Analysis Date2015-10-13 01:18:48
MD5c5c1a9a77fd20e3516ae1323b4c03f19
SHA13a41a94936d2ed5319142e7d19f2afb1565e0c77

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 591af15af5033b755b7a6a3817c39b58 sha1: 92142ece45985035b80e8b0a3af2b6d4aed48df6 size: 221696
Section.data md5: f85852a66ee2a83181da66c83dd5b59c sha1: a80ef6f1b0d29b5eed2ad8e5382bf24911b35359 size: 20992
Section.rdata md5: 2ce3f754f59ed6f3c2cb71e45a107a9d sha1: bdd88fbda12f5221e90a9adc9634b6c8609ffc0b size: 40448
Section.eh_fram md5: c943c6543d3a5ad72f8c336978cbb338 sha1: 46f7417335e255bb4c0ffe6dbf7ae831d48609a4 size: 40448
Section.bss md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
Section.idata md5: 5b782bf1e129acadb08aedd3091c073f sha1: bd6c3a9963de546361fe8883d30752fdf038298e size: 6656
Section.CRT md5: 8ac116641532fe38d86119d25035c28b sha1: c96e69a9cb1a3c70f1b9e0bb472832d74e7b733d size: 512
Section.tls md5: bb26d9c5aefc6c61ade45477c4a18756 sha1: a12bdb7979d4d623e99c865ceac89938b586550d size: 512
Timestamp2015-03-05 06:19:56
PEhash77372f0b4ff663b75f72209f86d328da21297186
IMPhash42779f90777f63b8babd642e960b2e78
AVVirusBlokAda (vba32)no_virus
AVArcabit (arcavir)Gen:Variant.Symmi.51758
AVF-SecureGen:Variant.Symmi.51758
AVPadvishno_virus
AVDr. WebTrojan.DownLoader16.24800
AVZillya!no_virus
AVTwisterno_virus
AVIkarusTrojan.Win32.Staser
AVEmsisoftGen:Variant.Symmi.51758
AVBitDefenderGen:Variant.Symmi.51758
AVGrisoft (avg)Win32/Cryptor
AVAlwil (avast)Agent-AZPC [Trj]
AVMalwareBytesno_virus
AVEset (nod32)Win32/Agent.XDQ
AVCAT (quickheal)no_virus
AVFortinetW32/Agent.XDQ!tr
AVFrisk (f-prot)no_virus
AVAvira (antivir)TR/ATRAPS.A.8334
AVBullGuardGen:Variant.Symmi.51758
AVKasperskyTrojan.Win32.Scar.lmnu
AVAuthentiumW32/S-6a8c3109!Eldorado
AVK7Trojan ( 004c988e1 )
AVClamAVno_virus
AVCA (E-Trust Ino)no_virus
AVMicroWorld (escan)Gen:Variant.Symmi.51758
AVMcafeeTrojan-FGOJ!C5C1A9A77FD2
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort!rfn
AVRisingno_virus
AVTrend Microno_virus
AVAd-AwareGen:Variant.Symmi.51758
AVSymantecDownloader.Upatre!g16

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\uchylqj\wi1dxbczzasp
Creates FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Creates FileC:\uchylqj\wgszpy1kkwyav6ypr8vzw4.exe
Deletes FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Creates ProcessC:\uchylqj\wgszpy1kkwyav6ypr8vzw4.exe

Process
↳ C:\uchylqj\wgszpy1kkwyav6ypr8vzw4.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Telephony Time Proxy Volume SPP ➝
C:\uchylqj\dksueop6xajh2.exe
Creates FileC:\uchylqj\ltximqu
Creates FileC:\uchylqj\wi1dxbczzasp
Creates FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Creates FileC:\uchylqj\dksueop6xajh2.exe
Creates FilePIPE\lsarpc
Deletes FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Creates ProcessC:\uchylqj\dksueop6xajh2.exe
Creates ServiceRouting Function Files Log - C:\uchylqj\dksueop6xajh2.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1108

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1860

Process
↳ Pid 1132

Process
↳ C:\uchylqj\dksueop6xajh2.exe

Creates FileC:\uchylqj\ltximqu
Creates Filepipe\net\NtControlPipe10
Creates FileC:\uchylqj\begtspv
Creates FileC:\uchylqj\wi1dxbczzasp
Creates FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Creates File\Device\Afd\Endpoint
Creates FileC:\uchylqj\bhsuhvyizmy.exe
Deletes FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Creates Processbpwxqfhxgxxu "c:\uchylqj\dksueop6xajh2.exe"

Process
↳ C:\uchylqj\dksueop6xajh2.exe

Creates FileC:\uchylqj\wi1dxbczzasp
Creates FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Deletes FileC:\WINDOWS\uchylqj\wi1dxbczzasp

Process
↳ bpwxqfhxgxxu "c:\uchylqj\dksueop6xajh2.exe"

Creates FileC:\uchylqj\wi1dxbczzasp
Creates FileC:\WINDOWS\uchylqj\wi1dxbczzasp
Deletes FileC:\WINDOWS\uchylqj\wi1dxbczzasp

Network Details:

