Analysis Date2015-11-01 14:33:38
MD5c67c94060549f89eb0443b0e6b36d4fc
SHA13150c7fb976b81a601d79623bc61a65b3e2d0744

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 5a1ca5c8463668cf5e8708cc1392d79c sha1: c307dbaa953371181622e83c224703e1705cedc4 size: 829952
Section.rdata md5: 28d5f33d73f42682f58adc1ed3cbbd33 sha1: b9344029e11352924391cbcee1aa435fadbb61e9 size: 331264
Section.data md5: 21fd477c702c4320ee26ac274d7a28c8 sha1: 95ff9c912a7a1350a2bc2e7ba4aa36700afd3a62 size: 7680
Timestamp2015-04-10 02:45:36
PackerMicrosoft Visual C++ ?.?
PEhash82b4fc8a3a7d64395d84ac1282c8b49429e0909d
IMPhasha7930c8a175836787f36a1266cb2969a
AVDr. WebTrojan.DownLoader17.34118
AVAuthentiumW32/Zusy.X.gen!Eldorado
AVArcabit (arcavir)Gen:Variant.Zusy.133308
AVEmsisoftGen:Variant.Zusy.133308
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BN
AVSymantecDownloader.Upatre!g15
AVEset (nod32)Win32/Kryptik.DDQD
AVPadvishno_virus
AVCA (E-Trust Ino)no_virus
AVFortinetW32/Kryptik.DDQD!tr
AVAvira (antivir)TR/Crypt.ZPACK.196746
AVTrend Microno_virus
AVFrisk (f-prot)no_virus
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVClamAVno_virus
AVF-SecureGen:Variant.Zusy.133308
AVMcafeeno_virus
AVTwisterno_virus
AVGrisoft (avg)Win32/Cryptor
AVBitDefenderGen:Variant.Zusy.133308
AVRisingno_virus
AVIkarusTrojan.Win32.Crypt
AVAd-AwareGen:Variant.Zusy.133308
AVCAT (quickheal)no_virus
AVK7Trojan ( 004cd0081 )
AVVirusBlokAda (vba32)no_virus
AVMicroWorld (escan)Gen:Variant.Zusy.133308
AVKasperskyTrojan.Win32.Generic
AVBullGuardGen:Variant.Zusy.133308
AVMalwareBytesno_virus
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\xs7amg4h1khfxo3xl8tfewf.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\xs7amg4h1khfxo3xl8tfewf.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\xs7amg4h1khfxo3xl8tfewf.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Panel Transfer Class Internet Management ➝
C:\WINDOWS\system32\tejnitjkewnn.exe
Creates FileC:\WINDOWS\system32\tejnitjkewnn.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\etc
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\lck
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\tejnitjkewnn.exe
Creates ServiceSocket Audio Peer iSCSI Print Configuration - C:\WINDOWS\system32\tejnitjkewnn.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1172

Process
↳ C:\WINDOWS\system32\tejnitjkewnn.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\run
Creates FileC:\WINDOWS\TEMP\xs7amg4h1qu5xo3.exe
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\lck
Creates FileC:\WINDOWS\system32\imzsypuyneag.exe
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\rng
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\cfg
Creates ProcessC:\WINDOWS\TEMP\xs7amg4h1qu5xo3.exe -r 52087 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\tejnitjkewnn.exe"

Process
↳ C:\WINDOWS\system32\tejnitjkewnn.exe

Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\tejnitjkewnn.exe"

Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst

Process
↳ C:\WINDOWS\TEMP\xs7amg4h1qu5xo3.exe -r 52087 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSmelbourneit.hotkeysparking.com
Type: A
8.5.1.16
DNSnailthere.net
Type: A
98.139.135.129
DNSgroupgrain.net
Type: A
208.91.197.241
DNSthreeonly.net
Type: A
208.91.197.241
DNSnaildeep.com
Type: A
74.220.215.218
DNShumancolor.net
Type: A
219.94.203.116
DNShaircolor.net
Type: A
185.53.177.30
DNShaironly.net
Type: A
62.116.130.8
DNSmusicfeel.net
Type: A
89.161.255.8
DNSmusichigh.net
Type: A
64.29.151.221
DNSmusiconly.net
Type: A
207.148.248.143
DNSspendhigh.net
Type: A
208.100.26.234
DNSfrontfeel.net
Type: A
195.22.26.253
DNSfrontfeel.net
Type: A
195.22.26.254
DNSfrontfeel.net
Type: A
195.22.26.231
DNSfrontfeel.net
Type: A
195.22.26.252
DNSwishhigh.net
Type: A
69.64.147.242
DNSrockfeel.net
Type: A
211.196.153.94
DNShumanguide.net
Type: A
141.8.226.15
DNShairguide.net
Type: A
69.172.201.208
DNSableread.net
Type: A
DNSfearstate.net
Type: A
DNSlongcold.net
Type: A
DNSfridayloss.net
Type: A
DNSwrongbelow.net
Type: A
DNShilldance.net
Type: A
DNSeggbraker.com
Type: A
DNSithouneed.com
Type: A
DNSrocktell.net
Type: A
DNSwrongdare.net
Type: A
DNSmadedare.net
Type: A
DNSwrongdance.net
Type: A
DNSmadedance.net
Type: A
DNSwrongbody.net
Type: A
DNSmadebody.net
Type: A
DNSwrongtell.net
Type: A
DNSmadetell.net
Type: A
DNShumanfeel.net
Type: A
DNShairfeel.net
Type: A
DNShumanhigh.net
Type: A
DNShairhigh.net
Type: A
DNShumanonly.net
Type: A
DNSyardfeel.net
Type: A
DNSyardhigh.net
Type: A
DNSyardcolor.net
Type: A
DNSmusiccolor.net
Type: A
DNSyardonly.net
Type: A
DNSwentfeel.net
Type: A
DNSspendfeel.net
Type: A
DNSwenthigh.net
Type: A
DNSwentcolor.net
Type: A
DNSspendcolor.net
Type: A
DNSwentonly.net
Type: A
DNSspendonly.net
Type: A
DNSofferfeel.net
Type: A
DNSfronthigh.net
Type: A
DNSofferhigh.net
Type: A
DNSfrontcolor.net
Type: A
DNSoffercolor.net
Type: A
DNSfrontonly.net
Type: A
DNSofferonly.net
Type: A
DNShangfeel.net
Type: A
DNSseptemberfeel.net
Type: A
DNShanghigh.net
Type: A
DNSseptemberhigh.net
Type: A
DNShangcolor.net
Type: A
DNSseptembercolor.net
Type: A
DNShangonly.net
Type: A
DNSseptemberonly.net
Type: A
DNSjoinfeel.net
Type: A
DNSwishfeel.net
Type: A
DNSjoinhigh.net
Type: A
DNSjoincolor.net
Type: A
DNSwishcolor.net
Type: A
DNSjoinonly.net
Type: A
DNSwishonly.net
Type: A
DNSdeadfeel.net
Type: A
DNSdeadhigh.net
Type: A
DNSrockhigh.net
Type: A
DNSdeadcolor.net
Type: A
DNSrockcolor.net
Type: A
DNSdeadonly.net
Type: A
DNSrockonly.net
Type: A
DNSwrongfeel.net
Type: A
DNSmadefeel.net
Type: A
DNSwronghigh.net
Type: A
DNSmadehigh.net
Type: A
DNSwrongcolor.net
Type: A
DNSmadecolor.net
Type: A
DNSwrongonly.net
Type: A
DNSmadeonly.net
Type: A
DNShumanhalf.net
Type: A
DNShairhalf.net
Type: A
DNShumanname.net
Type: A
DNShairname.net
Type: A
DNShumanlate.net
Type: A
DNShairlate.net
Type: A
DNSyardhalf.net
Type: A
DNSmusichalf.net
Type: A
DNSyardname.net
Type: A
DNSmusicname.net
Type: A
HTTP GEThttp://ableread.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://nailthere.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://groupgrain.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://threeonly.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://humancolor.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://haircolor.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://haironly.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://musicfeel.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://musichigh.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://musiconly.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://spendhigh.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://frontfeel.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://wishhigh.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://rockfeel.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://humanguide.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://hairguide.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://ableread.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://nailthere.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://groupgrain.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://threeonly.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://humancolor.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://haircolor.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://haironly.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://musicfeel.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://musichigh.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://musiconly.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://spendhigh.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://frontfeel.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://wishhigh.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://rockfeel.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://humanguide.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
HTTP GEThttp://hairguide.net/index.php?method=validate&mode=sox&v=045&sox=3bb4d404&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 8.5.1.16:80
Flows TCP192.168.1.1:1038 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1042 ➝ 219.94.203.116:80
Flows TCP192.168.1.1:1043 ➝ 185.53.177.30:80
Flows TCP192.168.1.1:1044 ➝ 62.116.130.8:80
Flows TCP192.168.1.1:1045 ➝ 89.161.255.8:80
Flows TCP192.168.1.1:1046 ➝ 64.29.151.221:80
Flows TCP192.168.1.1:1047 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1048 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1049 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1050 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1051 ➝ 211.196.153.94:80
Flows TCP192.168.1.1:1052 ➝ 141.8.226.15:80
Flows TCP192.168.1.1:1053 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1054 ➝ 8.5.1.16:80
Flows TCP192.168.1.1:1055 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1056 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1057 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1058 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1059 ➝ 219.94.203.116:80
Flows TCP192.168.1.1:1060 ➝ 185.53.177.30:80
Flows TCP192.168.1.1:1061 ➝ 62.116.130.8:80
Flows TCP192.168.1.1:1062 ➝ 89.161.255.8:80
Flows TCP192.168.1.1:1063 ➝ 64.29.151.221:80
Flows TCP192.168.1.1:1064 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1065 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1066 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1067 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1068 ➝ 211.196.153.94:80
Flows TCP192.168.1.1:1069 ➝ 141.8.226.15:80
Flows TCP192.168.1.1:1070 ➝ 69.172.201.208:80

Raw Pcap

Strings