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675);
     Tue, 12 Apr 2011 10:42:36 -0700
X-Originating-IP: [218.38.77.104]
X-Originating-Email: [sophy411@hotmail.com]
Message-ID:
Return-Path: sophy411@hotmail.com
Received: from bbc.co.uk ([218.38.77.104]) by BLU0-SMTP197.blu0.hotmail.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);
     Tue, 12 Apr 2011 10:42:18 -0700
Reply-To:
From: wuufp
To:
Subject: Japan Nuclear Reactor Secret: not for energy but nuclear weapons
Date: Wed, 13 Apr 2011 01:42:11 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
    boundary="----=_NextPart_000_086B_01D8FF1A.18DC5FD0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
X-OriginalArrivalTime: 12 Apr 2011 17:42:19.0258 (UTC) FILETIME=[F87C6DA0:01CBF938]


File 3
 Received: (qmail 12190 invoked from network); 12 Apr 2011 15:55:49 -0000
Received: from mail01.unitehere.org (HELO mail01.unitehere.org) (63.240.200.81)
  by xxxxxxxxxxxxx; 12 Apr 2011 15:55:49 -0000
Received: from [208.106.153.173] (HELO work)
  by mail01.unitehere.org (CommuniGate Pro SMTP 4.3.12)
  with SMTP id 116635845; Tue, 12 Apr 2011 11:49:04 -0400
Date: Tue, 12 Apr 2011 11:54:53 -0400
From: "anne@XXXXXXXXXXXXX
Subject: Message from Anne regarding XXXXXXXXXXXXXXXX Organizational Announcement!
Message-ID: <201104121154504675107@XXXXXXXXXXX
X-mailer: Foxmail 6, 9, 201, 16 [cn]
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="=====001_Dragon365630122061_====="

File 6
 Received: (qmail 23120 invoked from network); 14 Apr 2011 20:42:57 -0000
Received: from mail2.sumotext.com (HELO mail2.sumotext.com) (173.254.193.253)
  by XXXXXXXXXXXX SMTP; 14 Apr 2011 20:42:57 -0000
Received: from FERN-AKL-WEB3 [60.234.77.197] by mail2.sumotext.com with SMTP;
   Thu, 14 Apr 2011 13:43:05 -0700
Message-ID: 002743067008$62415584$78242711@GoUrban.net
From: AnnMarie Thomas athomas@GoUrban.net
To:  xxxxxxxxxxxxxxxxxxxxxxx
Subject: 2011-lmwtfx New Name list!
Date: Fri, 15 Apr 2011 04:40:45 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
    boundary="----=_NextPart_000_0BA1_012095A2.1AE83130"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.3100
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3100
Return-Path: athomas@gourban.net

File 7

Received: (qmail 14381 invoked from network); 15 Apr 2011 13:06:04 -0000
Received: from mail01.unitehere.org (HELO mail01.unitehere.org) (63.240.200.81)
  by XXXXXXXXXXXXXXXXXX; 15 Apr 2011 13:06:04 -0000
Received: from [208.106.153.173] (HELO work)
  by mail01.unitehere.org (CommuniGate Pro SMTP 4.3.12)
  with SMTP id 116661279; Fri, 15 Apr 2011 08:59:14 -0400
Date: Fri, 15 Apr 2011 09:05:22 -0400
From: "Edwin (Ted) M. Truman "
Subject: ICMB Geneva Conference on May 6 - Request for response slip
Message-ID: <201104150905151774258@piie.com>
X-mailer: Foxmail 6, 9, 201, 16 [cn]
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="=====001_Dragon300647653844_====="

Sender

 File 1
63.223.113.63

63.223.64.0 - 63.223.127.255
Sentris Network LLC
16904 Juanita Drive NE #189
Kenmore
WA
98028
United States
Network Admin
+1-206-686-3353
support@sentris.com
Network Admin
+1-206-686-3353
support@sentris.com
PCCW-SENTRIS
Created: 2000-06-21
Updated: 2011-03-30
Source: whois.arin.net

63.223.113.63 http://www.projecthoneypot.org/ip_63.223.113.63

The Project Honey Pot system has detected behavior from the IP address consistent with that of a mail server.

  File 2

  Hostname:    218.38.77.104
ISP:    KRNIC
Organization:    FID
Country:    Korea, Republic of kr flag
City:    Seoul

  File 3

Hostname:    208.106.153.173
ISP:    CrystalTech Web Hosting
Organization:    CrystalTech Web Hosting
Country:    United States
State/Region:    California
City:    Los Angeles

File 6

Hostname:    60.234.77.197
ISP:    Orcon Internet Ltd
Organization:    Orcon Internet Ltd
Country:    New Zealand
City:    Auckland 

File 7

Hostname:    208.106.153.173
ISP:    CrystalTech Web Hosting
Organization:    CrystalTech Web Hosting
Country:    United States
State/Region:    California
City:    Los Angeles



Automated Scans

 File  1
Disentangling Industrial Policy and Competition Policy.doc
http://www.virustotal.com/file-scan/report.html?id=1e677420d7a8160c92b2f44f1ef5eea1cf9b0b1a25353db7d3142b268893507f-1302359653
Submission date:2011-04-09 14:34:13 (UTC)
Result:1 /42 (2.4%)
Commtouch     5.2.11.5     2011.04.06     MSWord/Dropper.B!Camelot
MD5   : 96cf54e6d7e228a2c6418aba93d6bd49


 File 2
 Japan Nuclear Weapons Program.doc
 http://www.virustotal.com/file-scan/report.html?id=33bde70edc19cddc5ba56066901f30934cb54e5f2c0dbf3bbf81f3e7307b95dc-1302639292
Submission date: 2011-04-12 20:14:52 (UTC)
Result: 4/ 40 (10.0%)
Commtouch 5.2.11.5 2011.04.06 MSWord/Dropper.B!Camelot
DrWeb 5.0.2.03300 2011.04.12 Exploit.Wordbo.12
McAfee 5.400.0.1158 2011.04.12 Exploit-CVE2011-0611
Sophos 4.64.0 2011.04.12 Troj/DocDrp-A
MD5   : 78c628fc44fe40bff47176613d3e1776
SHA1  : 0ac9da07feff242f4eaaca081b11b645f4435f03

