Analysis Date2018-04-06 18:53:33
MD5b33247c3f6f4ea0e2eb23aa049795771
SHA124bec91e81c662e22fde9ee1ecbef50cbc42ec15

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 9db2d64a3e7523209714c2ae36106135 sha1: f13b8f625a49bda4190fbd208b3b085abdd56f38 size: 55296
Section.rdata md5: c068a22e892eb34bd9be770be82fc971 sha1: 71bbdacd502c567e7204fd5a33808fb3a5a3c5d8 size: 141824
Section.data md5: c5dcf1c8199a44bd4856056cc6f230ad sha1: d86c30532c965a1046123c5ee3f3c8a133a25ff2 size: 10752
Section.cudata md5: 9bffde4df330788ede4e89930e5559c0 sha1: ac2ffaba8ae0df2d7f99e2d2cf8db593a4ca333d size: 6656
Section.nidata md5: 22122bb83746f2fd05e54ce0bb1d7047 sha1: b133424c0cf76063ac24bd5c632a8f119009e2ae size: 18432
Section.TNK md5: e43ea8eb83e838ddd7663c9219d2d8f3 sha1: bdd8e152a47d4543b013f3005147d4df3d993e5d size: 67072
Section.rsrc md5: c01bbc8e0bd885362596e0f5cd0d56ac sha1: be0b7acb0c8d1cbfdd035576f2eec5e792f21b42 size: 94720
Section.reloc md5: 0348f7fbb8552e319c7b10c72f2ba269 sha1: 28bf641e810c4263d1f551846cd56e7cb37f7828 size: 6656
Timestamp2015-08-16 21:36:08
PackerMicrosoft Visual C++ ?.?
PEhashdcde20d42d86365e9820f1a6e70fbb9ef072cfc2
IMPhashbba65a69e8390eb0f91acb295785926c
AVArcabit (arcavir)Gen:Variant.Symmi.55490
AVAuthentiumW32/Symmi.IWYR-7709
AVGrisoft (avg)Pakes.RAN
AVAvira (antivir)TR/Crypt.Xpack.264241
AVAlwil (avast)Malware-gen
AVAlwil (avast)Win32:Malware-gen
AVAd-AwareGen:Variant.Symmi.55490
AVBitDefenderGen:Variant.Symmi.55490
AVBullGuardGen:Variant.Symmi.55490
AVClamAVNo Virus
AVDr. WebBackDoor.IRC.Bot.3542
AVEmsisoftGen:Variant.Symmi.55490
AVMicroWorld (escan)Gen:Variant.Symmi.55490
AVCA (E-Trust Ino)Gen:Variant.Symmi.55490
AVFortinetW32/Generic.AC.25DB2A!tr
AVFrisk (f-prot)W32/Symmi.CL
AVF-SecureGen:Variant.Symmi.55490
AVIkarusTrojan.Win32.Kovter
AVK7Trojan ( 004c61ee1 )
AVKasperskyTrojan-Downloader.Win32.Upatre.emue
AVMalwareBytesError Scanning File
AVMcafeeGenericR-EGY!B33247C3F6F4
AVMicrosoft Security EssentialsTrojan:Win32/Kovter!rfn
AVNANOTrojan.Win32.Upatre.dvitlj
AVEset (nod32)Win32/Kovter.D
AVPadvishNo Virus
AVCAT (quickheal)Trojan.Generic.B4
AVRisingNo Virus
AV360 SafeNo Virus
AVSUPERAntiSpywareNo Virus
AVSymantecNo Virus
AVTrend MicroNo Virus
AVTwisterW32.Kovter.D.nzae
AVVirusBlokAda (vba32)TrojanDownloader.Upatre
AVWindows DefenderTrojan:Win32/Kovter!rfn
AVZillya!Downloader.Upatre.Win32.50314

Runtime Details:

Screenshot

Process
↳ C:\Windows\System32\lsass.exe

Process
↳ C:\Users\Phil\AppData\Local\Temp\24bec91e81c662e22fde9ee1ecbef50cbc42ec15.exe

