service.exe

The executable service.exe has been detected as malware by 40 anti-virus scanners. This is a setup program which is used to install the application. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Audio Driver’. Accoriding to the detections, this has been classified as a kyelogger which is capable of recoring a user's keystrokes. The file has been seen being downloaded from www.edmodo.com.
MD5:
2160ffb55f437efda6dfc6bbf7dc51b5

SHA-1:
01729c13eeba06a751d1e1fc5addc74cd527c537

SHA-256:
6481d69da339071c05bf089ae81fdea618fad65d73525dd220c2c28cc9b5c8a4

Scanner detections:
40 / 68

Status:
Malware

Explanation:
The software cotains keystroke monitoring/logging capablities which may or may not be installed without the user's knowledge.

Analysis date:
11/23/2024 10:16:03 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Barys.25351
329

AegisLab AV Signature
Troj.W32.Scar!c
2.1.4+

Agnitum Outpost
Trojan.Scar
7.1.1

AhnLab V3 Security
HEUR/Fakon.mwf
2016.02.20

Avira AntiVirus
TR/Dropper.Gen7
8.3.3.2

Arcabit
Trojan.Barys.D6307
1.0.0.653

avast!
Win32:Malware-gen
2014.9-160311

AVG
Win32/DH{gQA?}
2017.0.2807

Baidu Antivirus
Trojan.Win32.Scar
4.0.3.16311

Bitdefender
Gen:Variant.Barys.25351
1.0.20.355

Bkav FE
W32.FakeW7Folder.Fam.Trojan
1.3.0.7400

Clam AntiVirus
Win.Trojan.Agent-866075
0.98/21511

Comodo Security
UnclassifiedMalware
24266

Dr.Web
Trojan.DownLoader10.16224
9.0.1.071

Emsisoft Anti-Malware
Gen:Variant.Barys.25351
8.16.03.11.03

ESET NOD32
Win32/Spy.KeyLogger.OFA
10.13058

Fortinet FortiGate
W32/KeyLogger.OFA!tr.spy
3/11/2016

F-Secure
Gen:Variant.Barys.25351
11.2016-11-03_6

G Data
Gen:Variant.Barys.25351
16.3.25

IKARUS anti.virus
Trojan-PWS.Keylogger
t3scan.2.0.7.0

K7 AntiVirus
Spyware
13.213.18804

Kaspersky
Trojan.Win32.Scar
14.0.0.532

Malwarebytes
Spyware.KeyLogger
v2016.03.11.03

McAfee
GenericR-DCI!2160FFB55F43
5600.6463

Microsoft Security Essentials
TrojanSpy:Win32/Keylogger.BE
1.1.12400.0

MicroWorld eScan
Gen:Variant.Barys.25351
17.0.0.213

NANO AntiVirus
Trojan.Win32.Scar.csezdo
1.0.14.6204

nProtect
Trojan/W32.Scar.109060
16.02.19.01

Panda Antivirus
Trj/Genetic.gen
16.03.11.03

Qihoo 360 Security
Win32/Trojan.506
1.0.0.1120

Quick Heal
Trojan.Scar.r9
3.16.14.00

Rising Antivirus
PE:Malware.Generic(Thunder)!1.A1C4 [F]
23.00.65.16309

Sophos
Mal/Generic-L
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Scar
9272

Total Defense
Win32/FakeFLDR_i
37.1.62.1

Trend Micro House Call
TROJ_SPNR.03BI14
7.2.71

Trend Micro
TROJ_SPNR.03BI14
10.465.11

Vba32 AntiVirus
Trojan.Scar
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic!SB.0
47334

Zillya! Antivirus
Trojan.Scar.Win32.83044
2.0.0.2673

File size:
106.5 KB (109,060 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\service.exe

File PE Metadata
Compilation timestamp:
5/16/2013 2:27:51 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
3072:YiK6BF3w6b4EoeaciyuThk7xUnmLOUpiHr:rK6qYiyOk7xUnq6r

Entry address:
0x12A0

Entry point:
83, EC, 1C, C7, 04, 24, 02, 00, 00, 00, FF, 15, 7C, 62, 41, 00, E8, 4B, FD, FF, FF, 8D, 74, 26, 00, 8D, BC, 27, 00, 00, 00, 00, A1, 94, 62, 41, 00, FF, E0, 89, F6, 8D, BC, 27, 00, 00, 00, 00, A1, 88, 62, 41, 00, FF, E0, 90, 90, 90, 90, 90, 90, 90, 90, 90, 8B, 0D, 0C, D0, 40, 00, 85, C9, 74, 38, 55, 89, E5, 83, EC, 18, C7, 04, 24, 00, E0, 40, 00, E8, B8, B6, 00, 00, 52, 85, C0, 74, 23, C7, 44, 24, 04, 0E, E0, 40, 00, 89, 04, 24, E8, AB, B6, 00, 00, 83, EC, 08, 85, C0, 74, 09, C7, 04, 24, 0C, D0, 40, 00, FF...
 
[+]

Code size:
47.5 KB (48,640 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Audio Driver

Command:
C:\users\{user}\appdata\local\temp\{random}.tmp\service.exe


The file service.exe has been seen being distributed by the following URL.

Remove service.exe - Powered by Reason Core Security