DNScatherineanderson.net
Type: A
181.224.147.220
DNScharlotteanastacia.net
Type: A
195.22.26.252
DNScharlotteanastacia.net
Type: A
195.22.26.253
DNScharlotteanastacia.net
Type: A
195.22.26.254
DNScharlotteanastacia.net
Type: A
195.22.26.231
DNScharlotteanderson.net
Type: A
46.30.212.212
DNSkimberleechamberlain.net
Type: A
217.160.165.207
DNScatherinebernadine.net
Type: A
DNScatherinacharisma.net
Type: A
DNScatherinecharisma.net
Type: A
DNScatherinaanastacia.net
Type: A
DNScatherineanastacia.net
Type: A
DNScatherinaanderson.net
Type: A
DNSantonettebernadine.net
Type: A
DNSmadeleinebernadine.net
Type: A
DNSantonettecharisma.net
Type: A
DNSmadeleinecharisma.net
Type: A
DNSantonetteanastacia.net
Type: A
DNSmadeleineanastacia.net
Type: A
DNSantonetteanderson.net
Type: A
DNSmadeleineanderson.net
Type: A
DNScharlottebernadine.net
Type: A
DNSstephaniebernadine.net
Type: A
DNScharlottecharisma.net
Type: A
DNSstephaniecharisma.net
Type: A
DNSstephanieanastacia.net
Type: A
DNSstephanieanderson.net
Type: A
DNSkimberlynbernadine.net
Type: A
DNSglanvillebernadine.net
Type: A
DNSkimberlyncharisma.net
Type: A
DNSglanvillecharisma.net
Type: A
DNSkimberlynanastacia.net
Type: A
DNSglanvilleanastacia.net
Type: A
DNSkimberlynanderson.net
Type: A
DNSglanvilleanderson.net
Type: A
DNSjessaminebernadine.net
Type: A
DNSgenevievebernadine.net
Type: A
DNSjessaminecharisma.net
Type: A
DNSgenevievecharisma.net
Type: A
DNSjessamineanastacia.net
Type: A
DNSgenevieveanastacia.net
Type: A
DNSjessamineanderson.net
Type: A
DNSgenevieveanderson.net
Type: A
DNSzechariahbernadine.net
Type: A
DNSmarmadukebernadine.net
Type: A
DNSzechariahcharisma.net
Type: A
DNSmarmadukecharisma.net
Type: A
DNSzechariahanastacia.net
Type: A
DNSmarmadukeanastacia.net
Type: A
DNSzechariahanderson.net
Type: A
DNSmarmadukeanderson.net
Type: A
DNSkristopherbrassington.net
Type: A
DNScassandrabrassington.net
Type: A
DNSkristopherecclestone.net
Type: A
DNScassandraecclestone.net
Type: A
DNSkristopherchamberlain.net
Type: A
DNScassandrachamberlain.net
Type: A
DNSkristopheranthonyson.net
Type: A
DNScassandraanthonyson.net
Type: A
DNSmaximilianbrassington.net
Type: A
DNSkimberleebrassington.net
Type: A
DNSmaximilianecclestone.net
Type: A
DNSkimberleeecclestone.net
Type: A
DNSmaximilianchamberlain.net
Type: A
DNSmaximiliananthonyson.net
Type: A
DNSkimberleeanthonyson.net
Type: A
DNScatherinabrassington.net
Type: A
DNScatherinebrassington.net
Type: A
DNScatherinaecclestone.net
Type: A
DNScatherineecclestone.net
Type: A
DNScatherinachamberlain.net
Type: A
DNScatherinechamberlain.net
Type: A
DNScatherinaanthonyson.net
Type: A
DNScatherineanthonyson.net
Type: A
DNSantonettebrassington.net
Type: A
DNSmadeleinebrassington.net
Type: A
DNSantonetteecclestone.net
Type: A
DNSmadeleineecclestone.net
Type: A
DNSantonettechamberlain.net
Type: A
DNSmadeleinechamberlain.net
Type: A
DNSantonetteanthonyson.net
Type: A
DNSmadeleineanthonyson.net
Type: A
DNScharlottebrassington.net
Type: A
DNSstephaniebrassington.net
Type: A
DNScharlotteecclestone.net
Type: A
DNSstephanieecclestone.net
Type: A
DNScharlottechamberlain.net
Type: A
DNSstephaniechamberlain.net
Type: A
HTTP GEThttp://catherineanderson.net/index.php
User-Agent:
HTTP GEThttp://charlotteanastacia.net/index.php
User-Agent:
HTTP GEThttp://charlotteanderson.net/index.php
User-Agent:
HTTP GEThttp://kimberleechamberlain.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 181.224.147.220:80
Flows TCP192.168.1.1:1032 ➝ 195.22.26.252:80
Flows TCP192.168.1.1:1033 ➝ 46.30.212.212:80
Flows TCP192.168.1.1:1034 ➝ 217.160.165.207:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   61746865 72696e65 616e6465 72736f6e   atherineanderson
0x00000050 (00080)   2e6e6574 0d0a0d0a                     .net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   6861726c 6f747465 616e6173 74616369   harlotteanastaci
0x00000050 (00080)   612e6e65 740d0a0d 0a                  a.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   6861726c 6f747465 616e6465 72736f6e   harlotteanderson
0x00000050 (00080)   2e6e6574 0d0a0d0a 0a                  .net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206b   : close..Host: k
0x00000040 (00064)   696d6265 726c6565 6368616d 6265726c   imberleechamberl
0x00000050 (00080)   61696e2e 6e65740d 0a0d0a              ain.net....


Strings