Analysis Date2015-08-26 10:53:35
MD50b03b3e2f78848f718e335eb3ccd3f9d
SHA11c5c8cc7e9f443827654b145f8a571b56a039ddb

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 5ea7e0d22fb122455147f322ed030fc2 sha1: 6ab4d9448556b0da95c2ce7c715d5fe340e303dd size: 647168
Section.rdata md5: 9f9046851d69d694d0fea31c795ee37f sha1: 16bdcff96d7051be40311109d7faa88e372a2f93 size: 91136
Section.data md5: 5ee864bf15148e82641fe342232694a1 sha1: d9417be0cb0a7294943a0a4231b65455dd5be08e size: 7168
Section.reloc md5: 738439dffa722687143fcd9e6a4821cf sha1: 46feffc6616e3be5b4491fa0c5a5c0e543b2d8f4 size: 67072
Timestamp2015-05-08 07:11:03
PackerMicrosoft Visual C++ 8
PEhash87c8a63d74ab8437334deff3915a2736a9824e63
IMPhashe59ae5e3a9621207d91ac933b07e910a
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Kazy.609540
AVDr. WebTrojan.Bayrob.1
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Kazy.609540
AVBullGuardGen:Variant.Kazy.609540
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Scar.jhjq
AVZillya!no_virus
AVEmsisoftGen:Variant.Kazy.609540
AVIkarusTrojan.Win32.Bayrob
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Scar.R.gen!Eldorado
AVMalwareBytesTrojan.Agent.KVTGen
AVMicroWorld (escan)Gen:Variant.Kazy.609540
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AF
AVK7Trojan ( 004c77f41 )
AVBitDefenderGen:Variant.Kazy.609540
AVFortinetW32/Generic.AC.215362
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Bayrob.T
AVAlwil (avast)Trojan-gen:Win32:Trojan-gen
AVAd-AwareGen:Variant.Kazy.609540
AVTwisterno_virus
AVAvira (antivir)TR/Kryptik.qgmpd
AVMcafeeTrojan-FGIJ!0B03B3E2F788
AVRisingTrojan.Win32.Bayrod.a

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\goimplbydqqst\asprwmlhwutk
Creates FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Creates FileC:\goimplbydqqst\f2nf1leer7dhky7s.exe
Deletes FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Creates ProcessC:\goimplbydqqst\f2nf1leer7dhky7s.exe

Process
↳ C:\goimplbydqqst\f2nf1leer7dhky7s.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Profile Windows User-mode Client Background ➝
C:\goimplbydqqst\isosodluox.exe
Creates FileC:\goimplbydqqst\isosodluox.exe
Creates FileC:\goimplbydqqst\yletq1vadg
Creates FilePIPE\lsarpc
Creates FileC:\goimplbydqqst\asprwmlhwutk
Creates FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Deletes FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Creates ProcessC:\goimplbydqqst\isosodluox.exe
Creates ServiceNetworking Redirector BitLocker WWAN - C:\goimplbydqqst\isosodluox.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 808

Process
↳ Pid 856

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1212

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1856

Process
↳ Pid 1156

Process
↳ C:\goimplbydqqst\isosodluox.exe

Creates FileC:\goimplbydqqst\adoqvcpjmwrf.exe
Creates Filepipe\net\NtControlPipe10
Creates FileC:\goimplbydqqst\yletq1vadg
Creates FileC:\goimplbydqqst\j8stmhwxgw
Creates FileC:\goimplbydqqst\asprwmlhwutk
Creates FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Creates File\Device\Afd\Endpoint
Deletes FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Creates Processhznugthmg2ha "c:\goimplbydqqst\isosodluox.exe"

Process
↳ C:\goimplbydqqst\isosodluox.exe

Creates FileC:\goimplbydqqst\asprwmlhwutk
Creates FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Deletes FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk

Process
↳ hznugthmg2ha "c:\goimplbydqqst\isosodluox.exe"

Creates FileC:\goimplbydqqst\asprwmlhwutk
Creates FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk
Deletes FileC:\WINDOWS\goimplbydqqst\asprwmlhwutk

Network Details:

DNSsweetwheat.net
Type: A
74.208.59.94
DNSsweetforest.net
Type: A
157.7.144.5
DNSlaughschool.net
Type: A
184.168.221.69
DNSsimpleschool.net
Type: A
216.250.126.173
DNSmotherschool.net
Type: A
184.168.221.19
DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSprobablywheat.net
Type: A
DNSsweetanger.net
Type: A
DNSprobablyanger.net
Type: A
DNSsweetalways.net
Type: A
DNSprobablyalways.net
Type: A
DNSprobablyforest.net
Type: A
DNSseveralwheat.net
Type: A
DNSmaterialwheat.net
Type: A
DNSseveralanger.net
Type: A
DNSmaterialanger.net
Type: A
DNSseveralalways.net
Type: A
DNSmaterialalways.net
Type: A
DNSseveralforest.net
Type: A
DNSmaterialforest.net
Type: A
DNSseveraschool.net
Type: A
DNSseverawhile.net
Type: A
DNSlaughwhile.net
Type: A
DNSseveraquestion.net
Type: A
DNSlaughquestion.net
Type: A
DNSseveratherefore.net
Type: A
DNSlaughtherefore.net
Type: A
DNSsimplewhile.net
Type: A
DNSmotherwhile.net
Type: A
DNSsimplequestion.net
Type: A
DNSmotherquestion.net
Type: A
DNSsimpletherefore.net
Type: A
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
HTTP GEThttp://sweetwheat.net/index.php
User-Agent:
HTTP GEThttp://sweetforest.net/index.php
User-Agent:
HTTP GEThttp://laughschool.net/index.php
User-Agent:
HTTP GEThttp://simpleschool.net/index.php
User-Agent:
HTTP GEThttp://motherschool.net/index.php
User-Agent:
HTTP GEThttp://mountainschool.net/index.php
User-Agent:
HTTP GEThttp://windowwhile.net/index.php
User-Agent:
HTTP GEThttp://winterschool.net/index.php
User-Agent:
HTTP GEThttp://finishschool.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 74.208.59.94:80
Flows TCP192.168.1.1:1032 ➝ 157.7.144.5:80
Flows TCP192.168.1.1:1033 ➝ 184.168.221.69:80
Flows TCP192.168.1.1:1034 ➝ 216.250.126.173:80
Flows TCP192.168.1.1:1035 ➝ 184.168.221.19:80
Flows TCP192.168.1.1:1036 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1037 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1038 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1039 ➝ 208.73.211.70:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   77656574 77686561 742e6e65 740d0a0d   weetwheat.net...
0x00000050 (00080)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   77656574 666f7265 73742e6e 65740d0a   weetforest.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206c   : close..Host: l
0x00000040 (00064)   61756768 7363686f 6f6c2e6e 65740d0a   aughschool.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   696d706c 65736368 6f6f6c2e 6e65740d   impleschool.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   6f746865 72736368 6f6f6c2e 6e65740d   otherschool.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   6f756e74 61696e73 63686f6f 6c2e6e65   ountainschool.ne
0x00000050 (00080)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   696e646f 77776869 6c652e6e 65740d0a   indowwhile.net..
0x00000050 (00080)   0d0a0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   696e7465 72736368 6f6f6c2e 6e65740d   interschool.net.
0x00000050 (00080)   0a0d0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   696e6973 68736368 6f6f6c2e 6e65740d   inishschool.net.
0x00000050 (00080)   0a0d0a0d 0a                           .....


Strings