Analysis Date2015-08-26 14:21:58
MD55bc26e14b0a2e297a319cb4a19aea44e
SHA14fecda15ad58617cd82c19fc8478265cb1d3da3d

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: d0f76b345edaf524ee638fe99d42ae39 sha1: 40ca57ee196b766c3b18d90210de370c3a9681e5 size: 300032
Section.rdata md5: dd150719616d9ea6ba4c223709898be4 sha1: 6323bed93313b509bbe769b657ac57b773c70d59 size: 35328
Section.data md5: be34a1df0d5aa917046cdb9e6283bc62 sha1: dc9462ed5d001f469546fe9186ec6bb3ddb19d4d size: 94208
Timestamp2014-10-30 09:46:27
PackerMicrosoft Visual C++ ?.?
PEhash38d54d4da8269fe9e329d2f73b45eb6e933111e1
IMPhash0d853946d922df8a7e3a8f8a53d0d1b7
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Symmi.22722
AVDr. WebTrojan.DownLoader15.29687
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVBullGuardGen:Variant.Symmi.22722
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)Trojan.Dynamer.AC3
AVTrend MicroTSPY_NIVDORT.SMB
AVKasperskyTrojan.Win32.Generic
AVZillya!no_virus
AVEmsisoftGen:Variant.Symmi.22722
AVIkarusTrojan.FBAccountLock
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Wonton.B.gen!Eldorado
AVMalwareBytesTrojan.Zbot.WHE
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BD
AVK7Trojan ( 004cb2771 )
AVBitDefenderGen:Variant.Symmi.22722
AVFortinetW32/Agent.VNC!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Agent.VNC
AVAlwil (avast)Downloader-TLD [Trj]
AVAd-AwareGen:Variant.Symmi.22722
AVTwisterTrojan.Agent.VNC.aanx.mg
AVAvira (antivir)BDS/Zegost.Gen4
AVMcafeeTrojan-FEMT!5BC26E14B0A2
AVRising0x58044edb

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Biometric Reporting Application Log Wired Copy ➝
C:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.riz
Creates FileC:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\iwuufonelzmg.exe
Creates File\Device\Afd\Endpoint
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\rxopxfajskeb\nkvjjqchp.exe"

Network Details:

DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSpossibletraining.net
Type: A
50.63.202.54
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
DNSmountainhunger.net
Type: A
DNSpossiblehunger.net
Type: A
DNSmountaintraining.net
Type: A
DNSmountainstorm.net
Type: A
DNSpossiblestorm.net
Type: A
DNSmountainthrown.net
Type: A
DNSpossiblethrown.net
Type: A
DNSperhapshunger.net
Type: A
DNSwindowhunger.net
Type: A
DNSperhapstraining.net
Type: A
DNSwindowtraining.net
Type: A
DNSperhapsstorm.net
Type: A
DNSwindowstorm.net
Type: A
DNSperhapsthrown.net
Type: A
DNSwindowthrown.net
Type: A
DNSwinterhunger.net
Type: A
DNSsubjecthunger.net
Type: A
DNSwintertraining.net
Type: A
DNSsubjecttraining.net
Type: A
HTTP GEThttp://mountainschool.net/index.php?email=candy@vdarts.tw&method=post&len
User-Agent:
HTTP GEThttp://windowwhile.net/index.php?email=candy@vdarts.tw&method=post&len
User-Agent:
HTTP GEThttp://winterschool.net/index.php?email=candy@vdarts.tw&method=post&len
User-Agent:
HTTP GEThttp://finishschool.net/index.php?email=candy@vdarts.tw&method=post&len
User-Agent:
HTTP GEThttp://possibletraining.net/index.php?email=candy@vdarts.tw&method=post&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1032 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1033 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1035 ➝ 50.63.202.54:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d63616e 64794076 64617274   mail=candy@vdart
0x00000020 (00032)   732e7477 266d6574 686f643d 706f7374   s.tw&method=post
0x00000030 (00048)   266c656e 20485454 502f312e 300d0a41   &len HTTP/1.0..A
0x00000040 (00064)   63636570 743a202a 2f2a0d0a 436f6e6e   ccept: */*..Conn
0x00000050 (00080)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000060 (00096)   6f73743a 206d6f75 6e746169 6e736368   ost: mountainsch
0x00000070 (00112)   6f6f6c2e 6e65740d 0a0d0a              ool.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d63616e 64794076 64617274   mail=candy@vdart
0x00000020 (00032)   732e7477 266d6574 686f643d 706f7374   s.tw&method=post
0x00000030 (00048)   266c656e 20485454 502f312e 300d0a41   &len HTTP/1.0..A
0x00000040 (00064)   63636570 743a202a 2f2a0d0a 436f6e6e   ccept: */*..Conn
0x00000050 (00080)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000060 (00096)   6f73743a 2077696e 646f7777 68696c65   ost: windowwhile
0x00000070 (00112)   2e6e6574 0d0a0d0a 0a0d0a              .net.......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d63616e 64794076 64617274   mail=candy@vdart
0x00000020 (00032)   732e7477 266d6574 686f643d 706f7374   s.tw&method=post
0x00000030 (00048)   266c656e 20485454 502f312e 300d0a41   &len HTTP/1.0..A
0x00000040 (00064)   63636570 743a202a 2f2a0d0a 436f6e6e   ccept: */*..Conn
0x00000050 (00080)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000060 (00096)   6f73743a 2077696e 74657273 63686f6f   ost: winterschoo
0x00000070 (00112)   6c2e6e65 740d0a0d 0a0d0a              l.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d63616e 64794076 64617274   mail=candy@vdart
0x00000020 (00032)   732e7477 266d6574 686f643d 706f7374   s.tw&method=post
0x00000030 (00048)   266c656e 20485454 502f312e 300d0a41   &len HTTP/1.0..A
0x00000040 (00064)   63636570 743a202a 2f2a0d0a 436f6e6e   ccept: */*..Conn
0x00000050 (00080)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000060 (00096)   6f73743a 2066696e 69736873 63686f6f   ost: finishschoo
0x00000070 (00112)   6c2e6e65 740d0a0d 0a0d0a              l.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d63616e 64794076 64617274   mail=candy@vdart
0x00000020 (00032)   732e7477 266d6574 686f643d 706f7374   s.tw&method=post
0x00000030 (00048)   266c656e 20485454 502f312e 300d0a41   &len HTTP/1.0..A
0x00000040 (00064)   63636570 743a202a 2f2a0d0a 436f6e6e   ccept: */*..Conn
0x00000050 (00080)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000060 (00096)   6f73743a 20706f73 7369626c 65747261   ost: possibletra
0x00000070 (00112)   696e696e 672e6e65 740d0a0d 0a         ining.net....


Strings