Analysis Date2015-08-19 10:40:43
MD5951e04a7832dcfbeb23e3d58da38757e
SHA1145d75864a5145a4e7cb8a57a09e504c3209c70b

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 0a678e59474b985adea2c449e341cdf5 sha1: 20e8f797f71056d3ff1abcf8105abafcfdbc38d0 size: 159744
Section.rdata md5: 76f682927f38c12c75ee5779dbb27554 sha1: 964805124a6b63cf1f14689e25a4790476e88478 size: 36352
Section.data md5: 146992ffff6acbda66c68381408be93a sha1: de167bcde5ea5954c68be83111fdc4c6ba0d1593 size: 6656
Timestamp2015-03-13 09:16:42
PackerMicrosoft Visual C++ ?.?
PEhash742822d3e05e4c966a27d7dcca8295bb2c50558d
IMPhash12d0aa6373596c17874cf17ef6984bca
AVRisingno_virus
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Rodecap.1
AVDr. Webno_virus
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVBullGuardGen:Variant.Rodecap.1
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Generic
AVZillya!no_virus
AVEmsisoftGen:Variant.Rodecap.1
AVIkarusTrojan.Win32.Rodecap
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Scar.U.gen!Eldorado
AVMalwareBytesTrojan.Agent
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort
AVK7no_virus
AVBitDefenderGen:Variant.Rodecap.1
AVFortinetW32/Rodecap.BJ!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Rodecap.BJ
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVAd-AwareGen:Variant.Rodecap.1
AVTwisterno_virus
AVAvira (antivir)TR/AD.Rodecap.Y.2
AVMcafeeTrojan-FEVX!951E04A7832D

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\vvdqorqvnzhnu\mjbr1lqzeadqcdfy.exe
Deletes FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Creates ProcessC:\vvdqorqvnzhnu\mjbr1lqzeadqcdfy.exe

Process
↳ C:\vvdqorqvnzhnu\mjbr1lqzeadqcdfy.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Cryptographic NetBIOS Portable Virtual Client ➝
C:\vvdqorqvnzhnu\lzvldrrb.exe
Creates FileC:\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\vvdqorqvnzhnu\lzvldrrb.exe
Creates FileC:\vvdqorqvnzhnu\qs3mlthvigok
Deletes FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Creates ProcessC:\vvdqorqvnzhnu\lzvldrrb.exe
Creates ServiceDiscovery Intelligent Collector Network Smart - C:\vvdqorqvnzhnu\lzvldrrb.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1856

Process
↳ Pid 1160

Process
↳ C:\vvdqorqvnzhnu\lzvldrrb.exe

Creates FileC:\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Creates Filepipe\net\NtControlPipe10
Creates FileC:\vvdqorqvnzhnu\ehslrnqqzzr.exe
Creates FileC:\vvdqorqvnzhnu\qs3mlthvigok
Creates File\Device\Afd\Endpoint
Creates FileC:\vvdqorqvnzhnu\x7rmyutykj
Deletes FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Creates Processzqdoa1rfhyiq "c:\vvdqorqvnzhnu\lzvldrrb.exe"

Process
↳ C:\vvdqorqvnzhnu\lzvldrrb.exe

Creates FileC:\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Deletes FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci

Process
↳ zqdoa1rfhyiq "c:\vvdqorqvnzhnu\lzvldrrb.exe"

Creates FileC:\vvdqorqvnzhnu\zvyhbwci
Creates FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci
Deletes FileC:\WINDOWS\vvdqorqvnzhnu\zvyhbwci

Network Details:

DNSwindowsupply.net
Type: A
173.236.172.44
DNSsweetoffice.net
Type: A
162.213.251.173
DNSmaterialsupply.net
Type: A
184.168.221.36
DNSlaughstrong.net
Type: A
50.21.189.209
DNSmountaindistance.net
Type: A
DNSpossibledistance.net
Type: A
DNSmountainoffice.net
Type: A
DNSpossibleoffice.net
Type: A
DNSmountainarrive.net
Type: A
DNSpossiblearrive.net
Type: A
DNSperhapssupply.net
Type: A
DNSperhapsdistance.net
Type: A
DNSwindowdistance.net
Type: A
DNSperhapsoffice.net
Type: A
DNSwindowoffice.net
Type: A
DNSperhapsarrive.net
Type: A
DNSwindowarrive.net
Type: A
DNSwintersupply.net
Type: A
DNSsubjectsupply.net
Type: A
DNSwinterdistance.net
Type: A
DNSsubjectdistance.net
Type: A
DNSwinteroffice.net
Type: A
DNSsubjectoffice.net
Type: A
DNSwinterarrive.net
Type: A
DNSsubjectarrive.net
Type: A
DNSfinishsupply.net
Type: A
DNSleavesupply.net
Type: A
DNSfinishdistance.net
Type: A
DNSleavedistance.net
Type: A
DNSfinishoffice.net
Type: A
DNSleaveoffice.net
Type: A
DNSfinisharrive.net
Type: A
DNSleavearrive.net
Type: A
DNSsweetsupply.net
Type: A
DNSprobablysupply.net
Type: A
DNSsweetdistance.net
Type: A
DNSprobablydistance.net
Type: A
DNSprobablyoffice.net
Type: A
DNSsweetarrive.net
Type: A
DNSprobablyarrive.net
Type: A
DNSseveralsupply.net
Type: A
DNSseveraldistance.net
Type: A
DNSmaterialdistance.net
Type: A
DNSseveraloffice.net
Type: A
DNSmaterialoffice.net
Type: A
DNSseveralarrive.net
Type: A
DNSmaterialarrive.net
Type: A
DNSseverastrong.net
Type: A
DNSseveratrouble.net
Type: A
DNSlaughtrouble.net
Type: A
DNSseverapresident.net
Type: A
DNSlaughpresident.net
Type: A
DNSseveracaught.net
Type: A
DNSlaughcaught.net
Type: A
DNSsimplestrong.net
Type: A
DNSmotherstrong.net
Type: A
DNSsimpletrouble.net
Type: A
DNSmothertrouble.net
Type: A
DNSsimplepresident.net
Type: A
DNSmotherpresident.net
Type: A
DNSsimplecaught.net
Type: A
DNSmothercaught.net
Type: A
DNSmountainstrong.net
Type: A
DNSpossiblestrong.net
Type: A
DNSmountaintrouble.net
Type: A
DNSpossibletrouble.net
Type: A
DNSmountainpresident.net
Type: A
DNSpossiblepresident.net
Type: A
DNSmountaincaught.net
Type: A
DNSpossiblecaught.net
Type: A
DNSperhapsstrong.net
Type: A
DNSwindowstrong.net
Type: A
DNSperhapstrouble.net
Type: A
DNSwindowtrouble.net
Type: A
DNSperhapspresident.net
Type: A
DNSwindowpresident.net
Type: A
DNSperhapscaught.net
Type: A
DNSwindowcaught.net
Type: A
DNSwinterstrong.net
Type: A
DNSsubjectstrong.net
Type: A
DNSwintertrouble.net
Type: A
DNSsubjecttrouble.net
Type: A
DNSwinterpresident.net
Type: A
DNSsubjectpresident.net
Type: A
DNSwintercaught.net
Type: A
HTTP GEThttp://windowsupply.net/index.php?method&len
User-Agent:
HTTP GEThttp://sweetoffice.net/index.php?method&len
User-Agent:
HTTP GEThttp://materialsupply.net/index.php?method&len
User-Agent:
HTTP GEThttp://laughstrong.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 173.236.172.44:80
Flows TCP192.168.1.1:1032 ➝ 162.213.251.173:80
Flows TCP192.168.1.1:1033 ➝ 184.168.221.36:80
Flows TCP192.168.1.1:1034 ➝ 50.21.189.209:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207769 6e646f77   se..Host: window
0x00000050 (00080)   73757070 6c792e6e 65740d0a 0d0a       supply.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207377 6565746f   se..Host: sweeto
0x00000050 (00080)   66666963 652e6e65 740d0a0d 0a0a       ffice.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d61 74657269   se..Host: materi
0x00000050 (00080)   616c7375 70706c79 2e6e6574 0d0a0d0a   alsupply.net....
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206c61 75676873   se..Host: laughs
0x00000050 (00080)   74726f6e 672e6e65 740d0a0d 0a0a0d0a   trong.net.......
0x00000060 (00096)                                         


Strings