Analysis Date2016-02-21 15:15:31
MD54b8339a10d8f040acb8ebfdab6a439c7
SHA1156ca357efd7b9e1c1eba1a3a85954a85b0d677f

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: bde5e957dadc83c34fc4c06da35388ae sha1: 4f74708b3cf94d2d090fad276cc84f5b2f6fa87e size: 531456
Section.rdata md5: 4b9c0c20e42c04373a4c62cc656bd6a1 sha1: 5d243b16ac8d1f304a3ad9e6597e78579bcd8791 size: 26112
Section.data md5: c87c6b4c52d405036b3cb6e428bcf402 sha1: 036a81dce03f22aaf47577e525bcc3922a0c0215 size: 20480
Section.reloc md5: 9646480717f015a44cc9f6cf77e3e32c sha1: 3657c879960d1c1d7c78f0c838855d3297c1d542 size: 39424
Timestamp2014-03-23 07:37:49
PackerMicrosoft Visual C++ 8
PEhash618d8ee086f2bf9de8a15024dc000d5d0fcfb863
IMPhashf1f6f18ad7858f9b97325ccdfd3c3514
AVCA (E-Trust Ino)Gen:Variant.Razy.13928
AVRisingNo Virus
AVMcafeeTrojan-FHSQ!4B8339A10D8F
AVAvira (antivir)TR/Taranis.2137
AVTwisterW32.Toolbar.CrossRider.AE.lfcr.mg
AVAd-AwareGen:Variant.Razy.13928
AVAlwil (avast)Win32:Malware-gen
AVEset (nod32)Win32/Bayrob.BM
AVGrisoft (avg)Generic37.AJMR
AVSymantecNo Virus
AVFortinetW32/Generic.FHSQ!tr
AVBitDefenderGen:Variant.Razy.13928
AVK7Trojan ( 004dc2a31 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.DI
AVMicroWorld (escan)Gen:Variant.Razy.13928
AVMalwareBytesNo Virus
AVAuthentiumW32/Nivdort.E.gen!Eldorado
AVEmsisoftGen:Variant.Razy.13928
AVFrisk (f-prot)W32/Nivdort.E.gen!Eldorado
AVIkarusTrojan.Bayrob
AVZillya!Trojan.Bayrob.Win32.13430
AVKasperskyTrojan.Win32.Generic
AVTrend MicroNo Virus
AVVirusBlokAda (vba32)No Virus
AVCAT (quickheal)TrojanSpy.Nivdort.WR4
AVBullGuardGen:Variant.Razy.13928
AVArcabit (arcavir)Gen:Variant.Razy.13928
AVClamAVNo Virus
AVDr. WebNo Virus
AVF-SecureGen:Variant.Razy.13928

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\agqvwsazuwqrdvc\uq65o1mkis0onrfciwpg.exe
Creates FileC:\agqvwsazuwqrdvc\l3trhb2d
Creates FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Deletes FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Creates ProcessC:\agqvwsazuwqrdvc\uq65o1mkis0onrfciwpg.exe

Process
↳ C:\agqvwsazuwqrdvc\uq65o1mkis0onrfciwpg.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Themes TCP/IP Level Office ➝
C:\agqvwsazuwqrdvc\qpdmfiantok.exe
Creates FileC:\agqvwsazuwqrdvc\qpdmfiantok.exe
Creates FilePIPE\lsarpc
Creates FileC:\agqvwsazuwqrdvc\uncfklt4fan
Creates FileC:\agqvwsazuwqrdvc\l3trhb2d
Creates FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Deletes FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Creates ProcessC:\agqvwsazuwqrdvc\qpdmfiantok.exe
Creates ServiceTunneling Accounts Endpoint PC Collector Fax - C:\agqvwsazuwqrdvc\qpdmfiantok.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 816

