Analysis Date2015-11-04 18:17:23
MD5c820ba22f954430eda648db5fcaaafbb
SHA11b4f90611c7a19311401fc23b8d393c495846385

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 6b6ca8fec185ddf488cf31f77e897b8e sha1: f8812cde1340413fa2e8a83fe39913dbe2d18bc8 size: 230400
Section.data md5: 050241095001040551dddaecbcfc3988 sha1: 43ea3a9c8dfc885039f8e2d02bf9653d4d1227dd size: 20992
Section.rdata md5: 9f454198959a7d4a34512d6b8732c026 sha1: 9076b44a016ee73287bed34d15db59ea0af06a29 size: 40448
Section.eh_fram md5: 3448c8f514bb1199bc4992394d48c57e sha1: 9ffb32dac32b312bdb4485e4156663aace90844b size: 40448
Section.bss md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
Section.idata md5: 4e830c7e493a3b8f76c6cbea096a6fd6 sha1: 628a61909659be368c79c21926f59647d2763160 size: 6656
Section.CRT md5: 0cc1f4e721c2bcc0bbbd5187dfdf61e8 sha1: 62dbb9a5bec5ddfa19af88bb95e11aa6b0af0c79 size: 512
Section.tls md5: d629eb4ea57668114eadcaf88b315b4d sha1: 8571439ee3c4cfbf74a8b43c1c9bffe9a6d8d839 size: 512
Timestamp2015-03-05 06:02:34
PEhashf88b51ab7d7439e1dcace9fae55c9ceccc66215c
IMPhash9f5e549d6cc54ad8e8a1cea04b6015fa
AVCA (E-Trust Ino)No Virus
AVCA (E-Trust Ino)No Virus
AVRisingNo Virus
AVMcafeeTrojan-FGOJ!C820BA22F954
AVAvira (antivir)TR/ATRAPS.A.11262
AVTwisterNo Virus
AVAd-AwareGen:Variant.Symmi.51758
AVAlwil (avast)Evo-gen [Susp]
AVEset (nod32)Win32/Agent.XDQ
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g16
AVFortinetW32/Agent.XDQ!tr
AVBitDefenderGen:Variant.Symmi.51758
AVK7Trojan ( 004c988e1 )
AVMicrosoft Security EssentialsTrojan:Win32/Dynamer!ac
AVMicroWorld (escan)Gen:Variant.Symmi.51758
AVMalwareBytesNo Virus
AVAuthentiumW32/S-6a8c3109!Eldorado
AVFrisk (f-prot)No Virus
AVIkarusTrojan.Win32.Agent
AVEmsisoftGen:Variant.Symmi.51758
AVZillya!No Virus
AVKasperskyTrojan.Win32.Generic
AVTrend MicroNo Virus
AVCAT (quickheal)No Virus
AVVirusBlokAda (vba32)No Virus
AVPadvishNo Virus
AVBullGuardGen:Variant.Symmi.51758
AVArcabit (arcavir)Gen:Variant.Symmi.51758
AVClamAVNo Virus
AVDr. WebNo Virus
AVF-SecureGen:Variant.Symmi.51758
AVRisingNo Virus
AVMcafeeTrojan-FGOJ!C820BA22F954
AVAvira (antivir)TR/ATRAPS.A.11262
AVTwisterNo Virus
AVAd-AwareGen:Variant.Symmi.51758
AVAlwil (avast)Evo-gen [Susp]
AVEset (nod32)Win32/Agent.XDQ
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g16
AVFortinetW32/Agent.XDQ!tr
AVBitDefenderGen:Variant.Symmi.51758
AVK7Trojan ( 004c988e1 )
AVMicrosoft Security EssentialsTrojan:Win32/Dynamer!ac
AVMicroWorld (escan)Gen:Variant.Symmi.51758
AVMalwareBytesNo Virus
AVAuthentiumW32/S-6a8c3109!Eldorado
AVFrisk (f-prot)No Virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\udork1m79x\khe8oszc
Creates FileC:\WINDOWS\udork1m79x\khe8oszc
Creates FileC:\udork1m79x\yajrpdfe1ktkpvukojgj9.exe
Deletes FileC:\WINDOWS\udork1m79x\khe8oszc
Creates ProcessC:\udork1m79x\yajrpdfe1ktkpvukojgj9.exe

Process
↳ C:\udork1m79x\yajrpdfe1ktkpvukojgj9.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Collector Connectivity Debugger User-mode ➝
C:\udork1m79x\wfyulpsgi09ga.exe
Creates FileC:\udork1m79x\khe8oszc
Creates FileC:\udork1m79x\wfyulpsgi09ga.exe
Creates FilePIPE\lsarpc
Creates FileC:\udork1m79x\kqnmgscxj
Creates FileC:\WINDOWS\udork1m79x\khe8oszc
Deletes FileC:\WINDOWS\udork1m79x\khe8oszc
Creates ProcessC:\udork1m79x\wfyulpsgi09ga.exe
Creates ServiceEncryption Solutions Net.Tcp Experience - C:\udork1m79x\wfyulpsgi09ga.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Process
↳ Pid 1856

Process
↳ Pid 1144

Process
↳ C:\udork1m79x\wfyulpsgi09ga.exe

Creates FileC:\udork1m79x\khe8oszc
Creates Filepipe\net\NtControlPipe10
Creates FileC:\udork1m79x\fewl9gdgt.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\udork1m79x\kqnmgscxj
Creates FileC:\WINDOWS\udork1m79x\khe8oszc
Creates FileC:\udork1m79x\ugqyjuotm
Deletes FileC:\WINDOWS\udork1m79x\khe8oszc
Creates Processkxbjvhqooujx "c:\udork1m79x\wfyulpsgi09ga.exe"