Message 3

Message_from_Anne.doc
http://www.virustotal.com/file-scan/report.html?id=0c511a37bbf51cf73aee4caae34bc02e3144e49997dd36acf25b15f5dedc4b5e-1302634079
Submission date: 2011-04-12 18:47:59 (UTC)
Result: 4 /40 (10.0%)
Commtouch 5.2.11.5 2011.04.06 MSWord/Dropper.B!Camelot
Kaspersky 7.0.0.125 2011.04.12 Trojan-Dropper.MSWord.SwfDrop.a
McAfee 5.400.0.1158 2011.04.12 Exploit-CVE2011-0611
Sophos 4.64.0 2011.04.12 Troj/DocDrp-A
MD5   : a51edd010f3c0d33249be771891265cb
 SHA1 c9de4570d5022e55102e4edfac55b46a2362ef0d

file 4  -  has been first detected on or before April 12

JOB_DESCRIPTION.doc
Submission date:2011-04-13 11:32:55 (UTC)
http://www.virustotal.com/file-scan/report.html?id=92e7ba8c1003a8ecc0b36bea9d4c49ee72c267b0de79ae0ef0c8d974da770d1c-1302694375
Result:11/ 41 (26.8%)
AhnLab-V3    2011.04.13.01    2011.04.13    Dropper/Cve-2011-0611
Avast    4.8.1351.0    2011.04.12    SWF:CVE-2011-0609-C
Avast5    5.0.677.0    2011.04.12    SWF:CVE-2011-0609-C
Commtouch    5.2.11.5    2011.04.13    MSWord/Dropper.B!Camelot
DrWeb    5.0.2.03300    2011.04.13    Exploit.Wordbo.12
eTrust-Vet    36.1.8269    2011.04.13    W97M/CVE-2011-0611!dropper
GData    22    2011.04.13    SWF:CVE-2011-0609-C
Kaspersky    7.0.0.125    2011.04.13    Exploit.SWF.CVE-2011-0611.a
McAfee    5.400.0.1158    2011.04.13    Exploit-CVE2011-0611
NOD32    6038    2011.04.13    W97M/TrojanDropper.SwfDrop.A
Sophos    4.64.0    2011.04.13    Troj/DocDrp-A
MD5   : 9bdefcc465c73fc5eedf41ebf47b5f6c
SHA1  : 6f969aad92fe9340d00b31eab95355088767b9ed

File 5  -  has been first detected on or before April 11

plan.doc
Result: 13/ 42 (31.0%)
AhnLab-V3 2011.04.13.01 2011.04.13 Dropper/Cve-2011-0611
Avast 4.8.1351.0 2011.04.13 SWF:CVE-2011-0609-C
Avast5 5.0.677.0 2011.04.13 SWF:CVE-2011-0609-C
Commtouch 5.2.11.5 2011.04.13 MSWord/Dropper.B!Camelot
Comodo 8331 2011.04.13 UnclassifiedMalware
DrWeb 5.0.2.03300 2011.04.13 Exploit.Wordbo.12
eTrust-Vet 36.1.8270 2011.04.13 W97M/CVE-2011-0611!dropper
GData 22 2011.04.13 SWF:CVE-2011-0609-C 
Kaspersky 7.0.0.125 2011.04.13 Exploit.SWF.CVE-2011-0611.a
McAfee 5.400.0.1158 2011.04.13 Exploit-CVE2011-0611
McAfee-GW-Edition 2010.1C 2011.04.13 Exploit-CVE2011-0611
Sophos 4.64.0 2011.04.13 Troj/DocDrp-A
ViRobot 2011.4.13.4408 2011.04.13 Exploit.S.CVE-2011-0611.186896
MD5   : d1bfe000e745207c32343bfe5abd94c9
SHA1  : 45573ee5d89c1d7e7adb98149cca2dfee48b5d1f
File size : 186896 bytes


File 6  -  has been first detected on April 14


namelist.xls
Submission date: 2011-04-14 20:39:17 (UTC)
http://www.virustotal.com/file-scan/report.html?id=9071f0b9b1e428cf4703b1e8988abaff70a6fbd6c3e0df7aaf4d1b6741a5341c-1302813557
Result: 1 /42 (2.4%)

Commtouch 5.2.11.5 2011.04.14 MSExcel/Dropper.B!Camelot

MD5   : ec2420e3b03316f13dc922cf7dd48cef
SHA1  : aaff5eabe5d803742dbb8b405e7a7c4cb659f12c
SHA256: 9071f0b9b1e428cf4703b1e8988abaff70a6fbd6c3e0df7aaf4d1b6741a5341c
ssdeep: 3072:+X7oSjoaqC0FPY3S7DnjVESJkstQVax1D9CuuKDYs9NJQV:+kBPJY3UnjVEa91RCuh9I
File size : 162316 bytes
First seen: 2011-04-14 20:39:17
Last seen : 2011-04-14 20:39:17
Magic: Microsoft Office Document


PEiD: -
ExifTool:
file metadata
AppVersion: 11.9999
Author:
CodePage: Windows Simplified Chinese (PRC, Singapore)
CompObjUserType: Microsoft Office Excel
CompObjUserTypeLen: 30
Company:
CreateDate: 1996:12:17 01:32:42
FileSize: 159 kB
FileType: XLS

