Analysis Date2015-11-05 04:55:53
MD529624e191fc5bb76b1cfeb74f22d2977
SHA154ab6ceace39b4ea6c3b67a6ffff0cd94639439e

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 82ef91f859de38f32fdcb5b9c71a95ac sha1: b0f9431ece522b831c50a3db217315dd6283ed80 size: 1422848
Section.rdata md5: 6c45629f11e96dcb4c5beb9b61f37ea1 sha1: 4ca2c24589b23d12e48bfa46012e0ce4c828c2a1 size: 307712
Section.data md5: 4db8c14e9cd9db0178518275226f2908 sha1: 3a49884a5254a93947fbdef366575227521c0eb4 size: 7680
Section.reloc md5: 4bed5fd3d9c20d149425567969afacf0 sha1: b76678107c9d5b58e3d27eb07e7c95801f9f570b size: 199680
Timestamp2015-05-11 04:22:07
PackerVC8 -> Microsoft Corporation
PEhash88615a0a0299e204bcf8e9d05a5ba9a09c35b139
IMPhashcfc73d88300d7c441ddc7c619be55915
AVCA (E-Trust Ino)No Virus
AVCA (E-Trust Ino)No Virus
AVRising0x593267e3
AVMcafeeTrojan-FGIJ!29624E191FC5
AVAvira (antivir)TR/Crypt.Xpack.309524
AVTwisterNo Virus
AVAd-AwareGen:Variant.Kazy.611782
AVAlwil (avast)Dropper-OJQ [Drp]
AVEset (nod32)Win32/Bayrob.Y
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Bayrob.X!tr
AVBitDefenderGen:Variant.Kazy.611782
AVK7Trojan ( 004c77f41 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort!rfn
AVMicroWorld (escan)Gen:Variant.Kazy.611782
AVMalwareBytesNo Virus
AVAuthentiumW32/SoxGrave.A.gen!Eldorado
AVFrisk (f-prot)No Virus
AVIkarusTrojan.Win32.Bayrob
AVEmsisoftGen:Variant.Kazy.611782
AVZillya!Trojan.Bayrob.Win32.448
AVKasperskyTrojan.Win32.Generic
AVTrend MicroNo Virus
AVCAT (quickheal)No Virus
AVVirusBlokAda (vba32)No Virus
AVPadvishNo Virus
AVBullGuardGen:Variant.Kazy.611782
AVArcabit (arcavir)Gen:Variant.Kazy.611782
AVClamAVNo Virus
AVDr. WebTrojan.Bayrob.5
AVF-SecureGen:Variant.Kazy.611782
AVRising0x593267e3
AVMcafeeTrojan-FGIJ!29624E191FC5
AVAvira (antivir)TR/Crypt.Xpack.309524
AVTwisterNo Virus
AVAd-AwareGen:Variant.Kazy.611782
AVAlwil (avast)Dropper-OJQ [Drp]
AVEset (nod32)Win32/Bayrob.Y
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Bayrob.X!tr
AVBitDefenderGen:Variant.Kazy.611782
AVK7Trojan ( 004c77f41 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort!rfn
AVMicroWorld (escan)Gen:Variant.Kazy.611782
AVMalwareBytesNo Virus
AVAuthentiumW32/SoxGrave.A.gen!Eldorado
AVFrisk (f-prot)No Virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\tzlls81mfaenqxvppyv.exe
Creates FileC:\WINDOWS\system32\mnsjngvay\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\tzlls81mfaenqxvppyv.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\tzlls81mfaenqxvppyv.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Log Smart PC Problem Auto-Discovery Intelligent ➝
C:\WINDOWS\system32\cuatwwmx.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\cuatwwmx.exe
Creates FileC:\WINDOWS\system32\mnsjngvay\lck
Creates FileC:\WINDOWS\system32\mnsjngvay\tst
Creates FileC:\WINDOWS\system32\mnsjngvay\etc
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\cuatwwmx.exe
Creates ServicePanel Time Tools Shell Driver Audio VC - C:\WINDOWS\system32\cuatwwmx.exe

Process
↳ Pid 808

Process
↳ Pid 856

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1116

Process
↳ Pid 1212

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1876

Process
↳ Pid 1160

Process
↳ C:\WINDOWS\system32\cuatwwmx.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\mnsjngvay\run
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\ysxozvfm.exe
Creates FileC:\WINDOWS\system32\mnsjngvay\rng
Creates FileC:\WINDOWS\system32\mnsjngvay\lck
Creates FileC:\WINDOWS\system32\mnsjngvay\tst
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\mnsjngvay\cfg
Creates FileC:\WINDOWS\TEMP\tzlls81ttcen.exe
Creates ProcessC:\WINDOWS\TEMP\tzlls81ttcen.exe -r 30346 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\cuatwwmx.exe"

Process
↳ C:\WINDOWS\system32\cuatwwmx.exe

Creates FileC:\WINDOWS\system32\mnsjngvay\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\cuatwwmx.exe"

