Analysis Date2015-09-15 18:36:08
MD5c0be77f6e54c6cd931706d8a2331155f
SHA12dc2ed5d61e9e4e6a23ddf6816e9d64a81cbfd58

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 75c12fd8ce974793b52fbe647f31faa6 sha1: 2b01f655caed10e49593b33fe5514cf8f181d8b2 size: 79360
Section.rdata md5: 9801eb08e41d66b346cd2bbd796ae122 sha1: b1507c60edbe7425b415ec0b8dc592db27934cb6 size: 25088
Section.data md5: 55fde0cd90178dff413edd83bf276869 sha1: 9b049d8dbb8f59f1a026064d08e303c92c050b72 size: 6144
Section.san md5: 3f3ff8aa37d4e464ee256784f33a5782 sha1: aced1ac8b4765a1268304bb55c990cadde4d2758 size: 203776
Section.kada md5: 3a24bdd59bf0fec263c90177c30671b0 sha1: bfe6360a948960a732a638e2f274b468a0660407 size: 10240
Section.grd md5: 0a795d2b188f80f3cf50df2aa8bde889 sha1: 143613b18815759131494697611f6a98000167d1 size: 76288
Section.rela md5: 064198b05142a31b72d97813463fcf9d sha1: 28c03d2d1ce4d1ea0170a689631eb832dca4d082 size: 11776
Section.rsrc md5: b940ae479c69d5533392568f1326e22b sha1: 77044d17f35a7bfdf6696f45bbca41b1c41b3cef size: 32256
Section.reloc md5: 232a1e03aa4f96816a272adf696ffc31 sha1: ca9a1bb08c985a8dd932a4dc7e45c6715cdd43c8 size: 11264
Timestamp2015-08-23 12:23:40
Pdb pathZ:\this\animations\analysis\Thoses.pdb
VersionLegalCopyright: Copyright © 2002-2008 Canneverbe Limited
Assembly Version: 4.5.5.5571
InternalName: cdbxpp.exe
FileVersion: 4.5.5.5571
CompanyName: Canneverbe Limited
Comments: An application to burn audio and data discs
ProductName: CDBurnerXP
ProductVersion: 4.5.5.5571
FileDescription: CDBurnerXP
OriginalFilename: cdbxpp.exe
PackerMicrosoft Visual C++ ?.?
PEhash03f139fd6c774214a1a3e7019fab410dfe023782
IMPhash1e547c03995c1562ea9c03288db132b9
AVAd-AwareGen:Variant.Symmi.53786
AVKasperskyTrojan-Downloader.Win32.Upatre.eowf
AVCA (E-Trust Ino)no_virus
AVIkarusTrojan.Win32.Kovter
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVK7Trojan ( 004c61ee1 )
AVFortinetW32/Kovter.D!tr
AVMalwareBytesTrojan.Fileless.DR
AVMicroWorld (escan)Gen:Variant.Symmi.53786
AVBullGuardGen:Variant.Symmi.53786
AVTwisterW32.Kovter.D.qilj
AVF-SecureGen:Variant.Symmi.53786
AVEset (nod32)Win32/Kovter.D
AVSymantecno_virus
AVVirusBlokAda (vba32)no_virus
AVFrisk (f-prot)no_virus
AVClamAVWin.Trojan.Symmi-1432
AVEmsisoftGen:Variant.Symmi.53786
AVAuthentiumW32/S-9611e276!Eldorado
AVGrisoft (avg)Pakes.RCV
AVBitDefenderGen:Variant.Symmi.53786
AVMcafeeGenericR-EIE!C0BE77F6E54C
AVArcabit (arcavir)Gen:Variant.Symmi.53786
AVZillya!Downloader.Upatre.Win32.51352
AVAvira (antivir)TR/Crypt.Xpack.276696
AVPadvishno_virus
AVTrend Microno_virus
AVMicrosoft Security EssentialsTrojan:Win32/Dynamer!ac
AVCAT (quickheal)no_virus
AVDr. WebTrojan.MulDrop6.3201
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates Processregsvr32.exe