Process
↳ Pid 864

Process
↳ C:\WINDOWS\System32\svchost.exe

Process
↳ Pid 1220

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1856

Process
↳ Pid 1148

Process
↳ C:\agqvwsazuwqrdvc\qpdmfiantok.exe

Creates FileC:\agqvwsazuwqrdvc\yrh5jabfpypz
Creates Filepipe\net\NtControlPipe10
Creates FileC:\agqvwsazuwqrdvc\myiwrtxcms.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\agqvwsazuwqrdvc\uncfklt4fan
Creates FileC:\agqvwsazuwqrdvc\l3trhb2d
Creates FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Deletes FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Creates Processymfj3jr8hlrp "c:\agqvwsazuwqrdvc\qpdmfiantok.exe"

Process
↳ C:\agqvwsazuwqrdvc\qpdmfiantok.exe

Creates FileC:\agqvwsazuwqrdvc\l3trhb2d
Creates FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Deletes FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d

Process
↳ ymfj3jr8hlrp "c:\agqvwsazuwqrdvc\qpdmfiantok.exe"

Creates FileC:\agqvwsazuwqrdvc\l3trhb2d
Creates FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d
Deletes FileC:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d

Network Details:

DNSmelbourneit.hotkeysparking.com
Type: A
8.5.1.16
DNSdoubletherefore.net
Type: A
208.100.26.234
DNSbrokenquestion.net
Type: A
195.22.28.196
DNSbrokenquestion.net
Type: A
195.22.28.197
DNSbrokenquestion.net
Type: A
195.22.28.198
DNSbrokenquestion.net
Type: A
195.22.28.199
DNSstrengthschool.net
Type: A
50.63.202.38
DNSmovementtraining.net
Type: A
108.163.251.66
DNSbuildingstorm.net
Type: A
184.168.221.53
DNSdoctortraining.net
Type: A
184.168.221.96
DNSdoctorstorm.net
Type: A
72.21.91.60
DNSresultstorm.net
Type: A
98.139.135.129
DNSdesirestorm.net
Type: A
195.22.28.198
DNSdesirestorm.net
Type: A
195.22.28.199
DNSdesirestorm.net
Type: A
195.22.28.196
DNSdesirestorm.net
Type: A
195.22.28.197
DNSstrengthtraining.net
Type: A
165.160.13.20
DNSstrengthtraining.net
Type: A
165.160.15.20
DNSstrengthstorm.net
Type: A
50.63.202.27
DNSstillstorm.net
Type: A
208.100.26.234
DNSstorequestion.net
Type: A
DNSmightquestion.net
Type: A
DNSstoretherefore.net
Type: A
DNSmighttherefore.net
Type: A
DNSdoctorschool.net
Type: A
DNSprettyschool.net
Type: A
DNSdoctorwhile.net
Type: A
DNSprettywhile.net
Type: A
DNSdoctorquestion.net
Type: A
DNSprettyquestion.net
Type: A
DNSdoctortherefore.net
Type: A
DNSprettytherefore.net
Type: A
DNSfellowschool.net
Type: A
DNSdoubleschool.net
Type: A
DNSfellowwhile.net
Type: A
DNSdoublewhile.net
Type: A
DNSfellowquestion.net
Type: A
DNSdoublequestion.net
Type: A
DNSfellowtherefore.net
Type: A
DNSbrokenschool.net
Type: A
DNSresultschool.net
Type: A
DNSbrokenwhile.net
Type: A
DNSresultwhile.net
Type: A
DNSresultquestion.net
Type: A
DNSbrokentherefore.net
Type: A
DNSresulttherefore.net
Type: A
DNSprepareschool.net
Type: A
DNSdesireschool.net
Type: A
DNSpreparewhile.net
Type: A
DNSdesirewhile.net
Type: A
DNSpreparequestion.net
Type: A
DNSdesirequestion.net
Type: A
DNSpreparetherefore.net
Type: A
DNSdesiretherefore.net
Type: A
DNSstillschool.net
Type: A
DNSstrengthwhile.net
Type: A
DNSstillwhile.net
Type: A
DNSstrengthquestion.net
Type: A
DNSstillquestion.net
Type: A
DNSstrengththerefore.net
Type: A
DNSstilltherefore.net
Type: A
DNSmovementhunger.net
Type: A
DNSoutsidehunger.net
Type: A
DNSoutsidetraining.net
Type: A
DNSmovementstorm.net
Type: A
DNSoutsidestorm.net
