Analysis Date2015-10-15 11:43:35
MD582eb279b92296d8daee06edda45acdda
SHA12592a0a3d35c8ec69337611cbc879f771ce16adb

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: bf48f398c357bd9b259bb05ccb484472 sha1: c0502848701b5e731473f5e30ea0994c24723b3f size: 798720
Section.rdata md5: 8c103ed5751201b4b4a5f2e318f4ea16 sha1: 8471b664a0b84f60d223e76d57f11c1d30903a66 size: 59904
Section.data md5: 34bace0ebcdcb46063d45adcbb085e3c sha1: 61ba0234e8535d5b94b3b2ae97204b07f6501d42 size: 411648
Timestamp2015-01-27 09:18:35
PackerMicrosoft Visual C++ ?.?
PEhasha3fee08660d33b1ce8bb8429e90a26c49354bd80
IMPhashfa4deecc6a2c62fd848575b932b8fc72
AVRisingno_virus
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Symmi.22722
AVDr. WebTrojan.KillFiles.23474
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVBullGuardGen:Variant.Symmi.22722
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend MicroTROJ_WONTON.SMJ1
AVKasperskyno_virus
AVZillya!no_virus
AVEmsisoftGen:Variant.Symmi.22722
AVIkarusTrojan.Win32.Crypt
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVMalwareBytesTrojan.FakePDF
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AE
AVK7Trojan ( 004cd0081 )
AVBitDefenderGen:Variant.Symmi.22722
AVFortinetW32/Kryptik.DDQD!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Kryptik.DXVJ
AVAlwil (avast)Kryptik-OOC [Trj]
AVAd-AwareGen:Variant.Symmi.22722
AVTwisterno_virus
AVAvira (antivir)TR/Crypt.ZPACK.Gen8
AVMcafeeno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\cjslhx1ltlidfzygeiqltij.exe
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\cjslhx1ltlidfzygeiqltij.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\cjslhx1ltlidfzygeiqltij.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Application Installer Logs ➝
C:\WINDOWS\system32\mxxqrhwvhr.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\etc
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\tst
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\lck
Creates FileC:\WINDOWS\system32\mxxqrhwvhr.exe
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\mxxqrhwvhr.exe
Creates ServiceProvider Proxy Manager WMI Defragmenter - C:\WINDOWS\system32\mxxqrhwvhr.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1140

Process
↳ C:\WINDOWS\system32\mxxqrhwvhr.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\gypdgrqri.exe
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\rng
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\cfg
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\tst
Creates FileC:\WINDOWS\TEMP\cjslhx1s9didfzy.exe
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\lck
Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\run
Creates File\Device\Afd\Endpoint
Creates ProcessC:\WINDOWS\TEMP\cjslhx1s9didfzy.exe -r 47487 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\mxxqrhwvhr.exe"

Process
↳ C:\WINDOWS\system32\mxxqrhwvhr.exe

Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\mxxqrhwvhr.exe"

