Analysis Date2015-07-27 09:48:42
MD525a63248d72da10142dcad86eaa8ac85
SHA14deb4ac688ea7a94de5f12a7cab465b9233f486e

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 83cc96049452c02db9acb0355807d355 sha1: c6f4fb32ace3289f17f69fad7045ad594f5467fe size: 290816
Section.rdata md5: 9b4b6c65bc2d0b01e7d797f2fc7b7174 sha1: 0adf7e818f714238789e2652ab1cfbc8376f1093 size: 41472
Section.data md5: 4831d9096ed0444acde9270d5ac98181 sha1: 15b66480ffcfd32e74a71b57f43a037e68a179da size: 6656
Section.reloc md5: d93ffd6c52b48a73dfcaab8eaf10e3ca sha1: d02d3b0eca99a9482522e14e95ee5b2231deb0b1 size: 24064
Timestamp2015-05-21 03:46:01
PackerMicrosoft Visual C++ ?.?
PEhash8dfe935256ef76fc8f84f4d340bcc7603b0f548d
IMPhash253149b8785aafca42e0239074e68328
AVRisingno_virus
AVMcafeeTrojan-FGIJ!25A63248D72D
AVAvira (antivir)TR/Crypt.ZPACK.98318
AVTwisterno_virus
AVAd-AwareGen:Variant.Diley.1
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVEset (nod32)Win32/Bayrob.Y
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Babrob.Y!tr
AVBitDefenderGen:Variant.Diley.1
AVK7Trojan ( 004c77f41 )
AVMicrosoft Security Essentialsno_virus
AVMicroWorld (escan)Gen:Variant.Diley.1
AVMalwareBytesTrojan.Bayrob.KVTGen
AVAuthentiumW32/Scar.V.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Bayrob
AVEmsisoftGen:Variant.Diley.1
AVZillya!no_virus
AVKasperskyTrojan.Win32.Scar.kknr
AVTrend MicroTROJ_BAYROB.SM0
AVCAT (quickheal)no_virus
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Diley.1
AVArcabit (arcavir)Gen:Variant.Diley.1
AVClamAVno_virus
AVDr. Webno_virus
AVF-SecureGen:Variant.Diley.1
AVCA (E-Trust Ino)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\altlzyvbnwptk\ylvnh1knxgefarbkuhpd.exe
Creates FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates FileC:\altlzyvbnwptk\enhncqqudya
Deletes FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates ProcessC:\altlzyvbnwptk\ylvnh1knxgefarbkuhpd.exe

Process
↳ C:\altlzyvbnwptk\ylvnh1knxgefarbkuhpd.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Portable Shell Connect SPP Function Fax ➝
C:\altlzyvbnwptk\nrvmvjza.exe
Creates FileC:\altlzyvbnwptk\nrvmvjza.exe
Creates FileC:\altlzyvbnwptk\dkndkudj
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates FileC:\altlzyvbnwptk\enhncqqudya
Deletes FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates ProcessC:\altlzyvbnwptk\nrvmvjza.exe
Creates ServiceBus Trap Card Gateway Tracking Group - C:\altlzyvbnwptk\nrvmvjza.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Process
↳ Pid 1860

Process
↳ Pid 1176

Process
↳ C:\altlzyvbnwptk\nrvmvjza.exe

Creates Filepipe\net\NtControlPipe10
Creates FileC:\altlzyvbnwptk\wibzcjgvh.exe
Creates FileC:\altlzyvbnwptk\dkndkudj
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates FileC:\altlzyvbnwptk\vodpa6zj
Creates FileC:\altlzyvbnwptk\enhncqqudya
Deletes FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates Processdntbtcafzuus "c:\altlzyvbnwptk\nrvmvjza.exe"

Process
↳ C:\altlzyvbnwptk\nrvmvjza.exe

Creates FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates FileC:\altlzyvbnwptk\enhncqqudya
Deletes FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya

Process
↳ dntbtcafzuus "c:\altlzyvbnwptk\nrvmvjza.exe"

Creates FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya
Creates FileC:\altlzyvbnwptk\enhncqqudya
Deletes FileC:\WINDOWS\altlzyvbnwptk\enhncqqudya

Network Details:

DNSsweetfancy.net
Type: A
184.168.221.40
DNSsweetfriend.net
Type: A
66.96.147.156
DNSmaterialconsider.net
Type: A
208.91.197.241
DNSsimplesafety.net
Type: A
199.59.82.80
DNSmountainsafety.net
Type: A
184.168.221.12
DNSpossiblesafety.net
Type: A
95.211.230.75
DNSwindowsafety.net
Type: A
184.168.221.55
DNSsweetsmell.net
Type: A
79.125.109.53
DNSsweetsmell.net
Type: A
176.34.234.43
DNSsweetsmell.net
Type: A
46.137.81.225
DNSsweetsmell.net
Type: A
54.75.225.111
DNSsweetsmell.net
Type: A
54.246.118.68
DNSsweetsmell.net
Type: A
54.246.123.138
DNSsubjectlaughter.net
Type: A
DNSwinterfancy.net
Type: A
DNSsubjectfancy.net
Type: A
DNSwinterconsider.net
Type: A
DNSsubjectconsider.net
Type: A
DNSwinterfriend.net
Type: A
DNSsubjectfriend.net
Type: A
DNSfinishlaughter.net
Type: A
DNSleavelaughter.net
Type: A
DNSfinishfancy.net
Type: A
DNSleavefancy.net
Type: A
DNSfinishconsider.net
Type: A
DNSleaveconsider.net
Type: A
DNSfinishfriend.net
Type: A
DNSleavefriend.net
Type: A
DNSsweetlaughter.net
Type: A
DNSprobablylaughter.net
Type: A
DNSprobablyfancy.net
Type: A
DNSsweetconsider.net
Type: A
DNSprobablyconsider.net
Type: A
DNSprobablyfriend.net
Type: A
DNSseverallaughter.net
Type: A
DNSmateriallaughter.net
Type: A
DNSseveralfancy.net
Type: A
DNSmaterialfancy.net
Type: A
DNSseveralconsider.net
Type: A
DNSseveralfriend.net
Type: A
DNSmaterialfriend.net
Type: A
DNSseverasmell.net
Type: A
DNSlaughsmell.net
Type: A
DNSseveraearly.net
Type: A
DNSlaughearly.net
Type: A
DNSseverasafety.net
Type: A
DNSlaughsafety.net
Type: A
DNSseverafuture.net
Type: A
DNSlaughfuture.net
Type: A
DNSsimplesmell.net
Type: A
DNSmothersmell.net
Type: A
DNSsimpleearly.net
Type: A
DNSmotherearly.net
Type: A
DNSmothersafety.net
Type: A
DNSsimplefuture.net
Type: A
DNSmotherfuture.net
Type: A
DNSmountainsmell.net
Type: A
DNSpossiblesmell.net
Type: A
DNSmountainearly.net
Type: A
DNSpossibleearly.net
Type: A
DNSmountainfuture.net
Type: A
DNSpossiblefuture.net
Type: A
DNSperhapssmell.net
Type: A
DNSwindowsmell.net
Type: A
DNSperhapsearly.net
Type: A
DNSwindowearly.net
Type: A
DNSperhapssafety.net
Type: A
DNSperhapsfuture.net
Type: A
DNSwindowfuture.net
Type: A
DNSwintersmell.net
Type: A
DNSsubjectsmell.net
Type: A
DNSwinterearly.net
Type: A
DNSsubjectearly.net
Type: A
DNSwintersafety.net
Type: A
DNSsubjectsafety.net
Type: A
DNSwinterfuture.net
Type: A
DNSsubjectfuture.net
Type: A
DNSfinishsmell.net
Type: A
DNSleavesmell.net
Type: A
DNSfinishearly.net
Type: A
DNSleaveearly.net
Type: A
DNSfinishsafety.net
Type: A
DNSleavesafety.net
Type: A
DNSfinishfuture.net
Type: A
DNSleavefuture.net
Type: A
DNSprobablysmell.net
Type: A
DNSsweetearly.net
Type: A
DNSprobablyearly.net
Type: A
DNSsweetsafety.net
Type: A
DNSprobablysafety.net
Type: A
HTTP GEThttp://sweetfancy.net/index.php
User-Agent:
HTTP GEThttp://sweetfriend.net/index.php
User-Agent:
HTTP GEThttp://materialconsider.net/index.php
User-Agent:
HTTP GEThttp://simplesafety.net/index.php
User-Agent:
HTTP GEThttp://mountainsafety.net/index.php
User-Agent:
HTTP GEThttp://possiblesafety.net/index.php
User-Agent:
HTTP GEThttp://windowsafety.net/index.php
User-Agent:
HTTP GEThttp://sweetsmell.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.40:80
Flows TCP192.168.1.1:1032 ➝ 66.96.147.156:80
Flows TCP192.168.1.1:1033 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1034 ➝ 199.59.82.80:80
Flows TCP192.168.1.1:1035 ➝ 184.168.221.12:80
Flows TCP192.168.1.1:1036 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1037 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1038 ➝ 79.125.109.53:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   77656574 66616e63 792e6e65 740d0a0d   weetfancy.net...
0x00000050 (00080)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   77656574 66726965 6e642e6e 65740d0a   weetfriend.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   61746572 69616c63 6f6e7369 6465722e   aterialconsider.
0x00000050 (00080)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   696d706c 65736166 6574792e 6e65740d   implesafety.net.
0x00000050 (00080)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   6f756e74 61696e73 61666574 792e6e65   ountainsafety.ne
0x00000050 (00080)   740d0a0d 0a0d0a                       t......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   6f737369 626c6573 61666574 792e6e65   ossiblesafety.ne
0x00000050 (00080)   740d0a0d 0a0d0a                       t......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   696e646f 77736166 6574792e 6e65740d   indowsafety.net.
0x00000050 (00080)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   77656574 736d656c 6c2e6e65 740d0a0d   weetsmell.net...
0x00000050 (00080)   0a0d0a0d 0a0d0a                       .......


Strings