Threat Database Trojans Troj/Agent-AANA

Troj/Agent-AANA

By Domesticus in Trojans

Threat Scorecard

Popularity Rank: 23,776
Threat Level: 80 % (High)
Infected Computers: 6
First Seen: March 9, 2013
Last Seen: January 16, 2026
OS(es) Affected: Windows

Troj/Agent-AANA is a Trojan that proliferates to targeted PCs via malicious emails supposedly sent by the DCU (Digital Crimes Unit) of Microsoft. The bogus Microsoft DCU email dispersing Troj/Agent-AANA has the subject 'Security' and tells the affected computer user addressed as 'Dear E-mail User' that because of one fresh security flaw that cybercriminals are exploiting for obtaining his/her Internet credentials, Microsoft DCU this year (2013) has made one fresh security utility. All web and Microsoft users need to affirm the details about personal email accounts despite what ISP alternatively host company they're using. The affirmation can be done via downloading an attached file particularly 'Microsoft_STF', found as Troj/Agent-AANA, unzipping it on the victim's desktop and viewing it. The spam Microsoft DCU email announces that this will then list the computer owner in the security databank of Microsoft and asks the recipient to note that in case of non-affirmation of email accounts, cybercriminals may compromise his/her work or private email and, thus, gain access into his/her privileged/classified information.

File System Details

Troj/Agent-AANA may create the following file(s):
# File Name Detections
1. Microsoft_STF_install.zip

System Messages

The following system messages may be associated with Troj/Agent-AANA:

Dear Email User,

Due to a new vulnerability which is exploited by hackers to steal your online details.

Microsoft Digital Crimes Unit in 2013 has hereby developed a new security measure.

All users of the Internet and Microsoft products are hereby required to validate there email account information irregardless of their Internet service provider or Host company.

To validate your email account and to prevent hackers from exploiting the new vulnerability.

Please download the "Microsoft_STF" file attached, extract the file on to your desktop and open.Once done you will updated on Microsoft security database.

Please note that if your email is not validated, your email will be at risk for hackers getting into your personal or business email account there by getting access to classified or privileged information.

2013 Microsoft Digital Crimes Unit

Analysis Report

General information

Family Name: Trojan.Zegost.N
Signature status: No Signature

Known Samples

MD5: 8df56fffef38b4560429a2b727203852
SHA1: bcadc7becedcd69f99d2554e99ba5ff781757d01
SHA256: 30DC1858EC4FD715C70DDF37DB7A76BC40EB8D8F790BC5D1AE6BC7B88C4B254E
File Size: 671.74 KB, 671744 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • dll
  • x86

Block Information

Total Blocks: 22
Potentially Malicious Blocks: 10
Whitelisted Blocks: 10
Unknown Blocks: 2

Visual Map

x x x x x x x x x x ? 0 ? 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.FS

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\bcadc7becedcd69f99d2554e99ba5ff781757d01_0000671744.,LiQMAxHB

Trending

Most Viewed

Loading...