Process
↳ regsvr32.exe

Creates Processregsvr32.exe

Process
↳ regsvr32.exe

RegistryHKEY_LOCAL_MACHINE\SOFTWARE\2a89521acd\c984f294 ➝
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\\x00
RegistryHKEY_LOCAL_MACHINE\software\2a89521acd\7bf7927d ➝
869\\x00
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\regsvr32.exe ➝
8888
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
RegistryHKEY_CURRENT_USER\software\2a89521acd\7bf7927d ➝
869\\x00
RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1206 ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1206 ➝
NULL
RegistryHKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\regsvr32.exe ➝
8888
RegistryHKEY_CURRENT_USER\SOFTWARE\2a89521acd\c984f294 ➝
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\\x00
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates File\Device\Afd\AsyncConnectHlp
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Local Settings\Application Data\ynofu\ynofu.exe
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\microsoft[1].htm
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\65.73.210[1].htm
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\microsoft[1].htm
Deletes Filec:\malware.exe
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\65.73.210[1].htm
Creates Process"C:\WINDOWS\system32\regsvr32.exe"
Creates Process"C:\WINDOWS\system32\regsvr32.exe"
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Creates MutexDE7B2F08C5C35678
Creates MutexGlobal\A0B9737978FF60B0
Winsock DNSmicrosoft.com
Winsock DNS65.73.210.4

Process
↳ "C:\WINDOWS\system32\regsvr32.exe"

Creates Mutex5734B585673D7847

Process
↳ "C:\WINDOWS\system32\regsvr32.exe"

RegistryHKEY_LOCAL_MACHINE\SOFTWARE\2a89521acd\c984f294 ➝
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\\x00
RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\EEA8F8BC9A9B7748979\D022759592047A791 ➝
D022759592047A791\\x00
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\F55B5F9F83C67D72\C602C2491D05F9349D ➝
C602C2491D05F9349D\\x00
RegistryHKEY_CURRENT_USER\SOFTWARE\2a89521acd\c984f294 ➝
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\\x00
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\NetFx20SP1_x86.exe
Creates FilePIPE\wkssvc
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates Process"C:\Documents and Settings\Administrator\Local Settings\Temp\NetFx20SP1_x86.exe" /quiet /norestart
Winsock DNSdownload.microsoft.com

Process
↳ "C:\Documents and Settings\Administrator\Local Settings\Temp\NetFx20SP1_x86.exe" /quiet /norestart

Creates FileC:\WINDOWS\SYSTEM32\REDIR.EXE
Creates FileC:\WINDOWS\SYSTEM32\COMMAND.COM
Creates FileC:\WINDOWS\TEMP\scs2.tmp
Creates FileC:\WINDOWS\SYSTEM32\HIMEM.SYS
Creates FileC:\WINDOWS\SYSTEM32\DOSX.EXE
Creates FileC:\WINDOWS\SYSTEM32\MSCDEXNT.EXE
Creates FileC:\WINDOWS\TEMP\scs1.tmp
Creates FileC:\Documents and Settings\Administrator\Local Settings\TEMP\NETFX2~1.EXE
Deletes FileC:\WINDOWS\TEMP\scs1.tmp
Deletes FileC:\WINDOWS\TEMP\scs2.tmp

Network Details:

DNSmicrosoft.com
Type: A
134.170.188.221
DNSmicrosoft.com
Type: A
134.170.185.46
DNSa767.dscms.akamai.net
Type: A
23.3.98.11
DNSa767.dscms.akamai.net
Type: A
23.3.98.41
DNSdownload.microsoft.com
Type: A
HTTP GEThttp://microsoft.com/
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
HTTP POSThttp://65.73.210.4/
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
HTTP GEThttp://download.microsoft.com/download/0/8/c/08c19fa4-4c4f-4ffb-9d6c-150906578c9e/NetFx20SP1_x86.exe
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
Flows TCP192.168.1.1:1031 ➝ 65.73.210.4:80
Flows TCP192.168.1.1:1031 ➝ 65.73.210.4:80
Flows TCP192.168.1.1:1032 ➝ 174.226.6.54:80
Flows TCP192.168.1.1:1033 ➝ 156.171.105.95:80
Flows TCP192.168.1.1:1034 ➝ 134.170.188.221:80
Flows TCP192.168.1.1:1035 ➝ 191.10.233.145:80
Flows TCP192.168.1.1:1036 ➝ 156.160.128.218:80
Flows TCP192.168.1.1:1037 ➝ 65.73.210.4:80
Flows TCP192.168.1.1:1038 ➝ 184.32.107.17:80
Flows TCP192.168.1.1:1039 ➝ 191.90.47.162:80
Flows TCP192.168.1.1:1040 ➝ 50.67.64.3:80
Flows TCP192.168.1.1:1041 ➝ 23.3.98.11:80
Flows TCP192.168.1.1:1042 ➝ 160.8.242.157:80
Flows TCP192.168.1.1:1043 ➝ 149.156.163.100:80
Flows TCP192.168.1.1:1044 ➝ 209.232.36.13:80
Flows TCP192.168.1.1:1045 ➝ 167.111.239.50:80
Flows TCP192.168.1.1:1046 ➝ 112.83.129.103:80
Flows TCP192.168.1.1:1047 ➝ 118.144.63.18:80
Flows TCP192.168.1.1:1048 ➝ 89.19.52.97:80
Flows TCP192.168.1.1:1050 ➝ 23.36.253.94:80
Flows TCP192.168.1.1:1051 ➝ 116.125.109.146:80
Flows TCP192.168.1.1:1052 ➝ 35.228.138.239:80
Flows TCP192.168.1.1:1053 ➝ 205.53.58.49:80

Raw Pcap
0x00000000 (00000)   99                                    .

0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   55736572 2d416765 6e743a20 4d6f7a69   User-Agent: Mozi
0x00000020 (00032)   6c6c612f 342e3020 28636f6d 70617469   lla/4.0 (compati
0x00000030 (00048)   626c653b 204d5349 4520362e 303b2057   ble; MSIE 6.0; W
0x00000040 (00064)   696e646f 7773204e 5420352e 313b2053   indows NT 5.1; S
0x00000050 (00080)   56313b20 2e4e4554 20434c52 20322e30   V1; .NET CLR 2.0
0x00000060 (00096)   2e353037 3237290d 0a486f73 743a206d   .50727)..Host: m
0x00000070 (00112)   6963726f 736f6674 2e636f6d 0d0a4361   icrosoft.com..Ca
0x00000080 (00128)   6368652d 436f6e74 726f6c3a 206e6f2d   che-Control: no-
0x00000090 (00144)   63616368 650d0a0d 0a362341 43         cache....6#AC

0x00000000 (00000)   c8                                    .

0x00000000 (00000)   bb                                    .