File 7 

http://www.virustotal.com/file-scan/report.html?id=329e9b8c5e35ac1a08d759021fcfeaeed0a39d0d802c95b64709f831fa4b0541-1302881461
Response 2011.doc
Submission date:2011-04-15 15:31:01 (UTC)
Result:14 /42 (33.3%)
AhnLab-V3     2011.04.15.00     2011.04.15     Dropper/Cve-2011-0611
Antiy-AVL     2.0.3.7     2011.04.15     Exploit/SWF.CVE-2011-0611
Avast     4.8.1351.0     2011.04.15     SWF:CVE-2011-0609-C
Avast5     5.0.677.0     2011.04.15     SWF:CVE-2011-0609-C
Commtouch     5.2.11.5     2011.04.15     MSWord/Dropper.B!Camelot
DrWeb     5.0.2.03300     2011.04.15     Exploit.Wordbo.12
eTrust-Vet     36.1.8273     2011.04.15     W97M/CVE-2011-0611!dropper
GData     22     2011.04.15     SWF:CVE-2011-0609-C
Kaspersky     7.0.0.125     2011.04.15     Exploit.SWF.CVE-2011-0611.a
McAfee     5.400.0.1158     2011.04.15     Exploit-CVE2011-0611
McAfee-GW-Edition     2010.1D     2011.04.15     Exploit-CVE2011-0611
Microsoft     1.6702     2011.04.15     Exploit:SWF/CVE-2011-0611.A
Sophos     4.64.0     2011.04.15     Troj/DocDrp-A
Symantec     20101.3.2.89     2011.04.15     Trojan.Dropper
MD5   : a421d074611188cfcfcedba55cc7e194
CodePage: Windows Simplified Chinese (PRC, Singapore)
CompObjUserType: Microsoft Office Word Document
CompObjUserTypeLen: 31
Company: hust

Details


File 1

According to my tests, On Windows 7 it most of the time crashes and opens the decoy clean file immediately. On Windows XP it needs interaction (click on the header and the click or right click on the flash object)

The clean decoy file is 72 kb ( compare to 172kb original). Screenshot from Windows 7, Office 2007




 On Office 2010, the exploit fails to execute (at least in my testing)




WINDOWS 7 


Windows 7, Office 2007   ASLR bypass
On my Windows 7 with Office 2007 it runs flawlessly each time. On windows XP it needs interaction. Your results might be different.


On Windows 7 it creates a random name backdoor service with a random name Dll.

 Variant 1

 Variant 2


=======================================================


WINDOWS XP 
Windows XP Office 2007  ( I could not trigger it on Office 2003)

On Windows XP SP 3 it replaces a legitimate DLL for the Portable Media Serial Number Service mspmsnsv.dll  with a malicious dll with the same name


embedded flash but you can also see it on the document open -
  
 From Cédric Gilbert, SkyRecon R&D
First off all the .exe payload is encoded with a single byte long key : 0x85 but not as usual :
001b:1111ff16 xor      ecx,ecx
001b:1111ff18 mov    ecx,400h
001b:1111ff1d cmp    byte ptr [esi+ecx-1],0
001b:1111ff22 je        1111ff30                                // if null byte : loop
001b:1111ff24 cmp    byte ptr [esi+ecx-1],85h
001b:1111ff29 je       1111ff30                                 // if byte == 0x85 : loop
001b:1111ff2b xor     byte ptr [esi+ecx-1],85h         // else, decypher with xor 0x85
001b:1111ff30 loop   1111ff1d
The null bytes aren’t encoded which makes it a little bit harder to locate an encoded payload from memory.
Next the shellcode use a technique to bypass hooked APIs :
001b:1111fcde mov     eax,dword ptr [esi]   // eax = @LoadLibraryA
001b:1111fce0 call     111201ed                  // bypass hook and jmp eax
01b:111201ed cmp      byte ptr [eax],0E8h                          // if first instruction == ‘call’
001b:111201f0 je       111201fc                                           // hook detected
001b:111201f2 cmp     byte ptr [eax],0E9h                          // if first instruction == ‘jmp’
001b:111201f5 je       111201fc                                           // hook detected
001b:111201f7 cmp     byte ptr [eax],0Ebh                          // if first instruction != ‘jmp’
001b:111201fa jne      1112020d                                          //  goto OK
001b:111201fc cmp     dword ptr [eax+5],90909090h         // if ‘nop’ padding after the hook, the hook cannot be bypassed
001b:11120203 je      1112020d                                           // goto OK
001b:11120205 mov   edi,edi                                               // API 1st instruction
001b:11120207 push   ebp                                                    // API 2nd instruction
001b:11120208 mov   ebp,esp                                              // API 3rd instruction
001b:1112020a lea      eax,[eax+5]                                       // jmp after the hook
001b:1112020d jmp     eax                                                    // jmp LoadLibraryA
If a hook is detected, the 3 first instructions from the API are executed locally in the shellcode,
then it jumps in the wanted API just after the hook.


Created Files


File 1

Windows 7 event log
  1. "file","Write","C:\Program Files\Microsoft Office\Office12\WINWORD.EXE","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe"  ---- F27990C8369205D5167F7D64B7749FF8
  2. "process","created","C:\Windows\System32\cmd.exe","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe"
  3. file","Write","C:\Program Files\Microsoft Office\Office12\WINWORD.EXE","C:\Users\Thomas\AppData\Local\Temp\AAAA"   -- --- 904CEF8026E1D76B32F22FA14AFF1FD7 Clea decoy doc
  4. "file","Write","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe","C:\Windows\System32\18a0299.dll"  -- 803B0CFE58F766E3E717992CA8A8F9E9 backdoor dll
  5. "file","Write","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe","C:\Windows\System32\msimage.dat" --- 41bb0ff7b57a354e4c9f65dfd47ea3ae
  6. "process","terminated","C:\Windows\System32\cmd.exe","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe"
  7. "registry","SetValueKey","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe","HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\18a0299"
  8. "registry","SetValueKey","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe","HKLM\SYSTEM\ControlSet001\services\18a0299\Parameters\ServiceDll"
  9. "registry","SetValueKey","C:\Users\Thomas\AppData\Local\Temp\scvhost.exe","HKLM\SYSTEM\ControlSet001\services\18a0299\Parameters\StubPath" 
  10. "file","Write","C:\Windows\System32\svchost.exe","C:\Windows\System32\task.dat" -- list of running processes  DC8AE278B23B86959F12C9A7AEF72100
  11. "file","Write","C:\Windows\System32\svchost.exe","C:\Windows\System32\fi.txt" -- C7D13FC070FB0916E9EE553E5A823AF4 list of recently used documents and files on the desktop
==============================================================