Creates FileC:\Windows\Globalization\Sorting\sortdefault.nls
Creates FileC:\
Creates FileC:\Users\Phil\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
Creates FileC:\Users\Phil\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000001.db
Creates FileC:\Users\desktop.ini
Creates FileC:\Users
Creates FileC:\Users\Phil
Creates FileC:\Users\Phil\AppData
Creates FileC:\Users\Phil\AppData\Local
Creates FileC:\Users\Phil\Desktop\desktop.ini
Creates Mutex
Creates Mutex

Process
↳ C:\Windows\System32\mshta.exe

Creates MutexLocal\!PrivacIE!SharedMemory!Mutex
Creates Mutex
Creates FileC:\Windows\Globalization\Sorting\sortdefault.nls
Creates FileC:\Windows\System32\oleaccrc.dll
Creates FileC:\Windows\System32\rsaenh.dll

Network Details:

DNSorigin.activex.microsoft.com.akadns.net
Type: A
138.91.190.85
DNSorigin.activex.microsoft.com.akadns.net
Type: A
168.62.11.28
DNSorigin.activex.microsoft.com.akadns.net
Type: A
138.91.91.131
DNSorigin.activex.microsoft.com.akadns.net
Type: A
138.91.140.7
DNSorigin.activex.microsoft.com.akadns.net
Type: A
138.91.140.7
DNSorigin.activex.microsoft.com.akadns.net
Type: A
138.91.190.85
DNSorigin.activex.microsoft.com.akadns.net
Type: A
168.62.11.28
DNSorigin.activex.microsoft.com.akadns.net
Type: A
138.91.91.131
DNSmicrosoft.com
Type: A
134.170.185.46
DNSmicrosoft.com
Type: A
134.170.188.221
DNSa767.dscms.akamai.net
Type: A
23.3.98.10
DNSa767.dscms.akamai.net
Type: A
23.3.98.41
DNSactivex.microsoft.com
Type: A
DNScodecs.microsoft.com
Type: A
DNSdownload.microsoft.com
Type: A
HTTP POSThttp://activex.microsoft.com/objects/ocget.dll
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
HTTP POSThttp://codecs.microsoft.com/isapi/ocget.dll
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
HTTP GEThttp://microsoft.com/
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
HTTP POSThttp://178.243.104.41/
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
HTTP GEThttp://download.microsoft.com/download/0/8/c/08c19fa4-4c4f-4ffb-9d6c-150906578c9e/NetFx20SP1_x86.exe
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
Flows TCP192.168.1.1:1032 ➝ 138.91.190.85:80
Flows TCP192.168.1.1:1033 ➝ 138.91.140.7:80
Flows TCP192.168.1.1:1034 ➝ 175.41.104.245:80
Flows TCP192.168.1.1:1035 ➝ 187.150.140.104:80
Flows TCP192.168.1.1:1036 ➝ 178.243.104.41:80
Flows TCP192.168.1.1:1037 ➝ 134.170.185.46:80
Flows TCP192.168.1.1:1040 ➝ 75.155.55.253:80
Flows TCP192.168.1.1:1038 ➝ 5.23.199.79:443
Flows TCP192.168.1.1:1041 ➝ 34.245.107.6:80
Flows TCP192.168.1.1:1042 ➝ 77.38.224.195:80
Flows TCP192.168.1.1:1043 ➝ 178.243.104.41:80
Flows TCP192.168.1.1:1045 ➝ 17.6.32.188:80
Flows TCP192.168.1.1:1046 ➝ 198.221.87.49:80
Flows TCP192.168.1.1:1047 ➝ 23.3.98.10:80
Flows TCP192.168.1.1:1048 ➝ 85.139.184.243:8080
Flows TCP192.168.1.1:1049 ➝ 86.171.9.125:80
Flows TCP192.168.1.1:1050 ➝ 26.189.146.176:80
Flows TCP192.168.1.1:1051 ➝ 117.126.196.86:80
Flows TCP192.168.1.1:1052 ➝ 81.103.104.23:80
Flows TCP192.168.1.1:1053 ➝ 219.82.39.190:80
Flows TCP192.168.1.1:1054 ➝ 29.115.109.169:80
Flows TCP192.168.1.1:1055 ➝ 170.195.127.102:80
Flows TCP192.168.1.1:1056 ➝ 50.191.239.220:80
Flows TCP192.168.1.1:1057 ➝ 220.23.169.185:80
Flows TCP192.168.1.1:1058 ➝ 129.133.245.50:80
Flows TCP192.168.1.1:1059 ➝ 60.132.53.2:80
Flows TCP192.168.1.1:1060 ➝ 213.125.234.67:80
Flows TCP192.168.1.1:1062 ➝ 130.77.251.168:80
Flows TCP192.168.1.1:1063 ➝ 206.176.239.29:80
Flows TCP192.168.1.1:1064 ➝ 73.246.147.105:80
Flows TCP192.168.1.1:1065 ➝ 5.15.44.122:8080
Flows TCP192.168.1.1:1066 ➝ 114.160.12.205:443
Flows TCP192.168.1.1:1067 ➝ 94.237.166.209:80
Flows TCP192.168.1.1:1068 ➝ 93.181.145.6:80
Flows TCP192.168.1.1:1069 ➝ 38.60.152.7:8080
Flows TCP192.168.1.1:1070 ➝ 103.181.95.84:80

