Analysis Date2015-11-02 14:55:48
MD56c27b9c78859afb8571b794e8c9787c0
SHA149e9a52a95ab9c797a3825ed1a88aa09ceadd5fc

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 6374cf717b6eb2069ab52b3c179443dd sha1: 332b9fba5e6059aea530d15c0cb17d2125bbdb49 size: 670720
Section.rdata md5: 24b8717cc3b076b1367854dae7d14acc sha1: 78cb5ba770c9402d8359ac54e28b3dbc32e23059 size: 54784
Section.data md5: 69371e2462fab8a97e66134d36440576 sha1: 2836f2a9908dfe92c028b4455e63ba2df007dd79 size: 402944
Timestamp2014-05-09 21:01:08
PackerMicrosoft Visual C++ ?.?
PEhashd7f2e5111b31636d1e269fad23eaae51e2c14abd
IMPhash53996a87c4591f5629dd6640c60d6451
AVAd-AwareGen:Variant.Symmi.22722
AVGrisoft (avg)Crypt5.ICZ
AVCAT (quickheal)no_virus
AVIkarusTrojan.Crypt2
AVAvira (antivir)TR/Crypt.ZPACK.Gen8
AVK7Trojan ( 004cd0081 )
AVClamAVno_virus
AVKasperskyTrojan.Win32.Generic
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVMalwareBytesTrojan.FakePDF
AVDr. WebTrojan.KillFiles.30570
AVMcafeeno_virus
AVBitDefenderGen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.Y
AVEmsisoftGen:Variant.Symmi.22722
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVAlwil (avast)Kryptik-PLS [Trj]
AVPadvishno_virus
AVEset (nod32)Win32/Kryptik.CCLE
AVRisingno_virus
AVBullGuardGen:Variant.Symmi.22722
AVFortinetRiskware/Agent
AVSymantecDownloader.Upatre!g15
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVTrend MicroTSPY_NIVDORT.SMA
AVFrisk (f-prot)no_virus
AVTwisterTrojan.Girtk.BCFJ.cpsn.mg
AVCA (E-Trust Ino)no_virus
AVVirusBlokAda (vba32)no_virus
AVF-SecureGen:Variant.Symmi.22722
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\gfnbbf1kkgxuwjtnskh.exe
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\gfnbbf1kkgxuwjtnskh.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\gfnbbf1kkgxuwjtnskh.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Interactive Connections List Auto ➝
C:\WINDOWS\system32\seathvj.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\etc
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\lck
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst
Creates FileC:\WINDOWS\system32\seathvj.exe
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\seathvj.exe
Creates ServiceAudio Driver DHCP Fax Link-Layer - C:\WINDOWS\system32\seathvj.exe

Process
↳ Pid 804

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1116

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1196

Process
↳ C:\WINDOWS\system32\seathvj.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\run
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\rng
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\cfg
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\lck
Creates FileC:\WINDOWS\system32\vphxcvk.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\TEMP\gfnbbf1pryxu.exe
Creates ProcessWATCHDOGPROC "c:\windows\system32\seathvj.exe"
Creates ProcessC:\WINDOWS\TEMP\gfnbbf1pryxu.exe -r 41200 tcp

Process
↳ C:\WINDOWS\system32\seathvj.exe

Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\seathvj.exe"

Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst

Process
↳ C:\WINDOWS\TEMP\gfnbbf1pryxu.exe -r 41200 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNStablefruit.net
Type: A
52.0.217.44
DNSrockname.net
Type: A
207.195.223.7
DNSrockguide.net
Type: A
65.182.100.15
DNShumanpast.net
Type: A
216.92.44.196
DNShumanfish.net
Type: A
69.195.136.122
DNSmusiclady.net
Type: A
181.224.136.119
DNSfrontfish.net
Type: A
104.28.15.5
DNSfrontfish.net
Type: A
104.28.14.5
DNShangfish.net
Type: A
50.63.202.50
DNSwishfish.net
Type: A
50.63.202.55
DNSdeadwing.net
Type: A
85.25.214.16
DNSdeadlady.net
Type: A
195.22.26.252
DNSdeadlady.net
Type: A
195.22.26.253
DNSdeadlady.net
Type: A
195.22.26.254
DNSdeadlady.net
Type: A
195.22.26.231
DNSrocklady.net
Type: A
64.61.199.44
DNSdeadfish.net
Type: A
69.172.201.208
DNSrockfish.net
Type: A
96.45.83.235
DNSrockfish.net
Type: A
96.45.82.90
DNSrockfish.net
Type: A
96.45.82.194
DNSrockfish.net
Type: A
96.45.83.91
DNSwronglady.net
Type: A
208.100.26.234
DNSmightglossary.net
Type: A
DNSgentlefriend.net
Type: A
DNSglasshealth.net
Type: A
DNSnecessarydress.net
Type: A
DNSrememberpaint.net
Type: A
DNSlittleappear.net
Type: A
DNSthroughcountry.net
Type: A
DNSfrontride.net
Type: A
DNSspendmarry.net
Type: A
DNSuponloud.net
Type: A
DNSwrongthrew.net
Type: A
DNSjinoplasker.com
Type: A
DNSwishlate.net
Type: A
DNSdeadhalf.net
Type: A
DNSrockhalf.net
Type: A
DNSdeadname.net
Type: A
DNSdeadguide.net
Type: A
DNSdeadlate.net
Type: A
DNSrocklate.net
Type: A
DNSwronghalf.net
Type: A
DNSmadehalf.net
Type: A
DNSwrongname.net
Type: A
DNSmadename.net
Type: A
DNSwrongguide.net
Type: A
DNSmadeguide.net
Type: A
DNSwronglate.net
Type: A
DNSmadelate.net
Type: A
DNShumanwing.net
Type: A
DNShairwing.net
Type: A
DNShairpast.net
Type: A
DNShumanlady.net
Type: A
DNShairlady.net
Type: A
DNShairfish.net
Type: A
DNSyardwing.net
Type: A
DNSmusicwing.net
Type: A
DNSyardpast.net
Type: A
DNSmusicpast.net
Type: A
DNSyardlady.net
Type: A
DNSyardfish.net
Type: A
DNSmusicfish.net
Type: A
DNSwentwing.net
Type: A
DNSspendwing.net
Type: A
DNSwentpast.net
Type: A
DNSspendpast.net
Type: A
DNSwentlady.net
Type: A
DNSspendlady.net
Type: A
DNSwentfish.net
Type: A
DNSspendfish.net
Type: A
DNSfrontwing.net
Type: A
DNSofferwing.net
Type: A
DNSfrontpast.net
Type: A
DNSofferpast.net
Type: A
DNSfrontlady.net
Type: A
DNSofferlady.net
Type: A
DNSofferfish.net
Type: A
DNShangwing.net
Type: A
DNSseptemberwing.net
Type: A
DNShangpast.net
Type: A
DNSseptemberpast.net
Type: A
DNShanglady.net
Type: A
DNSseptemberlady.net
Type: A
DNSseptemberfish.net
Type: A
DNSjoinwing.net
Type: A
DNSwishwing.net
Type: A
DNSjoinpast.net
Type: A
DNSwishpast.net
Type: A
DNSjoinlady.net
Type: A
DNSwishlady.net
Type: A
DNSjoinfish.net
Type: A
DNSrockwing.net
Type: A
DNSdeadpast.net
Type: A
DNSrockpast.net
Type: A
DNSwrongwing.net
Type: A
DNSmadewing.net
Type: A
DNSwrongpast.net
Type: A
DNSmadepast.net
Type: A
DNSmadelady.net
Type: A
DNSwrongfish.net
Type: A
DNSmadefish.net
Type: A
DNSarivegrow.net
Type: A
DNSsouthgrow.net
Type: A
DNSarivetear.net
Type: A
DNSsouthtear.net
Type: A
HTTP GEThttp://tablefruit.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rockname.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rockguide.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://humanpast.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://humanfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://musiclady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://frontfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://hangfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://wishfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://deadwing.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://deadlady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rocklady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://deadfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rockfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://wronglady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://tablefruit.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rockname.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rockguide.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://humanpast.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://humanfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://musiclady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://frontfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://hangfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://wishfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://deadwing.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://deadlady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rocklady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://deadfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://rockfish.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
HTTP GEThttp://wronglady.net/index.php?method=validate&mode=sox&v=029&sox=3c18da00
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 52.0.217.44:80
Flows TCP192.168.1.1:1038 ➝ 207.195.223.7:80
Flows TCP192.168.1.1:1039 ➝ 65.182.100.15:80
Flows TCP192.168.1.1:1040 ➝ 216.92.44.196:80
Flows TCP192.168.1.1:1041 ➝ 69.195.136.122:80
Flows TCP192.168.1.1:1042 ➝ 181.224.136.119:80
Flows TCP192.168.1.1:1043 ➝ 104.28.15.5:80
Flows TCP192.168.1.1:1044 ➝ 50.63.202.50:80
Flows TCP192.168.1.1:1045 ➝ 50.63.202.55:80
Flows TCP192.168.1.1:1046 ➝ 85.25.214.16:80
Flows TCP192.168.1.1:1047 ➝ 195.22.26.252:80
Flows TCP192.168.1.1:1048 ➝ 64.61.199.44:80
Flows TCP192.168.1.1:1049 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1050 ➝ 96.45.83.235:80
Flows TCP192.168.1.1:1051 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1052 ➝ 52.0.217.44:80
Flows TCP192.168.1.1:1053 ➝ 207.195.223.7:80
Flows TCP192.168.1.1:1054 ➝ 65.182.100.15:80
Flows TCP192.168.1.1:1055 ➝ 216.92.44.196:80
Flows TCP192.168.1.1:1056 ➝ 69.195.136.122:80
Flows TCP192.168.1.1:1057 ➝ 181.224.136.119:80
Flows TCP192.168.1.1:1058 ➝ 104.28.15.5:80
Flows TCP192.168.1.1:1059 ➝ 50.63.202.50:80
Flows TCP192.168.1.1:1060 ➝ 50.63.202.55:80
Flows TCP192.168.1.1:1061 ➝ 85.25.214.16:80
Flows TCP192.168.1.1:1062 ➝ 195.22.26.252:80
Flows TCP192.168.1.1:1063 ➝ 64.61.199.44:80
Flows TCP192.168.1.1:1064 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1065 ➝ 96.45.83.235:80
Flows TCP192.168.1.1:1066 ➝ 208.100.26.234:80

Raw Pcap

Strings