Windows XP event log

Files added:
C:\Program Files\Common Files\bak.dll
C:\WINDOWS\system32\fi.txt
C:\WINDOWS\system32\msimage.dat
C:\WINDOWS\system32\task.dat
  1. Write","C:\Program Files\Microsoft Office\Office12\WINWORD.EXE","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe"   ---- F27990C8369205D5167F7D64B7749FF8
  2. Write","C:\Program Files\Microsoft Office\Office12\WINWORD.EXE","C:\Documents and Settings\Mila\Local Settings\Temp\AAAA" -- --- 904CEF8026E1D76B32F22FA14AFF1FD7 Clea decoy doc
  3. "process","created","C:\WINDOWS\system32\cmd.exe","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe" --- F27990C8369205D5167F7D64B7749FF8
  4. file","Write","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe","C:\Program Files\Common Files\bak.dll"  C51B4A5C05A5475708E3C81C7765B71D  - renamed original Windows dll
  5. file","Write","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe","C:\WINDOWS\system32\mspmsnsv.dll"  -- 803B0CFE58F766E3E717992CA8A8F9E9
    file","Write","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe","C:\WINDOWS\system32\msimage.dat" --- 41bb0ff7b57a354e4c9f65dfd47ea3ae
  6. "file","Write","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe","C:\WINDOWS\system32\dllcache\mspmsnsv.dll"  -- 803B0CFE58F766E3E717992CA8A8F9E9
  7. registry","SetValueKey","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe","HKLM\SYSTEM\ControlSet001\Control\Session Manager\PendingFileRenameOperations" 
  8. file","Delete","C:\Documents and Settings\Mila\Local Settings\Temp\scvhost.exe","C:\Documents and Settings\Mila\Local Settings\Temp\D9.tmp"  --- F27990C8369205D5167F7D64B7749FF8
  9. "file","Write","C:\WINDOWS\system32\cmd.exe","C:\Documents and Settings\Mila\Desktop\Disentangling Industrial Policy and Competition Policy.doc"  -- 904CEF8026E1D76B32F22FA14AFF1FD7 Clea
  10. ,"file","Write","C:\WINDOWS\system32\svchost.exe","C:\WINDOWS\system32\task.dat"  list of running processes 
  11. ,"file","Write","C:\WINDOWS\system32\svchost.exe","C:\WINDOWS\system32\fi.txt"  list of recently used documents and files on the desktop

1) scvhost.exe
File name: D9.tmp   -- as captured but also scvhost.exe (thanks for @Binjo for sending his copy - same MD5)
Submission date:2011-04-12 03:57:09 (UTC)
http://www.virustotal.com/file-scan/report.html?id=5c708d698afb9b182625fa47dc895447e32262a01650bc185308cd84c3ef88da-1302580629
Result:7/ 41 (17.1%)
Comodo    8309    2011.04.12    TrojWare.Win32.Trojan.Agent.Gen
Kaspersky    7.0.0.125    2011.04.12    Trojan-Dropper.Win32.Small.hgt
Panda    10.0.3.5    2011.04.11    Suspicious file
Sophos    4.64.0    2011.04.11    Mal/Generic-L
SUPERAntiSpyware    4.40.0.1006    2011.04.10    Trojan.Agent/Gen-NumTemp
Symantec    20101.3.2.89    2011.04.12    Suspicious.Cloud.5
VIPRE    8993    2011.04.12    Trojan.Crypt.FKM.Gen (v)
MD5   : f27990c8369205d5167f7d64b7749ff8


Strings partial
(null)
runtime error
TLOSS error
SING error
DOMAIN error
R6028
- unable to initialize heap
R6027
- not enough space for lowio initialization
R6026
- not enough space for stdio initialization
R6025
- pure virtual function call
R6024
- not enough space for _onexit/atexit table
R6019
- unable to open console device
R6018
- unexpected heap error
R6017
- unexpected multithread lock error
R6016
- not enough space for thread data
abnormal program termination
R6009
- not enough space for environment
R6008
- not enough space for arguments
R6002
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:

GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
H:mm:ss
dddd, MMMM dd, yyyy
M/d/yy
December
November
October
September
August
July
June
April
March
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
FreeLibrary
GetProcAddress
LoadLibraryA
VirtualProtect
VirtualQuery
GetCurrentProcessId
GetVersionExA
CopyFileA
CloseHandle
CreateFileA
SetFileTime
Sleep
GetModuleHandleA
GetTempFileNameA
GetTempPathA
MultiByteToWideChar
WriteFile
MoveFileExA
FindClose
FindFirstFileA
LocalFree
LocalAlloc
GetModuleFileNameA
lstrcatA
lstrlenA
GetTickCount
DeleteFileA
KERNEL32.dll
wsprintfA
USER32.dll
WS2_32.dll
HeapFree
HeapAlloc
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetCPInfo
LCMapStringA
LCMapStringW
SetFilePointer
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
RtlImageDirectoryEntryToData
RtlImageNtHeader
ZwAllocateVirtualMemory
ZwQuerySystemInformation
ZwQueryInformationProcess
ZwQueryIntervalProfile
ntdll.dll
ntkrnlpa.exe
ntoskrnl.exe
NtQueryIntervalProfile
NtDeviceIoControlFile
PsLookupProcessByProcessId
HalDispatchTable
mstd32.dll
f_Wow64DisableWow64FsRedirection is not  null
f_Wow64DisableWow64FsRedirection is null
kernel32
Wow64DisableWow64FsRedirection
before f_Wow64DisableWow64FsRedirection!