Raw Pcap
0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   504f5354 202f3365 31363236 34372d63   POST /3e162647-c
0x00000010 (00016)   3364382d 34346333 2d393937 622d3061   3d8-44c3-997b-0a
0x00000020 (00032)   63396135 66363838 33322f20 48545450   c9a5f68832/ HTTP
0x00000030 (00048)   2f312e31 0d0a4361 6368652d 436f6e74   /1.1..Cache-Cont
0x00000040 (00064)   726f6c3a 206e6f2d 63616368 650d0a43   rol: no-cache..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2043 6c6f7365   onnection: Close
0x00000060 (00096)   0d0a5072 61676d61 3a206e6f 2d636163   ..Pragma: no-cac
0x00000070 (00112)   68650d0a 436f6e74 656e742d 54797065   he..Content-Type
0x00000080 (00128)   3a206170 706c6963 6174696f 6e2f736f   : application/so
0x00000090 (00144)   61702b78 6d6c0d0a 55736572 2d416765   ap+xml..User-Age
0x000000a0 (00160)   6e743a20 57534441 50490d0a 436f6e74   nt: WSDAPI..Cont
0x000000b0 (00176)   656e742d 4c656e67 74683a20 3733330d   ent-Length: 733.
0x000000c0 (00192)   0a486f73 743a2031 39322e31 36382e31   .Host: 192.168.1
0x000000d0 (00208)   30302e31 34363a35 3335370d 0a0d0a3c   00.146:5357....<
0x000000e0 (00224)   3f786d6c 20766572 73696f6e 3d22312e   ?xml version="1.
0x000000f0 (00240)   30222065 6e636f64 696e673d 22757466   0" encoding="utf
0x00000100 (00256)   2d38223f 3e3c736f 61703a45 6e76656c   -8"?><soap:Envel
0x00000110 (00272)   6f706520 786d6c6e 733a736f 61703d22   ope xmlns:soap="
0x00000120 (00288)   68747470 3a2f2f77 77772e77 332e6f72   http://www.w3.or
0x00000130 (00304)   672f3230 30332f30 352f736f 61702d65   g/2003/05/soap-e
0x00000140 (00320)   6e76656c 6f706522 20786d6c 6e733a77   nvelope" xmlns:w
0x00000150 (00336)   73613d22 68747470 3a2f2f73 6368656d   sa="http://schem
0x00000160 (00352)   61732e78 6d6c736f 61702e6f 72672f77   as.xmlsoap.org/w
0x00000170 (00368)   732f3230 30342f30 382f6164 64726573   s/2004/08/addres
0x00000180 (00384)   73696e67 2220786d 6c6e733a 6c6d733d   sing" xmlns:lms=
0x00000190 (00400)   22687474 703a2f2f 73636865 6d61732e   "http://schemas.
0x000001a0 (00416)   6d696372 6f736f66 742e636f 6d2f7769   microsoft.com/wi
0x000001b0 (00432)   6e646f77 732f6c6d 732f3230 30372f30   ndows/lms/2007/0
0x000001c0 (00448)   38223e3c 736f6170 3a486561 6465723e   8"><soap:Header>
0x000001d0 (00464)   3c777361 3a546f3e 75726e3a 75756964   <wsa:To>urn:uuid
