File Name: svchost.exe
MD5 Hash Identifier: A6EE7AAB6B8F8268BF9EB763949D5C8B
SHA-1 Hash Identifier: 4600E17EB8FA4A11170AAA2C54D98126E58290E0
File Size: 86016
File Type: PE32 executable (GUI) Intel 80386, for MS Windows

Platform Version: 3.4.4.63.45665

Down Selector's Analysis:

EngineGTI File ReputationGateway Anti-MalwareAnti-MalwareCustom YaraSandboxFinal
Threat Name TYPE_TROJAN Heuristic.BehavesLike.Win32.Suspicious-BAY.G W32/Ramnit.dr ---Malware.Dynamic
Severity 5 5 5 None 5 5

Sample is considered malicious based on static code analysis matching on known malware families: final severity level 5

Family Classification

Family Name: Trojan.Win32.Ramnit.ASimilarity Factor: 99.46

Analysis Environment:

  • Microsoft Windows XP Professional Service Pack 3 (build 2600)
  • Internet Explorer version: 8
  • Microsoft Office version: 2003
  • PDF Reader version: 9.1

File Submitted on: 2015-04-24 13:47:11

Total Time Taken: 46 second(s)

Sandbox processing: 1 second(s)

Baitexe activated but not infected

Digital Signature Verified:unsigned
Publisher: Macromedia, Inc.
Description: Macromedia Flash Player 7.0
Product Name: Shockwave Flash
Version Info: Not Available
File version: Not Available
Strong Name: Not Available
Original Name: Not Available
Internal Name: Not Available
Copyright: Not Available
Comments: Not Available

Processes analyzed in this sample:

NameReasonLevel
svchost.exeloaded by MATD Analyzer
iexplore.exeexecuted by svchost.exe

Embedded/Dropped content:

MD5Name
96667d07eebe91b40a1f3725a3a7f1a3~TM4.tmp
c0558c3b47029e3f97a1992457eb07a5~TM3.tmp

The attachment file(s) shown above was extracted from the sample file and stored in the dropfiles.zip file

Classification / Threat Score:

Persistence, Installation Boot Survival:
Hiding, Camouflage, Stealthiness, Detection and Removal Protection:
Security Solution / Mechanism bypass, termination and removal, Anti Debugging, VM Detection:
Spreading:
Exploiting, Shellcode:
Networking:
Data spying, Sniffing, Keylogging, Ebanking Fraud:

Legend:    Sev.0-     Sev.1-     Sev.2-     Sev.3-     Sev.4-     Sev.5-     

Dynamic Analysis (behavior covered by 1 percent of code):

Hid executable file by changing its attributes Hid Windows StartUp folder by changing its attributes
Altered the memory space of the Windows API's hook procedure Injected into a different process memory and changes the access protection of the committed pages
Created new Internet Explorer process Set new application under Userinit key that will run logon scripts for starting up Windows
Created new content in Windows startup directory Wrote (injected) data to an area of a foreign process memory
Created auto start entry Allocated a region of memory within the virtual address space of a foreign process
Hid files/folders under Windows Start directory Allowed the process to perform system-level actions that were not enabled previously
Altered registry's Windows logon settings Created named mutex object
General activities from kernel level, see http://en.wikipedia.org/wiki/Ring_(computer_security) Changed the protection attribute of the process
Contained long sleep Obtained user's logon name

    Return to topsvchost.exe


    Return to topiexplore.exe


Copyright © 2014 McAfee, an Intel Company. All rights reserved.
2821 Mission College Blvd, Santa Clara, CA 95054
www.mcafee.com