&1
%s\SFC_OS.dll
kernel32.dll
GetSystemDirectoryA
CreateFile  Fail!
len_core len = %d
c:\Program Files\Common Files\bak.dll
dllcache\
msimage.dat
mspmsnsv.dll
WmdmPmSN
ChangeServiceConfigA
QueryServiceConfigA
StartServiceA
ControlService
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
Advapi32.dll
StubPath
ServiceDll
\Parameters
SYSTEM\CurrentControlSet\Services\%s
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost
%%SystemRoot%%\System32\svchost.exe -k "%s"
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
ChangeServiceConfig2A
CreateServiceA
Install service  success!
Install service  fail!
extract file error!
lpServiceDll = %s,corefile = %s
corefile =
lpServiceDll =
%s\%s
%s\%s.dll
switch token success!!
InstallMe4VistaEx!!
c:\recycler
c:\recycled
c:\$Recycle.Bin
c:\Recovery

Unicode Strings:
---------------------------------------------------------------------------
(null)
         (((((                  H

========================================================
 
2)  msimage.dat
Size: 78065
MD5:  41BB0FF7B57A354E4C9F65DFD47EA3AE
msimage.dat
Result:1 /42 (2.4%)
http://www.virustotal.com/file-scan/report.html?id=0636ccf0fd3b2671da8f9d1741a910db9c80a002500bee547d4cab5de08b768c-1302473423
AhnLab-V3     2011.04.10.01     2011.04.10     Win-Trojan/Agent.78065
MD5   : 41bb0ff7b57a354e4c9f65dfd47ea3ae
SHA1  : 5cc31b8cc90c9cda4781517678e27a15cf55d27d
SHA256: 0636ccf0fd3b2671da8f9d1741a910db9c80a002500bee547d4cab5de08b768c
ssdeep: 1536:1g87QNZnPC9PoHouEcwnwNDJfgaHFwcpS:x7QNtPCNpNwNDJIaHF1pS
File size : 78065 bytes
First seen: 2011-04-10 22:10:23
Last seen : 2011-04-10 22:10:23
Magic: PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
PEiD: Armadillo v1.xx - v2.xx

