Analysis Date | 2015-08-12 01:01:36 |
---|---|
MD5 | ef8f6eac6a425a9839aaf71afadba741 |
SHA1 | 142c6703c77b0d3c973c977b1e7a9cb3daa5237b |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: c196df1cab07f52149a61de777d988f6 sha1: 120afb4c4d6f665c7adf4b1dbb0d0f2b391d637f size: 301056 | |
Section | .rdata md5: 47f8ccc7a5b01f7950efd93c6aa44ca2 sha1: cfaf5ce02be8f579d9d82c353db138af513696be size: 59392 | |
Section | .data md5: 3cdbf6cea0002b66d0b99122ce8c8176 sha1: f5a579ad37edad93585f9532da818f09750dccd1 size: 7168 | |
Section | .reloc md5: bb633b6868b9fe19d3ae96e395e97a54 sha1: 2cb5ba1a9e37712ea20b5ab7bbb7a6200bdd2cca size: 22528 | |
Timestamp | 2015-05-11 06:09:45 | |
Packer | Microsoft Visual C++ 8 | |
PEhash | 7c7df6845b1cb48d4d66b62a50c096f8b823d775 | |
IMPhash | 228e2cf539f5ab99cab1cc7c6b2f1698 | |
AV | Rising | Trojan.Win32.Bayrod.b |
AV | Mcafee | PWS-FCCE!EF8F6EAC6A42 |
AV | Avira (antivir) | TR/Spy.ZBot.xbbeomq |
AV | Twister | no_virus |
AV | Ad-Aware | Gen:Variant.Diley.1 |
AV | Alwil (avast) | Malware-gen:Win32:Malware-gen |
AV | Eset (nod32) | Win32/Bayrob.V.gen |
AV | Grisoft (avg) | Win32/Cryptor |
AV | Symantec | Downloader.Upatre!g15 |
AV | Fortinet | W32/Bayrob.T!tr |
AV | BitDefender | Gen:Variant.Diley.1 |
AV | K7 | Trojan ( 004c3a4d1 ) |
AV | Microsoft Security Essentials | TrojanSpy:Win32/Nivdort.AL |
AV | MicroWorld (escan) | Gen:Variant.Diley.1 |
AV | MalwareBytes | Trojan.Agent.KVTGen |
AV | Authentium | W32/Nivdort.B.gen!Eldorado |
AV | Frisk (f-prot) | no_virus |
AV | Ikarus | Trojan.Win32.Bayrob |
AV | Emsisoft | Gen:Variant.Diley.1 |
AV | Zillya! | no_virus |
AV | Kaspersky | Trojan.Win32.Generic |
AV | Trend Micro | TROJ_BAYROB.SM0 |
AV | CAT (quickheal) | TrojanSpy.Nivdort.OD4 |
AV | VirusBlokAda (vba32) | no_virus |
AV | Padvish | no_virus |
AV | BullGuard | Gen:Variant.Diley.1 |
AV | Arcabit (arcavir) | Gen:Variant.Diley.1 |
AV | ClamAV | no_virus |
AV | Dr. Web | Trojan.Bayrob.1 |
AV | F-Secure | Gen:Variant.Diley.1 |
AV | CA (E-Trust Ino) | no_virus |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
---|---|
Creates File | C:\inccowxjsip\e3sw1kjltstwofun.exe |
Creates File | C:\inccowxjsip\zgpbtfqk |
Deletes File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Creates Process | C:\inccowxjsip\e3sw1kjltstwofun.exe |
Process
↳ C:\inccowxjsip\e3sw1kjltstwofun.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Session Secure Tracking Debugger Center ➝ C:\inccowxjsip\lgrfscvjcxeg.exe |
---|---|
Creates File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Creates File | C:\inccowxjsip\lgrfscvjcxeg.exe |
Creates File | PIPE\lsarpc |
Creates File | C:\inccowxjsip\i1ewduo |
Creates File | C:\inccowxjsip\zgpbtfqk |
Deletes File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Creates Process | C:\inccowxjsip\lgrfscvjcxeg.exe |
Creates Service | Event Registrar iSCSI Provider Multimedia - C:\inccowxjsip\lgrfscvjcxeg.exe |
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ Pid 800
Process
↳ Pid 848
Process
↳ C:\WINDOWS\System32\svchost.exe
Creates File | C:\WINDOWS\system32\WBEM\Logs\wbemess.log |
---|
Process
↳ Pid 1204
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝ NULL |
---|---|
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝ 7 |
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝ C:\WINDOWS\System32\spool\PRINTERS\\x00 |
Process
↳ Pid 1856
Process
↳ Pid 1144
Process
↳ C:\inccowxjsip\lgrfscvjcxeg.exe
Creates File | pipe\net\NtControlPipe10 |
---|---|
Creates File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Creates File | C:\inccowxjsip\bfzqulft.exe |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\inccowxjsip\ykdlbmcyo |
Creates File | C:\inccowxjsip\i1ewduo |
Creates File | C:\inccowxjsip\zgpbtfqk |
Deletes File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Creates Process | trv8hqkrzyps "c:\inccowxjsip\lgrfscvjcxeg.exe" |
Process
↳ C:\inccowxjsip\lgrfscvjcxeg.exe
Creates File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
---|---|
Creates File | C:\inccowxjsip\zgpbtfqk |
Deletes File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Process
↳ trv8hqkrzyps "c:\inccowxjsip\lgrfscvjcxeg.exe"
Creates File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
---|---|
Creates File | C:\inccowxjsip\zgpbtfqk |
Deletes File | C:\WINDOWS\inccowxjsip\zgpbtfqk |
Network Details:
Raw Pcap
0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2072 : close..Host: r 0x00000040 (00064) 6573756c 7473746f 726d2e6e 65740d0a esultstorm.net.. 0x00000050 (00080) 0d0a .. 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 65736972 6573746f 726d2e6e 65740d0a esirestorm.net.. 0x00000050 (00080) 0d0a .. 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746874 7261696e 696e672e trengthtraining. 0x00000050 (00080) 6e65740d 0a0d0a net.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746873 746f726d 2e6e6574 trengthstorm.net 0x00000050 (00080) 0d0a0d0a 0a0d0a .......
Strings