Threat Database Trojans Trojan.Agent.KJG

Trojan.Agent.KJG

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.KJG
Signature status: Self Signed

Known Samples

MD5: aadbc30b503cb9fed59e8fd99aab65d9
SHA1: 13b993eef806656e192e05f1ccdbf8de13697b30
SHA256: 0A1CEB0D2D9EFF16D71F311E7E06D3D9B0DF4908C5665207FCB506CA459BF578
File Size: 1.26 MB, 1257987 bytes
MD5: 003c5dc6cd7ab8af70af1450da76a8c4
SHA1: aa3625788173beca0e641a2ef455cbab946f6f30
SHA256: D1734E7782B99763AA888056250E10900D60CB811419DF735B56AD2DE6EC6E74
File Size: 420.10 KB, 420096 bytes
MD5: 7ed56b9be2a5ddaed48048dc634b717d
SHA1: 8e2084b12bb6f425360a54a8ab895ea5ea4026b7
SHA256: 4AEAA6DD0ED86C2C745A6606D31C7355E384B3E1C9804C18019CE3C38D516D4E
File Size: 235.26 KB, 235264 bytes
MD5: e58530f872a481e958ebd8ecd25488e8
SHA1: dde3840690b3b009145c65955129673e2a4baa86
SHA256: D28C0EDF2C585AFA4A6833356CD5432827C789653ACF8075D09E1ED82D3DB568
File Size: 235.78 KB, 235776 bytes
MD5: 105878a39e1df7b3a56b950e76bdf03a
SHA1: 53594c5c4fb4ca49fb9282b372dc22b53b027c52
SHA256: EFA9C586658287CC84131B9C5346C199EF7408A91C880AFC05099DB30A9F6B00
File Size: 1.54 MB, 1541259 bytes
Show More
MD5: 2ef8f88b5d61147aa91673f6f4803352
SHA1: 7338615b33eaa58ebd221fe406452e2e17020ddc
SHA256: 938188E48E180A598EC95875973F43B5A7334E6BD378C258BF87EE33039C48EF
File Size: 516.86 KB, 516864 bytes
MD5: f15e08e4e6669bb90f7d6c557978f2c5
SHA1: fb983b92b122d6baa63705f405560375cfb77580
SHA256: DB0DBC15580EA25DE08D48C495680BFF22FD84EBF1E532B59BFC862E9E5ADB0F
File Size: 371.97 KB, 371968 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • Microsoft Corporation
File Description
  • Win32 Cabinet Self-Extractor
  • Самоизвлечение CAB-файлов Win32
File Version
  • 11.00.26100.7015 (WinBuild.160101.0800)
Internal Name
  • Wextract
Legal Copyright
  • © Microsoft Corporation. All rights reserved.
  • © Корпорация Майкрософт. Все права защищены.
Original Filename
  • WEXTRACT.EXE .MUI
Product Name
  • Internet Explorer
Product Version
  • 11.00.26100.7015

Digital Signatures

Signer Root Status
MicrosoftGuardian Service MicrosoftGuardian Service Self Signed
MicrosoftGuardian_Service MicrosoftGuardian_Service Self Signed

File Traits

  • big overlay
  • fptable
  • HighEntropy
  • No Version Info
  • x86

Block Information

Total Blocks: 635
Potentially Malicious Blocks: 2
Whitelisted Blocks: 584
Unknown Blocks: 49

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 ? ? 0 x ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? 0 ? ? 0 ? ? ? ? ? ? ? ? 0 ? ? 0 ? ? 0 0 0 ? 0 0 0 ? ? ? ? ? ? ? 0 0 x 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 2 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 2 2 0 2 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 3 1 1 1 1 0 1 1 0 0 1 1 2 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.KJG
  • Injector.HYC
  • Injector.HYD
  • Trojan.Kryptik.Gen.AGP
  • Trojan.Kryptik.Gen.VV

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\socketservice.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\socketservice.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\socketservice.exe_deleted_ Synchronize,Write Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\tmp4351$.tmp Generic Write,Read Attributes,Delete
c:\users\user\appdata\local\temp\ixp000.tmp\updatesocket.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\updatesocket.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\ixp000.tmp\updatesocket.exe_deleted_ Synchronize,Write Attributes
c:\users\user\appdata\roaming\guardianservice\guardianservice.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\users\user\appdata\roaming\guardianservice\guardiansvc_service.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
Show More
c:\users\user\appdata\roaming\guardiansvc\guardiansvc.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows\currentversion\run::guardiansvc C:\Users\Lnppotjk\AppData\Roaming\GuardianSvc\guardiansvc.exe RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::guardianservice "C:\Users\Grpymyjs\AppData\Roaming\GuardianService\guardianservice.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::guardianservice "C:\Users\Bxmbwohh\AppData\Roaming\GuardianService\guardiansvc_service.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::guardianservice "C:\Users\Bgfpabag\AppData\Roaming\GuardianService\guardiansvc_service.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Hvnjabmi\AppData\Local\Temp\IXP000.TMP\" RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Syscall Use
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtDeleteValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
Show More
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetValueKey
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Shell Command Execution

"C:\Users\Lnppotjk\AppData\Roaming\GuardianSvc\guardiansvc.exe" --relocated
"C:\Users\Grpymyjs\AppData\Roaming\GuardianService\guardianservice.exe" --relocated
"C:\Users\Bxmbwohh\AppData\Roaming\GuardianService\guardiansvc_service.exe" --relocated
"C:\Users\Bgfpabag\AppData\Roaming\GuardianService\guardiansvc_service.exe" --relocated
C:\Users\Hvnjabmi\AppData\Local\Temp\IXP000.TMP\SocketService.exe
Show More
"C:\Users\Hvnjabmi\AppData\Roaming\GuardianService\guardiansvc_service.exe" --relocated
"C:\Users\Eehpilfx\AppData\Roaming\GuardianService\guardiansvc_service.exe" --relocated
"C:\Users\Rjyrubem\AppData\Roaming\GuardianService\guardiansvc_service.exe" --relocated

Trending

Most Viewed

Loading...