0x000001e0 (00480)   3a336531 36323634 372d6333 64382d34   :3e162647-c3d8-4
0x000001f0 (00496)   3463332d 39393762 2d306163 39613566   4c3-997b-0ac9a5f
0x00000200 (00512)   36383833 323c2f77 73613a54 6f3e3c77   68832</wsa:To><w
0x00000210 (00528)   73613a41 6374696f 6e3e6874 74703a2f   sa:Action>http:/
0x00000220 (00544)   2f736368 656d6173 2e786d6c 736f6170   /schemas.xmlsoap
0x00000230 (00560)   2e6f7267 2f77732f 32303034 2f30392f   .org/ws/2004/09/
0x00000240 (00576)   7472616e 73666572 2f476574 3c2f7773   transfer/Get</ws
0x00000250 (00592)   613a4163 74696f6e 3e3c7773 613a4d65   a:Action><wsa:Me
0x00000260 (00608)   73736167 6549443e 75726e3a 75756964   ssageID>urn:uuid
0x00000270 (00624)   3a336331 36393938 632d3936 65342d34   :3c16998c-96e4-4
0x00000280 (00640)   3536382d 61636135 2d316638 30343432   568-aca5-1f80442
0x00000290 (00656)   64353030 353c2f77 73613a4d 65737361   d5005</wsa:Messa
0x000002a0 (00672)   67654944 3e3c7773 613a5265 706c7954   geID><wsa:ReplyT
0x000002b0 (00688)   6f3e3c77 73613a41 64647265 73733e68   o><wsa:Address>h
0x000002c0 (00704)   7474703a 2f2f7363 68656d61 732e786d   ttp://schemas.xm
0x000002d0 (00720)   6c736f61 702e6f72 672f7773 2f323030   lsoap.org/ws/200
0x000002e0 (00736)   342f3038 2f616464 72657373 696e672f   4/08/addressing/
0x000002f0 (00752)   726f6c65 2f616e6f 6e796d6f 75733c2f   role/anonymous</
0x00000300 (00768)   7773613a 41646472 6573733e 3c2f7773   wsa:Address></ws
0x00000310 (00784)   613a5265 706c7954 6f3e3c77 73613a46   a:ReplyTo><wsa:F
0x00000320 (00800)   726f6d3e 3c777361 3a416464 72657373   rom><wsa:Address
0x00000330 (00816)   3e75726e 3a757569 643a3061 32306630   >urn:uuid:0a20f0
0x00000340 (00832)   33362d37 3464332d 34393361 2d383337   36-74d3-493a-837
0x00000350 (00848)   322d6433 34383833 66303963 61323c2f   2-d34883f09ca2</
0x00000360 (00864)   7773613a 41646472 6573733e 3c2f7773   wsa:Address></ws
0x00000370 (00880)   613a4672 6f6d3e3c 6c6d733a 4c617267   a:From><lms:Larg
0x00000380 (00896)   654d6574 61646174 61537570 706f7274   eMetadataSupport
0x00000390 (00912)   2f3e3c2f 736f6170 3a486561 6465723e   /></soap:Header>
0x000003a0 (00928)   3c736f61 703a426f 64792f3e 3c2f736f   <soap:Body/></so
0x000003b0 (00944)   61703a45 6e76656c 6f70653e            ap:Envelope>


Strings