0x00000000 (00000)   504f5354 202f2048 5454502f 312e310d   POST / HTTP/1.1.
0x00000010 (00016)   0a436f6e 74656e74 2d547970 653a2061   .Content-Type: a
0x00000020 (00032)   70706c69 63617469 6f6e2f78 2d777777   pplication/x-www
0x00000030 (00048)   2d666f72 6d2d7572 6c656e63 6f646564   -form-urlencoded
0x00000040 (00064)   0d0a5573 65722d41 67656e74 3a204d6f   ..User-Agent: Mo
0x00000050 (00080)   7a696c6c 612f342e 30202863 6f6d7061   zilla/4.0 (compa
0x00000060 (00096)   7469626c 653b204d 53494520 362e303b   tible; MSIE 6.0;
0x00000070 (00112)   2057696e 646f7773 204e5420 352e313b    Windows NT 5.1;
0x00000080 (00128)   20535631 3b202e4e 45542043 4c522032    SV1; .NET CLR 2
0x00000090 (00144)   2e302e35 30373237 290d0a48 6f73743a   .0.50727)..Host:
0x000000a0 (00160)   2036352e 37332e32 31302e34 0d0a436f    65.73.210.4..Co
0x000000b0 (00176)   6e74656e 742d4c65 6e677468 3a203339   ntent-Length: 39
0x000000c0 (00192)   360d0a43 61636865 2d436f6e 74726f6c   6..Cache-Control
0x000000d0 (00208)   3a206e6f 2d636163 68650d0a 0d0a6357   : no-cache....cW
0x000000e0 (00224)   73536935 46725762 6b783337 44677438   sSi5FrWbkx37Dgt8
0x000000f0 (00240)   54494971 6c474469 392f5754 43726246   TIIqlGDi9/WTCrbF
0x00000100 (00256)   6d656f47 2b515a37 6d475372 53565469   meoG+QZ7mGSrSVTi
0x00000110 (00272)   58574557 49724741 50464647 50654434   XWEWIrGAPFFGPeD4
0x00000120 (00288)   48343554 45752f50 7363684e 75684139   H45TEu/PschNuhA9
0x00000130 (00304)   45726875 61417138 567a5178 364d3944   ErhuaAq8VzQx6M9D
0x00000140 (00320)   65497152 32536b33 35343271 74783268   eIqR2Sk3542qtx2h
0x00000150 (00336)   6a535333 796b4452 75514633 48383452   jSS3ykDRuQF3H84R
0x00000160 (00352)   6b4e4a5a 4a4c6a66 58336b48 4b377368   kNJZJLjfX3kHK7sh
0x00000170 (00368)   74336445 50793663 472b4a74 32757a49   t3dEPy6cG+Jt2uzI
0x00000180 (00384)   4c466d74 6370704a 4d74764c 76443641   LFmtcppJMtvLvD6A
0x00000190 (00400)   444c6c38 51487555 46626a4d 41307637   DLl8QHuUFbjMA0v7
0x000001a0 (00416)   4f747a77 6f565042 46424d63 5a595144   OtzwoVPBFBMcZYQD
0x000001b0 (00432)   68485833 61676633 79387766 71625036   hHX3agf3y8wfqbP6
0x000001c0 (00448)   5152696c 6c69596c 31395378 5151326a   QRilliYl19SxQQ2j
0x000001d0 (00464)   596a744a 79364939 6b645253 6751555a   YjtJy6I9kdRSgQUZ
0x000001e0 (00480)   67795834 496c636c 51385767 4c72557a   gyX4IlclQ8WgLrUz
0x000001f0 (00496)   58673447 66566a5a 68737131 78796a68   Xg4GfVjZhsq1xyjh
0x00000200 (00512)   764c3478 452b4142 74703268 76592f6f   vL4xE+ABtp2hvY/o
0x00000210 (00528)   565a2b43 4f734169 4d625234 34537767   VZ+COsAiMbR44Swg
0x00000220 (00544)   37514d5a 5278626c 32433439 3075324b   7QMZRxbl2C490u2K
0x00000230 (00560)   496f7852 4d303357 48446675 5a453149   IoxRM03WHDfuZE1I
0x00000240 (00576)   4c415154 52696545 3152392f 352b7633   LAQTRieE1R9/5+v3
0x00000250 (00592)   4f2f4355 45347357 43776e66 6f765965   O/CUE4sWCwnfovYe
0x00000260 (00608)   396b5235 58426d63 6467                9kR5XBmcdg

0x00000000 (00000)   ac                                    .

0x00000000 (00000)   aa                                    .

