winsysapp.exe

The executable winsysapp.exe has been detected as malware by 41 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘WindowMessenger’. Infected by an entry-point obscuring polymorphic file infector which will create a peer-to-peer botnet and receives URLs of additional files to download. While running, it connects to the Internet address unknown.prolexic.com on port 80 using the HTTP protocol.
MD5:
21e07b759669b6c2055802f99ac0ea6c

SHA-1:
4b709404878565ec65fc9413fcb93af46a8a5319

SHA-256:
f62685e0a0da584716d77ab9462f5babcf4ad9ae9b79fbbbc8d58f64055bce91

Scanner detections:
41 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
12/23/2024 3:49:06 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Autorun.AVT
816

Agnitum Outpost
Win32.Sality.BK
7.1.1

AhnLab V3 Security
HEUR/Fakon.mwf
2014.11.11

Avira AntiVirus
W32/Sality.AT
7.11.30.172

avast!
Win32:Kukacka
141025-0

AVG
Trojan horse Generic_r.OF
2014.0.4189

Baidu Antivirus
Virus.Win32.Sality.$Emu
4.0.3.141110

Bitdefender
Trojan.Autorun.AVT
1.0.20.1570

Bkav FE
W32.Sality.PE
1.3.0.4959

Clam AntiVirus
W32.Trojan.VB-13508
0.98/21411

Comodo Security
Virus.Win32.Sality.Gen
20049

Dr.Web
Win32.HLLW.Autoruner1.62341
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Autorun.AVT
14.11.10

ESET NOD32
Win32/Sality.NBA virus
7.0.302.0

Fortinet FortiGate
W32/AutoRun.VS!tr
11/10/2014

F-Prot
W32/Sality.E.gen
4.6.5.141

F-Secure
Trojan.Autorun.AVT
11.2014-10-11_2

G Data
Trojan.Autorun.AVT
14.11.24

IKARUS anti.virus
Worm.Win32.AutoRun
t3scan.1.8.3.0

K7 AntiVirus
EmailWorm
13.185.13965

Kaspersky
Worm.Win32.Bnf
15.0.0.494

Malwarebytes
Backdoor.Bot
v2014.11.10.11

McAfee
W32/Sality.gen.z
5600.6950

Microsoft Security Essentials
Threat.Undefined
1.187.1782.0

MicroWorld eScan
Trojan.Autorun.AVT
15.0.0.942

NANO AntiVirus
Trojan.Win32.Bnf.crsvjf
0.28.6.62995

Norman
Sality.ZHB
11.20141110

nProtect
Virus/W32.Sality.D
14.11.10.01

Panda Antivirus
W32/Sality.AA
14.11.10.11

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
11.14.14.00

Rising Antivirus
PE:Malware.FakeFolder@CV!1.6AA9
23.00.65.141108

Sophos
Mal/Sality-D
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-WinAlert
10245

Total Defense
Win32/Sality.AA
37.0.11273

Trend Micro House Call
WORM_OTORUN.SMXY
7.2.314

Trend Micro
WORM_OTORUN.SMXY
10.465.10

Vba32 AntiVirus
Virus.Win32.Sality.bakb
3.12.26.3

VIPRE Antivirus
Threat.4721115
34232

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1980

File size:
384 KB (393,216 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
8/9/2050 10:07:44 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:0tbELf/Ml/cWdi5pV/JNWOVhMVGtN33yy8e3Uu:AdOpNX1hv3H

Entry address:
0x5591

Entry point:
60, 4B, 0F, BE, F1, 42, 85, F2, C7, C6, E7, 74, CE, A7, 0F, B6, EB, 08, E5, 4D, 2B, D0, F6, C1, 37, F2, 45, 80, EE, FF, B8, 00, 00, 00, 00, EB, 05, F6, C6, 58, FF, C3, 33, C3, 81, FD, E6, B6, 00, 00, 74, 04, FE, CD, 85, D6, EB, 05, F6, C6, D5, 1B, CA, 72, 03, 0F, B6, CC, EB, 08, 81, CB, 53, 4E, 75, 6E, 1C, 1B, 51, 52, F3, 81, D0, C7, 2F, 6C, 69, 84, F4, E8, 7E, 00, 00, 00, BF, 00, 00, 00, 00, 8D, 0D, B5, 06, 18, 02, 33, C2, 89, CD, 8D, 2D, 06, A5, EC, A2, 88, EF, 1A, E7, 41, F2, F7, C5, 75, FD, DC, 81, 2B...
 
[+]

Entropy:
6.6155

Code size:
20 KB (20,480 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
WindowMessenger

Command:
C:\recycler\{random}\winsysapp.exe


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to unknown.prolexic.com  (72.52.4.91:80)

Remove winsysapp.exe - Powered by Reason Core Security