Analysis Date2018-02-17 12:15:46
MD5ac7f94b975e8020442597b44fa8aca1b
SHA13014b8e9201feb6149c31113a95718f8c95014c6

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section md5: 7dbfaed74d614cbeb0463d56587e2aed sha1: b5bb58d2f4ccbcb587800e87b6619a35ddf1682c size: 6144
Section.XDATA md5: b78f927901ec31ebf3165c35fb517ea9 sha1: d9f60b636b10bdc10587a93c9067500366e70bf9 size: 10240
Section.RSRC md5: 0f114e334aa802204255863e36375cdb sha1: 2ef8f2bcc2563310ed18a81a3df698635747f3ae size: 34816
Sectionrelac md5: bf619eac0cdf3f68d496ea9344137e8b sha1: 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5 size: 512
Section.dAte1 md5: 53e979547d8c2ea86560ac45de08ae25 sha1: 53ea2cb716f312714685c92b6be27e419f8c746c size: 1536
Section.dAte1 md5: bf619eac0cdf3f68d496ea9344137e8b sha1: 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5 size: 512
Timestamp2008-07-03 01:57:45
PEhash77861dabcf4b4bafb6dcfad273a344bb7e94c19d
IMPhash4911d0cdc9f99f7d9337bbda4511aafa
AVArcabit (arcavir)Trojan.TinbaKD.2399775
AVAuthentiumW32/Upatre.E_a.gen!Eldorado
AVGrisoft (avg)Win32/Cryptor
AVAvira (antivir)TR/Crypt.ZPACK.Gen
AVAlwil (avast)Upatre-I [Trj]
AVAd-AwareTrojan.TinbaKD.2399775
AVBitDefenderTrojan.TinbaKD.2399775
AVBullGuardTrojan.TinbaKD.2399775
AVClamAVNo Virus
AVDr. WebTrojan.Upatre.2594
AVEmsisoftTrojan.TinbaKD.2399775
AVMicroWorld (escan)Trojan.TinbaKD.2399775
AVCA (E-Trust Ino)Trojan.TinbaKD.2399775
AVFortinetW32/Waski.F!tr
AVFrisk (f-prot)W32/Upatre.E_a.gen!Eldorado
AVF-SecureTrojan.TinbaKD.2399775
AVIkarusTrojan-Downloader.Win32.Waski
AVK7Trojan ( 004c21241 )
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesTrojan.MalPack
AVMcafeeUpatre-FACE!AC7F94B975E8
AVMicrosoft Security EssentialsTrojan:Win32/Bagsu!rfn
AVNANOTrojan.Win32.MlwGen.drusle
AVEset (nod32)Win32/Kryptik.DHYA
AVPadvishError Scanning File
AVCAT (quickheal)TrjnDwnlder.Upatre.MUE.BC3
AVRisingTrojan.DL.Win32.Upatre.aak
AV360 SafeNo Virus
AVSUPERAntiSpywareTrojan.Agent/Gen-Upatre
AVSymantecDownloader.Upatre!gen9
AVTrend MicroTROJ_UPATRE.SMJU
AVTwisterNo Virus
AVVirusBlokAda (vba32)BScope.Trojan-Dropper.Inject
AVWindows DefenderTrojan:Win32/Bagsu!rfn
AVZillya!Adware.BetterSurf.Win32.12175

Runtime Details:

Screenshot

Process
↳ C:\Windows\System32\lsass.exe

Process
↳ C:\Users\THX1138\AppData\Local\Temp\3014b8e9201feb6149c31113a95718f8c95014c6.exe

Creates FileC:\Windows\System32\catsrv.dll
Creates FileC:\Users\THX1138\AppData\Local\Temp\3014b8e9201feb6149c31113a95718f8c95014c6.exe

Process
↳ C:\Windows\SysWOW64\winver.exe

Creates MutexDA6665BC
Creates FileC:\Windows\Globalization\Sorting\sortdefault.nls
Creates FileC:\Users\THX1138\AppData\Local\Temp\3014b8e9201feb6149c31113a95718f8c95014c6.exe
Creates FileC:\Users\THX1138\AppData\Roaming\DA6665BC\bin.exe
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\DA6665BC ➝
C:\Users\THX1138\AppData\Roaming\DA6665BC\bin.exe

Network Details:


Raw Pcap
0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .


Strings
1	O{DJ
2Pcmm->e
3^eyaP
5]hooz
64m	<{
6(D)>at
6n!#kN
7=[*joa
$		A4o
a(\Dci )
A@Ns/O
</assembly>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
AtlAxAttachControl
AtlComPtrAssign
atl.dll
~B%0Sb
^BSvT7
CAGetCACertificate
CAGetCAExpiration
CAGetCAFlags
CAGetCAProperty
CAGetCASecurity
CAGetCertTypeExpiration
CAGetCertTypeExtensions
CAGetCertTypeExtensionsEx
CAGetCertTypeFlags
CAGetCertTypeFlagsEx
CAGetCertTypeKeySpec
CAGetCertTypeProperty
CAGetCertTypePropertyEx
CAGetDN
CAInstallDefaultCertType
CAIsCertTypeCurrent
CAOIDAdd
CAOIDCreateNew
CAOIDDelete
[catBR
catsrv.DLL
certcli.dll
cmutil.dll
</compatibility>
<compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">
.dAte1
:dC&$-
DeleteAtom
e}+][=
	EraDY
ExitProcess
^f%c}+d
fJ3z(&
FmtIdToPropStgName
FreePropVariantArray
GetCatalogCRMClerk
GetCommandLineA
GetCommState
GetOEMCP
GetSystemDirectoryA
GetTickCount
Hiwww7Mi
h^Kdy%y
hk%OY%
ia&4O~
IASGetDictionary
iassvcs.dll
I_NetLogonSamLogoff
I_NetLogonSamLogon
I_NetLogonSamLogonEx
I_NetLogonSamLogonWithFlags
I_NetLogonSendToSam
I_NetLogonUasLogoff
I_NetLogonUasLogon
I_NetServerAuthenticate
I_NetServerAuthenticate2
iprop.dll
Jl2H8iM
JlUj,Gu
kernel32.dll
?)$K.IP:
"*LFyb<9`
loadperf.dll
LsExpandSubline
	)}]M.
?\)!Mh
mpr.dll
msls31.dll
msvcrt.dll
nddeapi.dll
NDdeSetTrustedShareW
netapi32.dll
odbc32.dll
O|nPm5
OpenComponentLibraryTS
OQ=P{1
p`+fht
?+Pkhsw
pO{*ixv
PropStgNameToFmtId
PropVariantClear
PropVariantCopy
q8_VlD
REGAPI.dll
RegBuildNumberQuery
RegCdCreateA
RegCdCreateW
RegCdDeleteA
RegCdDeleteW
RegCdEnumerateA
RegCdEnumerateW
RegCdQueryA
RegCdQueryW
RegCloseServer
RegConsoleShadowQueryA
RegConsoleShadowQueryW
RegDefaultUserConfigQueryA
RegDefaultUserConfigQueryW
</requestedExecutionLevel>
<requestedExecutionLevel level="requireAdministrator" uiAccess="false">
</requestedPrivileges>
<requestedPrivileges>
R=qe0U+
</security>
<security>
SetErrorMode
SetFilePointer
?SetReadICSData@CIniW@@QAEXH@Z
?SetRegPath@CIniA@@QAEXPBD@Z
?SetRegPath@CIniW@@QAEXPBG@Z
?SetSection@CIniA@@QAEXPBD@Z
?SetSection@CIniW@@QAEXPBG@Z
SetServiceAsTrustedA
?SetWriteICSData@CIniA@@QAEXH@Z
?SetWriteICSData@CIniW@@QAEXH@Z
SQLCloseCursor
SQLColAttribute
SQLColAttributeA
SQLColAttributes
SQLColAttributesA
SQLColAttributesW
SQLColAttributeW
SQLColumnPrivileges
SQLColumnPrivilegesA
SQLColumnPrivilegesW
SQLGetConnectAttrA
SQLGetConnectAttrW
SQLGetConnectOption
SQLGetConnectOptionA
SQLGetConnectOptionW
, 'sT6
?Start@CmLogFile@@QAEJH@Z
StgCreatePropSetStg
StgCreatePropStg
StgOpenPropStg
?Stop@CmLogFile@@QAEJXZ
!This program cannot be run in DOS mode.
</trustInfo>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
Twww7spHq
?_u|N"
VwwwIi
wk*zJ-
WNetGetUserA
WNetGetUserW
WNetLogonNotify
WNetOpenEnumA
WNetOpenEnumW
WNetPropertyDialogA
WNetPropertyDialogW
?WPPB@CIniA@@QAEXPBD0H@Z
?WPPB@CIniW@@QAEXPBG0H@Z
?WPPI@CIniA@@QAEXPBD0K@Z
?WPPI@CIniW@@QAEXPBG0K@Z
?WPPS@CIniA@@QAEXPBD00@Z
?WPPS@CIniW@@QAEXPBG00@Z
?Write@CmLogFile@@AAEJPAG@Z
wwwwL*
x7HWn9
.XDATA