Strings Partial
_iob
fflush
MSVCRT.dll
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
MFC42.DLL
GetUserNameA
LookupAccountNameA
IsValidSecurityDescriptor
SetSecurityDescriptorDacl
MakeAbsoluteSD
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetSecurityDescriptorDacl
SetTokenInformation
AllocateLocallyUniqueId
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
ImpersonateLoggedOnUser
DuplicateTokenEx
CreateProcessAsUserA
ADVAPI32.dll
NetApiBufferFree
NetUserGetLocalGroups
NETAPI32.dll
WTSFreeMemory
WTSQuerySessionInformationA
WTSAPI32.dll
LocalAlloc
_stricmp
DLL4Proxy.dll
Start
Test
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
Login!
SGnteXCA
QWT /WERrchAn=
\task.dat
kernel32.dll
GetSystemDirectoryA
\msimage.dat
QWT /WERrchAn=%d SGnteXCA %04d%s
http://%s:%d/upfile.asp
SetProxy
NULL == pHttpDown
pHttpDown->Connect()
SharkConnect...%s:%d
ConnectToServer throw Exception!
\svchost.dat
function Test()
Unkonw OS
Windows 2003
Windows XP
Windows 2000
Windows Vista
%08x
HttpDownload/2.0
http://
,ret = %d!
QWT
-----------------------------24464570528145--
HTTP/1.0 200
HTTP/1.1 200 OK
upload.txt
-----------------------------24464570528145--
Submit
Content-Disposition: form-data; name="Submit"
Content-Type: text/plain
Content-Disposition: form-data; name="file"; filename="
-----------------------------24464570528145
Proxy-Authorization: Basic
Pragma: no-cache
Content-Length:
Connection: keep-alive
Host:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.2; zh-CN; rv:1.9.2) Gecko/20100115 Firefox/3.6
Proxy-Connection: Keep-Alive
boundary=---------------------------24464570528145
Content-Type: multipart/form-data;
Accept-Language: zh-cn
/upfile.htm
Referer: http://
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
 HTTP/1.1
?id=
POST
CreateToolhelp32Snapshot
GetUserNameA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
advapi32.dll
WSACloseEvent
WSACreateEvent
connect
send
ntohs
gethostname
bind
recv
setsockopt
recvfrom
sendto
htonl
htons
gethostbyname
inet_ntoa
closesocket
inet_addr
socket
WSAIoctl
WSAStartup
getprotobyname
WSACleanup
shutdown
WSAGetLastError
WSASocketA
WSASendTo
WSARecvFrom
ioctlsocket
WSAAccept
listen
WSAConnect
WSASend
WSAEnumNetworkEvents
WSARecv
WSAEventSelect
WSAWaitForMultipleEvents
ws2_32.dll
in NetEngineClient::SendBuf, m_NetSocket == NULL
C:\WINDOWS\
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\
C:\PROGRAM FILES\
TEMPORARY INTERNET FILESTEMP
crypt32.dll
CryptUnprotectData
CreateProcessAsUserA
RegOpenKeyExA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
SHLWAPI.dll
SHDeleteValue
msimage.dat.tmp
%USERPROFILE%\AppData\Local\msimage.dat
\msimage.dat.tmp
in function HandlerRecvData,ReadFile error!
\si.txt
\fi.txt
%s > %s
.bat
switchContext as user fail
rundll32 %s,%s
DESKTOP.INI
Build
SOFTWARE\Microsoft\Internet Explorer
172.
192.168.
www.microsoft.com
ip:%x,
port:%d
%d;
find password
dwState = 52
Proxy-Connection:
GET
free(pSendBuf);2222
free(pSendBuf);1111
SOP_SendPacket
SeCreateGlobalPrivilege
SeImpersonatePrivilege
SeManageVolumePrivilege
SeUndockPrivilege
SeSystemtimePrivilege
SeProfileSingleProcessPrivilege
SeLoadDriverPrivilege
SeShutdownPrivilege
SeRestorePrivilege
SeBackupPrivilege
SeChangeNotifyPrivilege
SeSystemEnvironmentPrivilege
SeSecurityPrivilege
SeAuditPrivilege
SeDebugPrivilege
SeCreatePermanentPrivilege
SeIncreaseBasePriorityPrivilege
SeIncreaseQuotaPrivilege
SeAssignPrimaryTokenPrivilege
SeLockMemoryPrivilege
SeCreatePagefilePrivilege
SeTakeOwnershipPrivilege
SeCreateTokenPrivilege
SeTcbPrivilege
SetTokenInformation TokenSessionId Failed:%d
NtCreateToken Failed
AddUserPrivToHandle(hw
insta,user,DESKTOP_ALL) return ERROR!
AddUserPrivToHandle(hwinsta,user,WINSTA_ALL) return ERROR!
*SYSTEM*
seclogon
SYSTEM
administrators
INTERACTIVE
Everyone
Administrators
Users
system
ZwCreateToken
ntdll
AdjustTokenPrivileges Failed: 0x%X
OpenProcessToken SELF Failed: 0x%X
LookupPrivilegeValue failed: 0x%X
[-] Process exited.
CreateProcessAsuser failed:%d.
[+] CreateProcess By that Token...
[+] Calling NtCreateTokenAsuser ...
[+] GrantPrivilege From Lsass ....
Get Pid of services failed
lsass.exe
[+] Get Lsass.exe Pid....
[+] Enable SeDebugPrivilege..
szCurrentUsername = %s
[-] GetProcAddress UnloadUserProfile error:%d
UnloadUserProfile
[-] GetProcAddress LoadUserProfile error:%d
LoadUserProfileA
[-] GetModuleHandle  Userenv error:%d
Userenv.dll
.?AVCNoTrackObject@@
.?AVAFX_MODULE_STATE@@
.?AV_AFX_DLL_MODULE_STATE@@
.?AVtype_info@@
#0B0]0l0
3 3&3E3K3T3
4 4)4/4@4F4b4m4w4
6*606
767P7
8D8Q8W8]8f8l8
9$989C9L9W9\9l9}9
9%:1:6:m:
:&;>;N;a;
<3<;<[<
=:=@=g=m=
>$>;>@>h>|>
?%?+?7?A?G?X?_?e?
0;0k0
0"1+161F1X1`1m1v1
2.2;2T2i2
2a3l3
3F4R4]4c4}4
5,5@5O5X5g5
6/6?6O6V6
<$<
0K1_1
1$2T2k2
5+565m5
5*6A6
7@7K7q7
9"929
9c:k:w:
;&;,;3;9;@;F;M;S;Z;`;g;m;t;z;
<#<*<0<7<=<^<~<
=!=&=3=;=A=H=T=_>f>
2+2:2?2E2L2g2
3/3C3Q3k3
444=4z4
6%6/656?6E6O6T6Y6f6
797A7G7R7_7k7w7}7
9Y9m9t9
:8<}<
= =7=@=T=]=&>E>K>P>_>
? ?'?;?]?d?
0%0L0e0
2)2/252;2E2K2S2z2
2a3h3
5N5j5
6&606<6C6J6Z6m6x6
8E8d8
9 9<9a9u9-:8:K:R:~:
;h;u;
;<<
=T=_=r=
>6>L>T>c>o>}>
?&?g?n?~?
M0R0g0
1!1-13191W1]1g1
2"2(252:2D2O2Z2g2m2y2
707;7B7
7Q8a8
9 9>9D9
92:?:d;
5 555J5_5w5
6(6F6d6
6#7M7_7
7C8K8
9I:_:
;,;7;N;
<$<
=2=8=N=T=]=j=s=~=
>.>f>
>3?=?C?Q?X?b?h?
0%020[0h0{0
151P1V1d1j1u1z1
2!2,242C2J2Z2e2|2
2(32383R3[3g3m3
4E4R4
5!5h5x5
6F6e6p6
7N7Z7x7
7L8Y8t8
9.9D9K9b9
9#:B:v:
>6><>B>H>
?(?0?>?C?H?M?X?e?o?
&0^0d0j0r0x0~0
1 1&1,12181>1D1J1P1V1\1i1
4'414E4Y4w4
3(3,303D3T3X3`3x3
4$4,444<4D4L4T4`4|4
5,545@5\5d5l5t5|5
6$6,646<6D6L6T6\6d6l6t6|6
707D7P7l7x7
,606P6p6
lnm|}ZOT
[?#05
jixyfCH
_;'49-H
")07>ELSZahov}
%,3:AHOV]jkry
+|cn]
]WO8e*5
df{eatY]^2&#u
y`uvuD J5X

Unicode Strings:
=======================================================================

3) :mspmsnsv.dll or random dll for windows 7
http://www.virustotal.com/file-scan/report.html?id=a03d38a3adddae3333e4a22415144e35df33f49fb07c97b07ec9dce5722b3db9-1302585491
Submission date:2011-04-12 05:18:11 (UTC)
Current status:Result:17/ 42 (40.5%)
AhnLab-V3    2011.04.12.01    2011.04.12    Trojan/Win32.Npkon
AntiVir    7.11.6.58    2011.04.12    TR/PSW.Agent.wya
Avast    4.8.1351.0    2011.04.11    Win32:Malware-gen
Avast5    5.0.677.0    2011.04.11    Win32:Malware-gen
Fortinet    4.2.254.0    2011.04.12    W32/Agent.VR!tr
GData    22    2011.04.12    Win32:Malware-gen
Kaspersky    7.0.0.125    2011.04.12    Trojan-PSW.Win32.Agent.wya
McAfee    5.400.0.1158    2011.04.12    Generic PWS.o
McAfee-GW-Edition    2010.1C    2011.04.11    Generic PWS.o
Panda    10.0.3.5    2011.04.11    Trj/CI.A
PCTools    7.0.3.5    2011.04.11    Trojan.Gen
Sophos    4.64.0    2011.04.12    Mal/Agent-VR
Symantec    20101.3.2.89    2011.04.12    Trojan.Gen
TheHacker    6.7.0.1.171    2011.04.12    Trojan/PSW.Agent.wws
VIPRE    8994    2011.04.12    Trojan.Win32.Generic!BT
ViRobot    2011.4.12.4405    2011.04.12    Trojan.Win32.PSWAgent.8704.A
VirusBuster    13.6.299.0    2011.04.11    Trojan.PWS.Agent!ImeYHjnxjLA