Type: A
DNSmovementthrown.net
Type: A
DNSoutsidethrown.net
Type: A
DNSbuildinghunger.net
Type: A
DNSeveninghunger.net
Type: A
DNSbuildingtraining.net
Type: A
DNSeveningtraining.net
Type: A
DNSeveningstorm.net
Type: A
DNSbuildingthrown.net
Type: A
DNSeveningthrown.net
Type: A
DNSstorehunger.net
Type: A
DNSmighthunger.net
Type: A
DNSstoretraining.net
Type: A
DNSmighttraining.net
Type: A
DNSstorestorm.net
Type: A
DNSmightstorm.net
Type: A
DNSstorethrown.net
Type: A
DNSmightthrown.net
Type: A
DNSdoctorhunger.net
Type: A
DNSprettyhunger.net
Type: A
DNSprettytraining.net
Type: A
DNSprettystorm.net
Type: A
DNSdoctorthrown.net
Type: A
DNSprettythrown.net
Type: A
DNSfellowhunger.net
Type: A
DNSdoublehunger.net
Type: A
DNSfellowtraining.net
Type: A
DNSdoubletraining.net
Type: A
DNSfellowstorm.net
Type: A
DNSdoublestorm.net
Type: A
DNSfellowthrown.net
Type: A
DNSdoublethrown.net
Type: A
DNSbrokenhunger.net
Type: A
DNSresulthunger.net
Type: A
DNSbrokentraining.net
Type: A
DNSresulttraining.net
Type: A
DNSbrokenstorm.net
Type: A
DNSbrokenthrown.net
Type: A
DNSresultthrown.net
Type: A
DNSpreparehunger.net
Type: A
DNSdesirehunger.net
Type: A
DNSpreparetraining.net
Type: A
DNSdesiretraining.net
Type: A
DNSpreparestorm.net
Type: A
DNSpreparethrown.net
Type: A
DNSdesirethrown.net
Type: A
DNSstrengthhunger.net
Type: A
DNSstillhunger.net
Type: A
DNSstilltraining.net
Type: A
DNSstrengththrown.net
Type: A
DNSstillthrown.net
Type: A
DNSmovementchoose.net
Type: A
DNSoutsidechoose.net
Type: A
DNSmovementalthough.net
Type: A
DNSoutsidealthough.net
Type: A
DNSmovementperiod.net
Type: A
DNSoutsideperiod.net
Type: A
DNSmovementhowever.net
Type: A
DNSoutsidehowever.net
Type: A
DNSbuildingchoose.net
Type: A
DNSeveningchoose.net
Type: A
DNSbuildingalthough.net
Type: A
DNSeveningalthough.net
Type: A
DNSbuildingperiod.net
Type: A
DNSeveningperiod.net
Type: A
DNSbuildinghowever.net
Type: A
DNSeveninghowever.net
Type: A
DNSstorechoose.net
Type: A
DNSmightchoose.net
Type: A
DNSstorealthough.net
Type: A
DNSmightalthough.net
Type: A
DNSstoreperiod.net
Type: A
DNSmightperiod.net
Type: A
DNSstorehowever.net
Type: A
DNSmighthowever.net
Type: A
DNSdoctorchoose.net
Type: A
DNSprettychoose.net
Type: A
DNSdoctoralthough.net
Type: A
DNSprettyalthough.net
Type: A
DNSdoctorperiod.net
Type: A
DNSprettyperiod.net
Type: A
DNSdoctorhowever.net
Type: A
DNSprettyhowever.net
Type: A
DNSfellowchoose.net
Type: A
DNSdoublechoose.net
Type: A
DNSfellowalthough.net
Type: A
DNSdoublealthough.net
Type: A
DNSfellowperiod.net
Type: A
DNSdoubleperiod.net
Type: A
DNSfellowhowever.net
Type: A
DNSdoublehowever.net
Type: A
DNSbrokenchoose.net
Type: A
DNSresultchoose.net
Type: A
DNSbrokenalthough.net
Type: A
DNSresultalthough.net
Type: A
DNSbrokenperiod.net
Type: A
DNSresultperiod.net
Type: A
DNSbrokenhowever.net
Type: A
DNSresulthowever.net
Type: A
DNSpreparechoose.net
Type: A
DNSdesirechoose.net
Type: A
DNSpreparealthough.net
Type: A
DNSdesirealthough.net
Type: A
DNSprepareperiod.net
Type: A
DNSdesireperiod.net
Type: A
DNSpreparehowever.net
Type: A
DNSdesirehowever.net
Type: A
DNSstrengthchoose.net
Type: A
DNSstillchoose.net
Type: A
DNSstrengthalthough.net
Type: A
DNSstillalthough.net
Type: A
DNSstrengthperiod.net
Type: A
DNSstillperiod.net
Type: A
HTTP GEThttp://doctorschool.net/index.php
User-Agent:
HTTP GEThttp://doubletherefore.net/index.php
User-Agent:
HTTP GEThttp://brokenquestion.net/index.php
User-Agent:
HTTP GEThttp://strengthschool.net/index.php
User-Agent:
HTTP GEThttp://movementtraining.net/index.php
User-Agent:
HTTP GEThttp://buildingstorm.net/index.php
User-Agent:
HTTP GEThttp://doctortraining.net/index.php
User-Agent:
HTTP GEThttp://doctorstorm.net/index.php
User-Agent:
HTTP GEThttp://resultstorm.net/index.php
User-Agent:
HTTP GEThttp://desirestorm.net/index.php
User-Agent:
HTTP GEThttp://strengthtraining.net/index.php
User-Agent:
HTTP GEThttp://strengthstorm.net/index.php
User-Agent:
HTTP GEThttp://stillstorm.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 8.5.1.16:80
Flows TCP192.168.1.1:1032 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1033 ➝ 195.22.28.196:80
Flows TCP192.168.1.1:1034 ➝ 50.63.202.38:80
Flows TCP192.168.1.1:1035 ➝ 108.163.251.66:80
Flows TCP192.168.1.1:1036 ➝ 184.168.221.53:80
Flows TCP192.168.1.1:1037 ➝ 184.168.221.96:80
Flows TCP192.168.1.1:1038 ➝ 72.21.91.60:80
Flows TCP192.168.1.1:1039 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1040 ➝ 195.22.28.198:80
Flows TCP192.168.1.1:1041 ➝ 165.160.13.20:80
Flows TCP192.168.1.1:1042 ➝ 50.63.202.27:80
Flows TCP192.168.1.1:1043 ➝ 208.100.26.234:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   6f63746f 72736368 6f6f6c2e 6e65740d   octorschool.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   6f75626c 65746865 7265666f 72652e6e   oubletherefore.n
0x00000050 (00080)   65740d0a 0d0a                         et....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2062   : close..Host: b
0x00000040 (00064)   726f6b65 6e717565 7374696f 6e2e6e65   rokenquestion.ne
0x00000050 (00080)   740d0a0d 0a0a                         t.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   7472656e 67746873 63686f6f 6c2e6e65   trengthschool.ne
0x00000050 (00080)   740d0a0d 0a0a                         t.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   6f76656d 656e7474 7261696e 696e672e   ovementtraining.
0x00000050 (00080)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2062   : close..Host: b
0x00000040 (00064)   75696c64 696e6773 746f726d 2e6e6574   uildingstorm.net
0x00000050 (00080)   0d0a0d0a 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   6f63746f 72747261 696e696e 672e6e65   octortraining.ne
0x00000050 (00080)   740d0a0d 0a0d0a                       t......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   6f63746f 7273746f 726d2e6e 65740d0a   octorstorm.net..
0x00000050 (00080)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2072   : close..Host: r
0x00000040 (00064)   6573756c 7473746f 726d2e6e 65740d0a   esultstorm.net..
0x00000050 (00080)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   65736972 6573746f 726d2e6e 65740d0a   esirestorm.net..
0x00000050 (00080)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   7472656e 67746874 7261696e 696e672e   trengthtraining.
0x00000050 (00080)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   7472656e 67746873 746f726d 2e6e6574   trengthstorm.net
0x00000050 (00080)   0d0a0d0a 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   74696c6c 73746f72 6d2e6e65 740d0a0d   tillstorm.net...
0x00000050 (00080)   0a0a0d0a 0a0d0a                       .......


Strings