Analysis Date2015-07-30 01:44:46
MD5240b997d846d15ee953fc9c013c859c9
SHA15253012de2f5d34c0612e769b01cbe22fed231eb

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 1c4607fa33d8d35e605669627401038c sha1: cd6cc94e3008001f5094d7df4a869b6047669550 size: 155136
Section.rdata md5: 135e4252dc61e1f60d44a4092f55a3e7 sha1: b3c27a5db1a2bf0fb153c1f3037b66d399b97404 size: 38400
Section.data md5: 0b5b49fa4d319626c72af6eb97f435df sha1: de46bb150edf8909f24a3ca4da0e52c1b8f31b08 size: 7168
Timestamp2015-03-13 09:11:43
PackerMicrosoft Visual C++ ?.?
PEhash925c3cae40a36486f9b0832e476a971d41b9bcb2
IMPhashe921a65fc9b7860831fbf9ef211d9384
AVRisingno_virus
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Rodecap.1
AVDr. WebTrojan.DownLoader13.13228
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVBullGuardGen:Variant.Rodecap.1
AVPadvishno_virus
AVVirusBlokAda (vba32)Trojan.Scar
AVCAT (quickheal)Trojan.Scar.r3
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Generic
AVZillya!Trojan.Scar.Win32.88823
AVEmsisoftGen:Variant.Rodecap.1
AVIkarusTrojan.Win32.Rodecap
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVMalwareBytesTrojan.Agent
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.Y
AVK7no_virus
AVBitDefenderGen:Variant.Rodecap.1
AVFortinetW32/Rodecap.BJ!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Rodecap.BJ
AVAlwil (avast)Kryptik-PDK [Trj]
AVAd-AwareGen:Variant.Rodecap.1
AVTwisterTrojan.Scar.iyes.fkks
AVAvira (antivir)TR/Spy.ZBot.xbbeoiq
AVMcafeeTrojan-FEVX!240B997D846D

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\wdaokbxl\ze1n3lnvwxxabbkpk.exe
Creates FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates FileC:\wdaokbxl\jlaz3inqs
Deletes FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates ProcessC:\wdaokbxl\ze1n3lnvwxxabbkpk.exe

Process
↳ C:\wdaokbxl\ze1n3lnvwxxabbkpk.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Function BitLocker Base Layer ➝
C:\wdaokbxl\xuwduxf.exe
Creates FileC:\wdaokbxl\fmjnfcsz
Creates FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates FileC:\wdaokbxl\xuwduxf.exe
Creates FileC:\wdaokbxl\jlaz3inqs
Deletes FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates ProcessC:\wdaokbxl\xuwduxf.exe
Creates ServicePerformance Foundation Mapper Web Engine iSCSI - C:\wdaokbxl\xuwduxf.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 796

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1860

Process
↳ Pid 1144

Process
↳ C:\wdaokbxl\xuwduxf.exe

Creates Filepipe\net\NtControlPipe10
Creates FileC:\wdaokbxl\nepprijx
Creates FileC:\wdaokbxl\fmjnfcsz
Creates FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates File\Device\Afd\Endpoint
Creates FileC:\wdaokbxl\jlaz3inqs
Creates FileC:\wdaokbxl\zeqgryuw.exe
Deletes FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates Processej4nc8r9ilpl "c:\wdaokbxl\xuwduxf.exe"

Process
↳ C:\wdaokbxl\xuwduxf.exe

Creates FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates FileC:\wdaokbxl\jlaz3inqs
Deletes FileC:\WINDOWS\wdaokbxl\jlaz3inqs

Process
↳ ej4nc8r9ilpl "c:\wdaokbxl\xuwduxf.exe"

Creates FileC:\WINDOWS\wdaokbxl\jlaz3inqs
Creates FileC:\wdaokbxl\jlaz3inqs
Deletes FileC:\WINDOWS\wdaokbxl\jlaz3inqs

Network Details:

DNSsmokeinside.net
Type: A
50.63.202.34
DNSpartyexplain.net
Type: A
95.211.230.75
DNSpartybright.net
Type: A
50.63.202.44
DNSsummerready.net
Type: A
198.71.232.3
DNSsummerpeople.net
Type: A
65.254.248.141
DNSwaterready.net
Type: A
64.74.223.38
DNSwaterpeople.net
Type: A
66.151.181.49
DNSpartyready.net
Type: A
8.5.1.51
DNSsummerinside.net
Type: A
DNScrowdinside.net
Type: A
DNSthoughtinstead.net
Type: A
DNSwaterinstead.net
Type: A
DNSthoughtexplain.net
Type: A
DNSwaterexplain.net
Type: A
DNSthoughtbright.net
Type: A
DNSwaterbright.net
Type: A
DNSthoughtinside.net
Type: A
DNSwaterinside.net
Type: A
DNSwomaninstead.net
Type: A
DNSsmokeinstead.net
Type: A
DNSwomanexplain.net
Type: A
DNSsmokeexplain.net
Type: A
DNSwomanbright.net
Type: A
DNSsmokebright.net
Type: A
DNSwomaninside.net
Type: A
DNSpartyinstead.net
Type: A
DNSfightinstead.net
Type: A
DNSfightexplain.net
Type: A
DNSfightbright.net
Type: A
DNSpartyinside.net
Type: A
DNSfightinside.net
Type: A
DNSfreshready.net
Type: A
DNSexperienceready.net
Type: A
DNSfreshbrown.net
Type: A
DNSexperiencebrown.net
Type: A
DNSfreshpeople.net
Type: A
DNSexperiencepeople.net
Type: A
DNSfreshdaughter.net
Type: A
DNSexperiencedaughter.net
Type: A
DNSgentlemanready.net
Type: A
DNSalreadyready.net
Type: A
DNSgentlemanbrown.net
Type: A
DNSalreadybrown.net
Type: A
DNSgentlemanpeople.net
Type: A
DNSalreadypeople.net
Type: A
DNSgentlemandaughter.net
Type: A
DNSalreadydaughter.net
Type: A
DNSfollowready.net
Type: A
DNSmemberready.net
Type: A
DNSfollowbrown.net
Type: A
DNSmemberbrown.net
Type: A
DNSfollowpeople.net
Type: A
DNSmemberpeople.net
Type: A
DNSfollowdaughter.net
Type: A
DNSmemberdaughter.net
Type: A
DNSbeginready.net
Type: A
DNSknownready.net
Type: A
DNSbeginbrown.net
Type: A
DNSknownbrown.net
Type: A
DNSbeginpeople.net
Type: A
DNSknownpeople.net
Type: A
DNSbegindaughter.net
Type: A
DNSknowndaughter.net
Type: A
DNScrowdready.net
Type: A
DNSsummerbrown.net
Type: A
DNScrowdbrown.net
Type: A
DNScrowdpeople.net
Type: A
DNSsummerdaughter.net
Type: A
DNScrowddaughter.net
Type: A
DNSthoughtready.net
Type: A
DNSthoughtbrown.net
Type: A
DNSwaterbrown.net
Type: A
DNSthoughtpeople.net
Type: A
DNSthoughtdaughter.net
Type: A
DNSwaterdaughter.net
Type: A
DNSwomanready.net
Type: A
DNSsmokeready.net
Type: A
DNSwomanbrown.net
Type: A
DNSsmokebrown.net
Type: A
DNSwomanpeople.net
Type: A
DNSsmokepeople.net
Type: A
DNSwomandaughter.net
Type: A
DNSsmokedaughter.net
Type: A
DNSfightready.net
Type: A
DNSpartybrown.net
Type: A
HTTP GEThttp://smokeinside.net/index.php?method&len
User-Agent:
HTTP GEThttp://partyexplain.net/index.php?method&len
User-Agent:
HTTP GEThttp://partybright.net/index.php?method&len
User-Agent:
HTTP GEThttp://summerready.net/index.php?method&len
User-Agent:
HTTP GEThttp://summerpeople.net/index.php?method&len
User-Agent:
HTTP GEThttp://waterready.net/index.php?method&len
User-Agent:
HTTP GEThttp://waterpeople.net/index.php?method&len
User-Agent:
HTTP GEThttp://partyready.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 50.63.202.34:80
Flows TCP192.168.1.1:1032 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1033 ➝ 50.63.202.44:80
Flows TCP192.168.1.1:1034 ➝ 198.71.232.3:80
Flows TCP192.168.1.1:1035 ➝ 65.254.248.141:80
Flows TCP192.168.1.1:1036 ➝ 64.74.223.38:80
Flows TCP192.168.1.1:1037 ➝ 66.151.181.49:80
Flows TCP192.168.1.1:1038 ➝ 8.5.1.51:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20736d 6f6b6569   se..Host: smokei
0x00000050 (00080)   6e736964 652e6e65 740d0a0d 0a         nside.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747965   se..Host: partye
0x00000050 (00080)   78706c61 696e2e6e 65740d0a 0d0a       xplain.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747962   se..Host: partyb
0x00000050 (00080)   72696768 742e6e65 740d0a0d 0a0a       right.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207375 6d6d6572   se..Host: summer
0x00000050 (00080)   72656164 792e6e65 740d0a0d 0a0a       ready.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207375 6d6d6572   se..Host: summer
0x00000050 (00080)   70656f70 6c652e6e 65740d0a 0d0a       people.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657272   se..Host: waterr
0x00000050 (00080)   65616479 2e6e6574 0d0a0d0a 0d0a       eady.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657270   se..Host: waterp
0x00000050 (00080)   656f706c 652e6e65 740d0a0d 0a0a       eople.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747972   se..Host: partyr
0x00000050 (00080)   65616479 2e6e6574 0d0a0d0a 0a0a       eady.net......


Strings