Process
↳ C:\udork1m79x\wfyulpsgi09ga.exe

Creates FileC:\udork1m79x\khe8oszc
Creates FileC:\WINDOWS\udork1m79x\khe8oszc
Deletes FileC:\WINDOWS\udork1m79x\khe8oszc

Process
↳ kxbjvhqooujx "c:\udork1m79x\wfyulpsgi09ga.exe"

Creates FileC:\udork1m79x\khe8oszc
Creates FileC:\WINDOWS\udork1m79x\khe8oszc
Deletes FileC:\WINDOWS\udork1m79x\khe8oszc

Network Details:

DNSearnestinesullivan.net
Type: A
195.22.26.254
DNSearnestinesullivan.net
Type: A
195.22.26.231
DNSearnestinesullivan.net
Type: A
195.22.26.252
DNSearnestinesullivan.net
Type: A
195.22.26.253
DNSbartholomewarabella.net
Type: A
DNSwilloughbyarabella.net
Type: A
DNSbartholomewsullivan.net
Type: A
DNSwilloughbysullivan.net
Type: A
DNSchristianamargaret.net
Type: A
DNSdulcibellamargaret.net
Type: A
DNSchristianacherokee.net
Type: A
DNSdulcibellacherokee.net
Type: A
DNSchristianaarabella.net
Type: A
DNSdulcibellaarabella.net
Type: A
DNSchristianasullivan.net
Type: A
DNSdulcibellasullivan.net
Type: A
DNSwashingtonmargaret.net
Type: A
DNSearnestinemargaret.net
Type: A
DNSwashingtoncherokee.net
Type: A
DNSearnestinecherokee.net
Type: A
DNSwashingtonarabella.net
Type: A
DNSearnestinearabella.net
Type: A
DNSwashingtonsullivan.net
Type: A
DNSsacheverellmargaret.net
Type: A
DNSwilhelminamargaret.net
Type: A
DNSsacheverellcherokee.net
Type: A
DNSwilhelminacherokee.net
Type: A
DNSsacheverellarabella.net
Type: A
DNSwilhelminaarabella.net
Type: A
DNSsacheverellsullivan.net
Type: A
DNSwilhelminasullivan.net
Type: A
DNSmaximillianmargaret.net
Type: A
DNSgwendolinemargaret.net
Type: A
DNSmaximilliancherokee.net
Type: A
DNSgwendolinecherokee.net
Type: A
DNSmaximillianarabella.net
Type: A
DNSgwendolinearabella.net
Type: A
DNSmaximilliansullivan.net
Type: A
DNSgwendolinesullivan.net
Type: A
DNSbeauregardmargaret.net
Type: A
DNSevangelinamargaret.net
Type: A
DNSbeauregardcherokee.net
Type: A
DNSevangelinacherokee.net
Type: A
DNSbeauregardarabella.net
Type: A
DNSevangelinaarabella.net
Type: A
DNSbeauregardsullivan.net
Type: A
DNSevangelinasullivan.net
Type: A
DNSrichardinemargaret.net
Type: A
DNSevangelinemargaret.net
Type: A
DNSrichardinecherokee.net
Type: A
DNSevangelinecherokee.net
Type: A
DNSrichardinearabella.net
Type: A
DNSevangelinearabella.net
Type: A
DNSrichardinesullivan.net
Type: A
DNSevangelinesullivan.net
Type: A
DNSalexandrinastrudwick.net
Type: A
DNSmariabellastrudwick.net
Type: A
DNSalexandrinaconstable.net
Type: A
DNSmariabellaconstable.net
Type: A
DNSalexandrinadonaldson.net
Type: A
DNSmariabelladonaldson.net
Type: A
DNSalexandrinaharoldson.net
Type: A
DNSmariabellaharoldson.net
Type: A
DNSbartholomewstrudwick.net
Type: A
DNSwilloughbystrudwick.net
Type: A
DNSbartholomewconstable.net
Type: A
DNSwilloughbyconstable.net
Type: A
DNSbartholomewdonaldson.net
Type: A
DNSwilloughbydonaldson.net
Type: A
DNSbartholomewharoldson.net
Type: A
DNSwilloughbyharoldson.net
Type: A
DNSchristianastrudwick.net
Type: A
DNSdulcibellastrudwick.net
Type: A
DNSchristianaconstable.net
Type: A
DNSdulcibellaconstable.net
Type: A
DNSchristianadonaldson.net
Type: A
DNSdulcibelladonaldson.net
Type: A
DNSchristianaharoldson.net
Type: A
DNSdulcibellaharoldson.net
Type: A
DNSwashingtonstrudwick.net
Type: A
DNSearnestinestrudwick.net
Type: A
DNSwashingtonconstable.net
Type: A
DNSearnestineconstable.net
Type: A
DNSwashingtondonaldson.net
Type: A
DNSearnestinedonaldson.net
Type: A
DNSwashingtonharoldson.net
Type: A
DNSearnestineharoldson.net
Type: A
DNSsacheverellstrudwick.net
Type: A
HTTP GEThttp://earnestinesullivan.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 195.22.26.254:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2065   : close..Host: e
0x00000040 (00064)   61726e65 7374696e 6573756c 6c697661   arnestinesulliva
0x00000050 (00080)   6e2e6e65 740d0a0d 0a                  n.net....


Strings