MD5   : 803b0cfe58f766e3e717992ca8a8f9e9
SHA1  : e6a3c14eb59a681115878432f5519138b69b5847
Strings partial
CloseHandle
GetProcAddress
WriteFile
GetSystemTime
GetFileTime
ReadFile
SetFilePointer
CreateFileA
Sleep
MoveFileExA
MoveFileA
GetTempPathA
CopyFileA
DeleteFileA
FreeLibrary
ExpandEnvironmentStringsA
GetFileSize
KERNEL32.dll
WS2_32.dll
memcpy
free
malloc
strcat
strcpy
strrchr
strstr
MSVCRT.dll
_initterm
_adjust_fdiv
_stat
_strlwr
Servicedll.dll
Print32
ServiceMain
Start
Startup
_SvcCtrlFnct@4
SvchostPushServiceGlobals
WmdmPmSN
liciayee.dyndns-free.com
liciayee.dyndns-free.com
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
advapi32.dll
kernel32.dll
SystemTimeToFileTime
Software\Microsoft\Windows\CurrentVersion\Run
ctfmon
~TMP55.dat
%USERPROFILE%\AppData\Local\ctfmon.dll
msimage.dat.tmp
Start
SHLWAPI.dll
SHDeleteValueA
%USERPROFILE%\AppData\Local\msimage.dat
c:\Program Files\Common Files\bak.dll
\mspmsnsv.dll
\dllcache\mspmsnsv.dll
file not exist!
GetProcAddress start  fail!
\msimage.dat.tmp
GetProcAddress start end!
GetProcAddress start  success!
LoadLibrary  success!
servicedll ,LoadLibrary  failed!!
after ExecuteSleep
TrojanFuncThread
\msimage.dat
GetSystemDirectoryA
Advapi32.dll
SetServiceStatus
RegisterServiceCtrlHandlerA
spoolsv.exe
GetModuleFileNameA
CreateThread
kernel32
*0:0N0]0b0m0s0}0
141=1a1{1
2:2@2T2j2
253Y3a3
404:4
53595S5d5j5q5x5
6"777<7A7L7
8 8,8J8T8_8g8p8w8
809k9
:%:O:c:h:y:
;#;<;A;L;R;_;d;i;y;
=!=F=M=X=
?'?4?20N0

Unicode Strings:
---------------------------------------------------------------------------
----------------------------------------------------------------
 Registry changes to start the service automatically
HKLM\SYSTEM\ControlSet001\Services\WmdmPmSN\Start: 0x00000003
HKLM\SYSTEM\ControlSet001\Services\WmdmPmSN\Start: 0x00000002

