Analysis Date2015-11-04 01:48:56
MD55ad6462d9217807f4fe960a9ec2c2017
SHA10ccdbb648082fd305e768c64d123b65256eead6f

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Sectioncode1 md5: d23e68113f4d26e2bc62d0400808f8b6 sha1: 3d49e6c444358f4df20dad06a83badc3d10afe7d size: 9216
Section.PDATA md5: 884c2329cfd27630ab3daa29211cb017 sha1: beaa08e25299e1c73318f8559ae1e8366695e6dd size: 9216
Section.RSRC md5: 0a368e662aae0a240c935b5b61c3f4d8 sha1: 48443f3553cb56ccf8363d5e8a20f353e82edfca size: 28160
Section.relpn md5: 0d7003f0a9d1e6f818e2d71c853e491a sha1: a9d0ef63140f04d13fb4e2ee43f2e3dc516f3fb5 size: 1024
Section.dAte2 md5: 3aff87b07f1f92b3f889174919b2fca0 sha1: a3d47ca092a3fbcb782676e6fd3f5a1ca52fad90 size: 1024
Section.dAte2 md5: 0956b9e932d5c05e9b597ed8a6c9066a sha1: ec93f25d0047de126f65d37d3e6914006fed5e69 size: 512
Timestamp1997-10-28 03:56:42
PEhash87d994bafc479cb66264d52144ad6e4d08516b31
IMPhash57238e34c20a19e065147fa47318f413
AVF-SecureTrojan.Upatre.Gen.2
AVAuthentiumW32/Upatre.E.gen!Eldorado
AVMalwareBytesSpyware.Dyre
AVDr. WebTrojan.Upatre.1335
AVGrisoft (avg)Crypt_s.IMK
AVMalwareBytesSpyware.Dyre
AVEset (nod32)Win32/Kryptik.DJLX
AVMicroWorld (escan)Trojan.Upatre.Gen.2
AVTrend MicroTROJ_UPATRE.SMX3
AVClamAVWin.Trojan.Upatre-5044
AVTwisterNo Virus
AVEset (nod32)Win32/Kryptik.DJLX
AVBitDefenderTrojan.Upatre.Gen.2
AVMicroWorld (escan)Trojan.Upatre.Gen.2
AVAvira (antivir)TR/Crypt.Xpack.311582
AVAlwil (avast)Crypt-SCG [Trj]
AVFortinetW32/Waski.F!tr
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre.BC
AVIkarusTrojan.Win32.Crypt
AVKasperskyTrojan-Downloader.Win32.Upatre.akvx
AVVirusBlokAda (vba32)BScope.Malware-Cryptor.Hlux
AVArcabit (arcavir)Trojan.Upatre.Gen.2
AVMcafeeUpatre-FACE!5AD6462D9217
AVAvira (antivir)TR/Crypt.Xpack.311582
AVAd-AwareTrojan.Upatre.Gen.2
AVAlwil (avast)Crypt-SCG [Trj]
AVSymantecDownloader.Upatre!gen9
AVFortinetW32/Waski.F!tr
AVK7Trojan ( 004c123f1 )
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre.BC
AVRising0x59354956
AVMcafeeUpatre-FACE!5AD6462D9217
AVTwisterNo Virus
AVAd-AwareTrojan.Upatre.Gen.2
AVGrisoft (avg)Crypt_s.IMK
AVSymantecDownloader.Upatre!gen9
AVBitDefenderTrojan.Upatre.Gen.2
AVK7Trojan ( 004c123f1 )
AVAuthentiumW32/Upatre.E.gen!Eldorado
AVFrisk (f-prot)W32/Upatre.E.gen!Eldorado
AVEmsisoftTrojan.Upatre.Gen.2
AVZillya!Downloader.UpatreGen.Win32.3
AVCAT (quickheal)TrojanDwnldr.Upatre.MUE.A5
AVPadvishNo Virus
AVBullGuardTrojan.Upatre.Gen.2
AVCA (E-Trust Ino)No Virus
AVRising0x59354956
AVIkarusTrojan.Win32.Crypt
AVFrisk (f-prot)W32/Upatre.E.gen!Eldorado

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\~TMPB115.txt
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\hippersys.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\hippersys.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\hippersys.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Deletes FileC:\malware.exe
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS94.127.129.214
Winsock DNS160.218.186.106
Winsock DNS93.185.4.90
Winsock DNS81.90.175.7
Winsock DNS193.86.104.15
Winsock DNS217.168.210.122
Winsock DNS89.203.194.212
Winsock DNS94.103.54.19
Winsock DNSicanhazip.com

Network Details:

DNSicanhazip.com
Type: A
64.182.208.184
DNSicanhazip.com
Type: A
64.182.208.185
HTTP GEThttp://icanhazip.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
HTTP GEThttp://93.185.4.90:13222/MAK11/COMPUTER-XXXXXX/0/51-SP3/0/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
Flows TCP192.168.1.1:1031 ➝ 64.182.208.184:80
Flows TCP192.168.1.1:1032 ➝ 93.185.4.90:13222
Flows TCP192.168.1.1:1033 ➝ 94.103.54.19:443
Flows TCP192.168.1.1:1034 ➝ 94.103.54.19:443
Flows TCP192.168.1.1:1035 ➝ 94.103.54.19:443
Flows TCP192.168.1.1:1036 ➝ 94.103.54.19:443
Flows TCP192.168.1.1:1037 ➝ 94.127.129.214:443
Flows TCP192.168.1.1:1038 ➝ 94.127.129.214:443
Flows TCP192.168.1.1:1039 ➝ 94.127.129.214:443
Flows TCP192.168.1.1:1040 ➝ 94.127.129.214:443
Flows TCP192.168.1.1:1041 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1042 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1043 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1044 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1045 ➝ 89.203.194.212:443
Flows TCP192.168.1.1:1046 ➝ 89.203.194.212:443
Flows TCP192.168.1.1:1047 ➝ 89.203.194.212:443
Flows TCP192.168.1.1:1048 ➝ 89.203.194.212:443
Flows TCP192.168.1.1:1049 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1050 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1051 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1052 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1053 ➝ 193.86.104.15:443
Flows TCP192.168.1.1:1054 ➝ 193.86.104.15:443
Flows TCP192.168.1.1:1055 ➝ 193.86.104.15:443
Flows TCP192.168.1.1:1056 ➝ 193.86.104.15:443

Raw Pcap
0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   41636365 70743a20 74657874 2f2a2c20   Accept: text/*, 
0x00000020 (00032)   6170706c 69636174 696f6e2f 2a0d0a55   application/*..U
0x00000030 (00048)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000040 (00064)   6c612f35 2e302028 57696e64 6f777320   la/5.0 (Windows 
0x00000050 (00080)   4e542036 2e313b57 4f573634 29204170   NT 6.1;WOW64) Ap
0x00000060 (00096)   706c6557 65624b69 742f3533 372e3336   pleWebKit/537.36
0x00000070 (00112)   20284b48 544d4c2c 206c696b 65204765    (KHTML, like Ge
0x00000080 (00128)   636b6f29 20436872 6f6d652f 34312e30   cko) Chrome/41.0
0x00000090 (00144)   2e323237 322e3839 20536166 6172692f   .2272.89 Safari/
0x000000a0 (00160)   3533372e 3336204f 50522f32 382e302e   537.36 OPR/28.0.
0x000000b0 (00176)   31373530 2e34380d 0a486f73 743a2069   1750.48..Host: i
0x000000c0 (00192)   63616e68 617a6970 2e636f6d 0d0a4361   canhazip.com..Ca
0x000000d0 (00208)   6368652d 436f6e74 726f6c3a 206e6f2d   che-Control: no-
0x000000e0 (00224)   63616368 650d0a0d 0a                  cache....

0x00000000 (00000)   47455420 2f4d414b 31312f43 4f4d5055   GET /MAK11/COMPU
0x00000010 (00016)   5445522d 58585858 58582f30 2f35312d   TER-XXXXXX/0/51-
0x00000020 (00032)   5350332f 302f2048 5454502f 312e310d   SP3/0/ HTTP/1.1.
0x00000030 (00048)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000040 (00064)   696c6c61 2f352e30 20285769 6e646f77   illa/5.0 (Window
0x00000050 (00080)   73204e54 20362e31 3b574f57 36342920   s NT 6.1;WOW64) 
0x00000060 (00096)   4170706c 65576562 4b69742f 3533372e   AppleWebKit/537.
0x00000070 (00112)   33362028 4b48544d 4c2c206c 696b6520   36 (KHTML, like 
0x00000080 (00128)   4765636b 6f292043 68726f6d 652f3431   Gecko) Chrome/41
0x00000090 (00144)   2e302e32 3237322e 38392053 61666172   .0.2272.89 Safar
0x000000a0 (00160)   692f3533 372e3336 204f5052 2f32382e   i/537.36 OPR/28.
0x000000b0 (00176)   302e3137 35302e34 380d0a48 6f73743a   0.1750.48..Host:
0x000000c0 (00192)   2039332e 3138352e 342e3930 3a313332    93.185.4.90:132
0x000000d0 (00208)   32320d0a 43616368 652d436f 6e74726f   22..Cache-Contro
0x000000e0 (00224)   6c3a206e 6f2d6361 6368650d 0a0d0a     l: no-cache....

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.


Strings