0x00000000 (00000)   71                                    q

0x00000000 (00000)   47455420 2f646f77 6e6c6f61 642f302f   GET /download/0/
0x00000010 (00016)   382f632f 30386331 39666134 2d346334   8/c/08c19fa4-4c4
0x00000020 (00032)   662d3466 66622d39 6436632d 31353039   f-4ffb-9d6c-1509
0x00000030 (00048)   30363537 38633965 2f4e6574 46783230   06578c9e/NetFx20
0x00000040 (00064)   5350315f 7838362e 65786520 48545450   SP1_x86.exe HTTP
0x00000050 (00080)   2f312e31 0d0a5573 65722d41 67656e74   /1.1..User-Agent
0x00000060 (00096)   3a204d6f 7a696c6c 612f342e 30202863   : Mozilla/4.0 (c
0x00000070 (00112)   6f6d7061 7469626c 653b204d 53494520   ompatible; MSIE 
0x00000080 (00128)   362e303b 2057696e 646f7773 204e5420   6.0; Windows NT 
0x00000090 (00144)   352e313b 20535631 3b202e4e 45542043   5.1; SV1; .NET C
0x000000a0 (00160)   4c522032 2e302e35 30373237 290d0a48   LR 2.0.50727)..H
0x000000b0 (00176)   6f73743a 20646f77 6e6c6f61 642e6d69   ost: download.mi
0x000000c0 (00192)   63726f73 6f66742e 636f6d0d 0a436163   crosoft.com..Cac
0x000000d0 (00208)   68652d43 6f6e7472 6f6c3a20 6e6f2d63   he-Control: no-c
0x000000e0 (00224)   61636865 0d0a0d0a 6b783337 44677438   ache....kx37Dgt8
0x000000f0 (00240)   54494971 6c474469 392f5754 43726246   TIIqlGDi9/WTCrbF
0x00000100 (00256)   6d656f47 2b515a37 6d475372 53565469   meoG+QZ7mGSrSVTi
0x00000110 (00272)   58574557 49724741 50464647 50654434   XWEWIrGAPFFGPeD4
0x00000120 (00288)   48343554 45752f50 7363684e 75684139   H45TEu/PschNuhA9
0x00000130 (00304)   45726875 61417138 567a5178 364d3944   ErhuaAq8VzQx6M9D
0x00000140 (00320)   65497152 32536b33 35343271 74783268   eIqR2Sk3542qtx2h
0x00000150 (00336)   6a535333 796b4452 75514633 48383452   jSS3ykDRuQF3H84R
0x00000160 (00352)   6b4e4a5a 4a4c6a66 58336b48 4b377368   kNJZJLjfX3kHK7sh
0x00000170 (00368)   74336445 50793663 472b4a74 32757a49   t3dEPy6cG+Jt2uzI
0x00000180 (00384)   4c466d74 6370704a 4d74764c 76443641   LFmtcppJMtvLvD6A
0x00000190 (00400)   444c6c38 51487555 46626a4d 41307637   DLl8QHuUFbjMA0v7
0x000001a0 (00416)   4f747a77 6f565042 46424d63 5a595144   OtzwoVPBFBMcZYQD
0x000001b0 (00432)   68485833 61676633 79387766 71625036   hHX3agf3y8wfqbP6
0x000001c0 (00448)   5152696c 6c69596c 31395378 5151326a   QRilliYl19SxQQ2j
0x000001d0 (00464)   596a744a 79364939 6b645253 6751555a   YjtJy6I9kdRSgQUZ
0x000001e0 (00480)   67795834 496c636c 51385767 4c72557a   gyX4IlclQ8WgLrUz
0x000001f0 (00496)   58673447 66566a5a 68737131 78796a68   Xg4GfVjZhsq1xyjh
0x00000200 (00512)   764c3478 452b4142 74703268 76592f6f   vL4xE+ABtp2hvY/o
0x00000210 (00528)   565a2b43 4f734169 4d625234 34537767   VZ+COsAiMbR44Swg
0x00000220 (00544)   37514d5a 5278626c 32433439 3075324b   7QMZRxbl2C490u2K
0x00000230 (00560)   496f7852 4d303357 48446675 5a453149   IoxRM03WHDfuZE1I
0x00000240 (00576)   4c415154 52696545 3152392f 352b7633   LAQTRieE1R9/5+v3
0x00000250 (00592)   4f2f4355 45347357 43776e66 6f765965   O/CUE4sWCwnfovYe
0x00000260 (00608)   396b5235 58426d63 6467                9kR5XBmcdg

0x00000000 (00000)   98                                    .

0x00000000 (00000)   ba                                    .

0x00000000 (00000)   6b                                    k

0x00000000 (00000)   56                                    V

0x00000000 (00000)   bb                                    .

0x00000000 (00000)   54                                    T

0x00000000 (00000)   b0                                    .

0x00000000 (00000)   77                                    w

0x00000000 (00000)   37                                    7

0x00000000 (00000)   43                                    C

0x00000000 (00000)   5c                                    \

0x00000000 (00000)   b7                                    .

0x00000000 (00000)   c4                                    .


Strings