Creates FileC:\WINDOWS\system32\mnsjngvay\tst

Process
↳ C:\WINDOWS\TEMP\tzlls81ttcen.exe -r 30346 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSrecordsoldier.net
Type: A
208.91.197.241
DNSfliersurprise.net
Type: A
208.91.197.241
DNShistorybright.net
Type: A
208.91.197.241
DNSchiefsoldier.net
Type: A
208.91.197.241
DNSclasssurprise.net
Type: A
208.91.197.241
DNSthosecontinue.net
Type: A
208.91.197.241
DNSthroughcontain.net
Type: A
208.91.197.241
DNSbelongguard.net
Type: A
208.91.197.241
DNSmaybellinethaddeus.net
Type: A
208.91.197.241
DNSkimberleyshavonne.net
Type: A
208.91.197.241
DNSnaildeep.com
Type: A
74.220.215.218
DNSriddenstorm.net
Type: A
66.147.240.171
DNSdestroystorm.net
Type: A
216.239.138.86
DNSequalfind.net
Type: A
208.100.26.234
DNSwatchfind.net
Type: A
69.172.201.208
DNSwatchwear.net
Type: A
184.168.221.96
DNSfairwear.net
Type: A
208.91.197.27
DNSdreamwear.net
Type: A
185.53.177.8
DNSspothelp.net
Type: A
184.168.221.40
DNSgrouphelp.net
Type: A
193.34.69.203
DNShusbandfound.net
Type: A
DNSleadershort.net
Type: A
DNSeggbraker.com
Type: A
DNSithouneed.com
Type: A
DNStakentold.net
Type: A
DNSgladfind.net
Type: A
DNStakenfind.net
Type: A
DNSgladwear.net
Type: A
DNStakenwear.net
Type: A
DNSgladhurt.net
Type: A
DNStakenhurt.net
Type: A
DNSequaltold.net
Type: A
DNSgrouptold.net
Type: A
DNSgroupfind.net
Type: A
DNSequalwear.net
Type: A
DNSgroupwear.net
Type: A
DNSequalhurt.net
Type: A
DNSgrouphurt.net
Type: A
DNSspoketold.net
Type: A
DNSvisittold.net
Type: A
DNSspokefind.net
Type: A
DNSvisitfind.net
Type: A
DNSspokewear.net
Type: A
DNSvisitwear.net
Type: A
DNSspokehurt.net
Type: A
DNSvisithurt.net
Type: A
DNSwatchtold.net
Type: A
DNSfairtold.net
Type: A
DNSfairfind.net
Type: A
DNSwatchhurt.net
Type: A
DNSfairhurt.net
Type: A
DNSdreamtold.net
Type: A
DNSthistold.net
Type: A
DNSdreamfind.net
Type: A
DNSthisfind.net
Type: A
DNSthiswear.net
Type: A
DNSdreamhurt.net
Type: A
DNSthishurt.net
Type: A
DNSariveslow.net
Type: A
DNSsouthslow.net
Type: A
DNSarivefebruary.net
Type: A
DNSsouthfebruary.net
Type: A
DNSarivehelp.net
Type: A
DNSsouthhelp.net
Type: A
DNSarivenovember.net
Type: A
DNSsouthnovember.net
Type: A
DNSuponslow.net
Type: A
DNSwhichslow.net
Type: A
DNSuponfebruary.net
Type: A
DNSwhichfebruary.net
Type: A
DNSuponhelp.net
Type: A
DNSwhichhelp.net
Type: A
DNSuponnovember.net
Type: A
DNSwhichnovember.net
Type: A
DNSspotslow.net
Type: A
DNSsaltslow.net
Type: A
DNSspotfebruary.net
Type: A
DNSsaltfebruary.net
Type: A
DNSsalthelp.net
Type: A
DNSspotnovember.net
Type: A
DNSsaltnovember.net
Type: A
DNSgladslow.net
Type: A
DNStakenslow.net
Type: A
DNSgladfebruary.net
Type: A
DNStakenfebruary.net
Type: A
DNSgladhelp.net
Type: A
DNStakenhelp.net
Type: A
DNSgladnovember.net
Type: A
DNStakennovember.net
Type: A
DNSequalslow.net
Type: A
DNSgroupslow.net
Type: A
DNSequalfebruary.net
Type: A
DNSgroupfebruary.net
Type: A
DNSequalhelp.net
Type: A
DNSequalnovember.net
Type: A
DNSgroupnovember.net
Type: A
DNSspokeslow.net
Type: A
DNSvisitslow.net
Type: A
DNSspokefebruary.net
Type: A
DNSvisitfebruary.net
Type: A
DNSspokehelp.net
Type: A
DNSvisithelp.net
Type: A
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://equalfind.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://watchfind.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://watchwear.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://fairwear.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://dreamwear.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://spothelp.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://grouphelp.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://equalfind.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://watchfind.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://watchwear.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://fairwear.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://dreamwear.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://spothelp.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
HTTP GEThttp://grouphelp.net/index.php?method=validate&mode=sox&v=050&sox=430a4a01&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1037 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1043 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1046 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1047 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1048 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1049 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1050 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1051 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1052 ➝ 184.168.221.96:80
Flows TCP192.168.1.1:1053 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1054 ➝ 185.53.177.8:80
Flows TCP192.168.1.1:1055 ➝ 184.168.221.40:80
Flows TCP192.168.1.1:1056 ➝ 193.34.69.203:80
Flows TCP192.168.1.1:1057 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1058 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1059 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1060 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1061 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1062 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1063 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1064 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1065 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1066 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1067 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1068 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1069 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1070 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1071 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1072 ➝ 184.168.221.96:80
Flows TCP192.168.1.1:1073 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1074 ➝ 185.53.177.8:80
Flows TCP192.168.1.1:1075 ➝ 184.168.221.40:80
Flows TCP192.168.1.1:1076 ➝ 193.34.69.203:80

Raw Pcap

Strings