Creates FileC:\WINDOWS\system32\klmuxmoiofumcle\tst

Process
↳ C:\WINDOWS\TEMP\cjslhx1s9didfzy.exe -r 47487 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSenemyguess.net
Type: A
208.91.197.241
DNSqueentell.net
Type: A
208.91.197.241
DNSwednesdayhalf.net
Type: A
208.91.197.241
DNSmouthrest.net
Type: A
208.91.197.241
DNSdrivethirteen.net
Type: A
208.91.197.241
DNSfaceboat.net
Type: A
208.91.197.241
DNSmuchhappy.net
Type: A
208.91.197.241
DNSrockhome.net
Type: A
184.168.221.104
DNSrockover.net
Type: A
97.74.182.1
DNSmadehome.net
Type: A
23.236.62.147
DNSdutycloth.net
Type: A
195.22.26.254
DNSdutycloth.net
Type: A
195.22.26.231
DNSdutycloth.net
Type: A
195.22.26.252
DNSdutycloth.net
Type: A
195.22.26.253
DNSheadborn.net
Type: A
208.100.26.234
DNSquickborn.net
Type: A
27.121.64.91
DNSdarkpaid.net
Type: A
217.160.165.207
DNScloudborn.net
Type: A
184.168.221.96
DNSableread.net
Type: A
DNSsoilunder.net
Type: A
DNSsensesound.net
Type: A
DNSjoinover.net
Type: A
DNSwishover.net
Type: A
DNSjoingrain.net
Type: A
DNSwishgrain.net
Type: A
DNSjoingold.net
Type: A
DNSwishgold.net
Type: A
DNSdeadhome.net
Type: A
DNSdeadover.net
Type: A
DNSdeadgrain.net
Type: A
DNSrockgrain.net
Type: A
DNSdeadgold.net
Type: A
DNSrockgold.net
Type: A
DNSwronghome.net
Type: A
DNSwrongover.net
Type: A
DNSmadeover.net
Type: A
DNSwronggrain.net
Type: A
DNSmadegrain.net
Type: A
DNSwronggold.net
Type: A
DNSmadegold.net
Type: A
DNSmilkcloth.net
Type: A
DNStriedcloth.net
Type: A
DNSmilkpaid.net
Type: A
DNStriedpaid.net
Type: A
DNSmilkaugust.net
Type: A
DNStriedaugust.net
Type: A
DNSmilkborn.net
Type: A
DNStriedborn.net
Type: A
DNSwithcloth.net
Type: A
DNSwithpaid.net
Type: A
DNSdutypaid.net
Type: A
DNSwithaugust.net
Type: A
DNSdutyaugust.net
Type: A
DNSwithborn.net
Type: A
DNSdutyborn.net
Type: A
DNSthesecloth.net
Type: A
DNSsightcloth.net
Type: A
DNSthesepaid.net
Type: A
DNSsightpaid.net
Type: A
DNStheseaugust.net
Type: A
DNSsightaugust.net
Type: A
DNStheseborn.net
Type: A
DNSsightborn.net
Type: A
DNScasecloth.net
Type: A
DNSheadcloth.net
Type: A
DNScasepaid.net
Type: A
DNSheadpaid.net
Type: A
DNScaseaugust.net
Type: A
DNSheadaugust.net
Type: A
DNScaseborn.net
Type: A
DNSquickcloth.net
Type: A
DNSthencloth.net
Type: A
DNSquickpaid.net
Type: A
DNSthenpaid.net
Type: A
DNSquickaugust.net
Type: A
DNSthenaugust.net
Type: A
DNSthenborn.net
Type: A
DNSsundaycloth.net
Type: A
DNSmostcloth.net
Type: A
DNSsundaypaid.net
Type: A
DNSmostpaid.net
Type: A
DNSsundayaugust.net
Type: A
DNSmostaugust.net
Type: A
DNSsundayborn.net
Type: A
DNSmostborn.net
Type: A
DNSmeatcloth.net
Type: A
DNSsickcloth.net
Type: A
DNSmeatpaid.net
Type: A
DNSsickpaid.net
Type: A
DNSmeataugust.net
Type: A
DNSsickaugust.net
Type: A
DNSmeatborn.net
Type: A
DNSsickborn.net
Type: A
DNScloudcloth.net
Type: A
DNSdarkcloth.net
Type: A
DNScloudpaid.net
Type: A
DNScloudaugust.net
Type: A
DNSdarkaugust.net
Type: A
HTTP GEThttp://enemyguess.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://queentell.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://wednesdayhalf.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://mouthrest.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://drivethirteen.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://faceboat.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://muchhappy.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://rockhome.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://rockover.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://madehome.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://dutycloth.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://headborn.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://quickborn.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://darkpaid.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://cloudborn.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://enemyguess.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://queentell.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://wednesdayhalf.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://mouthrest.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://drivethirteen.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://faceboat.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://muchhappy.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://rockhome.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://rockover.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://madehome.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://dutycloth.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://headborn.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://quickborn.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://darkpaid.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
HTTP GEThttp://cloudborn.net/index.php?method=validate&mode=sox&v=036&sox=49c9c400&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1043 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 184.168.221.104:80
Flows TCP192.168.1.1:1045 ➝ 97.74.182.1:80
Flows TCP192.168.1.1:1046 ➝ 23.236.62.147:80
Flows TCP192.168.1.1:1047 ➝ 195.22.26.254:80
Flows TCP192.168.1.1:1048 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1049 ➝ 27.121.64.91:80
Flows TCP192.168.1.1:1050 ➝ 217.160.165.207:80
Flows TCP192.168.1.1:1051 ➝ 184.168.221.96:80
Flows TCP192.168.1.1:1052 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1053 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1054 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1055 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1056 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1057 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1058 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1059 ➝ 184.168.221.104:80
Flows TCP192.168.1.1:1060 ➝ 97.74.182.1:80
Flows TCP192.168.1.1:1061 ➝ 23.236.62.147:80
Flows TCP192.168.1.1:1062 ➝ 195.22.26.254:80
Flows TCP192.168.1.1:1063 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1064 ➝ 27.121.64.91:80
Flows TCP192.168.1.1:1065 ➝ 217.160.165.207:80
Flows TCP192.168.1.1:1066 ➝ 184.168.221.96:80

Raw Pcap

Strings