task.dat

t[System Process]    0
System    4
smss.exe    256
csrss.exe    332
wininit.exe    380
csrss.exe    392
winlogon.exe    432
services.exe    480
lsass.exe    488
lsm.exe    496
svchost.exe    596
svchost.exe    660
svchost.exe    760
svchost.exe    796
svchost.exe    820
svchost.exe    936
svchost.exe    1016
spoolsv.exe    1172
svchost.exe    1208
taskhost.exe    1780
dwm.exe    1852
explorer.exe    1860
GrooveMonitor.exe    1008
SearchIndexer.exe    1228
wmpnetwk.exe    1844
svchost.exe    236
sppsvc.exe    1584
svchost.exe    1688
cmd.exe    2496
conhost.exe    3440
captureBAT.exe    396
svchost.exe    1544
cmd.exe    376
conhost.exe    2312
SearchProtocolHost.exe    1988
WINWORD.EXE    2800
WINWORD.EXE    2864
WINWORD.EXE    264
SearchFilterHost.exe    2932
svchost.exe    3132
WmiPrvSE.exe    3888
----------------------------------------------------------------
fi. txt
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Remote Desktop Connection.lnk
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Remote Desktop Connection.lnk
C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop (create shortcut).DeskLink
C:\Users\Thomas\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GKT97XRM\regshot_1.8.2_src_bin[1].zip
C:\Users\Thomas\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UFJG0NE9\regshot_1.8.2_src_bin[1].zip
C:\Users\Thomas\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
C:\Users\Thomas\AppData\Roaming\Microsoft\Office\Recent\Disentangling Industrial Policy and Competition Policy.doc.LNK
C:\Users\Thomas\AppData\Roaming\Microsoft\Office\Recent\index.dat
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\1.hiv.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\22.hiv.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\Appearance and Personalization.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\Disentangling Industrial Policy and Competition Policy.doc.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\Documents.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\Network and Internet.lnk
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\7e4dca80246863e3.automaticDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\adecfb853d77462a.automaticDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1b4dd67f29cb1962.customDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5afe4de1b92fc382.customDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7e4dca80246863e3.customDestinations-ms
C:\Users\Thomas\AppData\Roaming\Microsoft\Windows\SendTo\Desktop (create shortcut).DeskLink
C:\Users\Thomas\Desktop\001ie623.doc
C:\Users\Thomas\Desktop\2.doc
C:\Users\Thomas\Desktop\2010 .pdf
C:\Users\Thomas\Desktop\2010-03-24_2010.xls
C:\Users\Thomas\Desktop\20482.doc
C:\Users\Thomas\Desktop\22.hiv
C:\Users\Thomas\Desktop\5 million corruption issue about Li Rongqi,the Vice Mayor of  Xuzhou.pdf
C:\Users\Thomas\Desktop\990331.ppt
C:\Users\Thomas\Desktop\ADL-State-Hate-Crime-Statutory-Provisions.pdf
C:\Users\Thomas\Desktop\ADLxxx-14_Data_Sheet.pdf
C:\Users\Thomas\Desktop\ADM ACA AMBAS TLK PTS.pdf
C:\Users\Thomas\Desktop\ADM-02-03.pdf
C:\Users\Thomas\Desktop\adm-035.pdf
C:\Users\Thomas\Desktop\ADM-2.pdf
C:\Users\Thomas\Desktop\adm012.pdf
C:\Users\Thomas\Desktop\adm035.pdf
C:\Users\Thomas\Desktop\adm_adjustment.pdf
C:\Users\Thomas\Desktop\ATT13562.doc
C:\Users\Thomas\Desktop\ATT16217.doc
C:\Users\Thomas\Desktop\ATT19907.doc
C:\Users\Thomas\Desktop\ATT27863.pps
C:\Users\Thomas\Desktop\ATT55658.doc
C:\Users\Thomas\Desktop\ATT90838.doc
C:\Users\Thomas\Desktop\attachment.doc
C:\Users\Thomas\Desktop\Capital Budget 2012 Draft.doc
C:\Users\Thomas\Desktop\capture.bat
C:\Users\Thomas\Desktop\ChristmasMessages.pps
C:\Users\Thomas\Desktop\CMSIconf.doc
C:\Users\Thomas\Desktop\Congress Decision -- Not for distribution.xls
C:\Users\Thomas\Desktop\Cooperative Threat Reduction briefing.PPT
C:\Users\Thomas\Desktop\CTR_talk.PPT
C:\Users\Thomas\Desktop\Disentangling Industrial Policy and Competition Policy.doc
C:\Users\Thomas\Desktop\Do you remember.doc
C:\Users\Thomas\Desktop\FamilyHealthGuide.xls
C:\Users\Thomas\Desktop\MainlandAffairs.doc
C:\Users\Thomas\Desktop\message-cv.doc
C:\Users\Thomas\Desktop\Nuclear.pps
C:\Users\Thomas\Desktop\Open North Korea.pps
C:\Users\Thomas\Desktop\pinnacle islands.xls
C:\Users\Thomas\Desktop\politi protivniki obamy vyneceli shpion sobytie.doc
C:\Users\Thomas\Desktop\Presentations.pps
C:\Users\Thomas\Desktop\Round Table Discussions.doc
C:\Users\Thomas\Desktop\shpion_sobytie.doc
C:\Users\Thomas\Desktop\special issue on pinnacle islands.doc
C:\Users\Thomas\Desktop\TAIWAN 2010.doc
C:\Users\Thomas\Desktop\thank you - New Year.doc
C:\Users\Thomas\Desktop\To Whom It May Concern.doc
C:\Users\Thomas\Desktop\ugroz bezopas v TSA.doc
C:\Users\Thomas\Desktop\Winning in Iraq.doc
C:\Users\Thomas\Desktop\~$sentangling Industrial Policy and Competition Policy.doc
C:\Users\Thomas\Links\Desktop.lnk
C:\Users\Thomas\Links\RecentPlaces.lnk
----------------------------------------------------------------

Network activity

File 1

123.123.123.123

123.112.0.0 - 123.127.255.255

China Unicom Beijing province network
China Unicom
China
------
Setup for FTP connection


====================================================================
 Chinese Language

zh-cn User Agent Strings (thanks to Andre' for the screenshot)
from Virustotal scan of the word doc
http://www.virustotal.com/file-scan/report.html?id=1e677420d7a8160c92b2f44f1ef5eea1cf9b0b1a25353db7d3142b268893507f-1302577275
CharCountWithSpaces: 0
CodePage: Windows Simplified Chinese (PRC, Singapore)
CompObjUserType: Microsoft Office Word Document
CompObjUserTypeLen: 31
Company: hust 
CreateDate: 2011:04:04 06:50:00
FileSize: 172 kB
FileType: DOC

7 comments:

  1. Mila. Awesome work, AGAIN!

    ReplyDelete
  2. The IP address (123.123.123.123) that you reported that this backdoor tried to "call home" to is quite well known. See my blog post for more details - http://blog.threatstop.com/2011/04/12/latest-adobe-zeroday-call-home-blocked-by-threatstop/

    ReplyDelete
  3. Hello,

    Why is the US Navy not sending special operation submarines with SCUBA commando and remote underwater vehicles to physically severe the undersea communication cables which are serving the communist China?

    It is not like the Beijing chicom have a God-given right to misuse the US-invented Internet for their espionage and otherwise targeted phsihing attacks. They can go back to clay abacus if the rules of western civilization do fit their "culture"! Ditto for the russian and ukrainian experts who are known to educate the chinese in their ways of cyberattack.

    It is time the West stop vacillating over malicious code like a new Prince Hamlet. We should resort to the sword now and use the military might to kick some yellow ass before it is too late, before we wake up to find that chicom have stolen all of our intellectual property online.

    I am all for "collective punishment" in such a serious case. The total imposed revocal of net access would prompt the common chinese masses to rise against their red rulers and finally remove the unspeakable evil of communism from this world. They will then thrive via honest industrious effort, rather than theft and oppression. Let freedom ring!

    ReplyDelete
  4. Excellent work as usual Mila...thanks for keeping us informed.

    ReplyDelete
  5. TxtImpact SMS Gateway is a great tool for enabling rapid development of interactive SMS applications and services.Through our Application Programming Interfaces (APIs): connect your application or Web site quickly and easily with our HTTP API or SMPP API sms gateway.

    ReplyDelete
  6. i need the password for the file http://www.mediafire.com/download.php?c0opsfys6ozeoo4
    kindly help me with that.
    Need to run an exploit on Windows 7 machine

    ReplyDelete