Analysis Date2013-08-06 21:35:21
MD51f01dec0ea06329368b47b68b2c55521
SHA15751457ceca16216e0afe22d4124aa9f13ee24b9

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
SectionCODE md5: affbb41d6bb744f04a843b4f5fa63f73 sha1: c900c968f527b65a6c013684ceced22020a09507 size: 12800
SectionDATA md5: a552beac9fa4aebc64a798aaf58fd67c sha1: fb58e9337b73f35075766dbdf69dfc6a2e642630 size: 155136
SectionBSS md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
Section.idata md5: 31a2f735a6f929a1a24c55a7d9e9b305 sha1: 560f99efc1dffad56fbac33e5f10fd8360dde4b3 size: 1536
Section.edata md5: 9f3d7a9b5ec97a1d99b3ce66fe81043b sha1: 7292e09db00d8d87189e7fb08163e58b8b5ace5b size: 512
Section.reloc md5: 149aa0fffda0d85e266fb335b1b7b164 sha1: 0f7071ac788dcaf9f39bec6eacedc5a75513663f size: 512
Section.rsrc md5: 56f174b5d1390a158dfe739677b01f25 sha1: 629afa59755ba6d1da220b03b1857e21e36ebc25 size: 1024
Timestamp1992-06-19 22:22:17
PEhash4f09a870ac35c6cc0faffbef6b706dc4e84182c0
AVclamavTrojan.Agent-266007
AVmsseTrojanDownloader:Win32/Renos.PG

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\0ESKOMO9JO ➝
C:\malware.exe
RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\\\x03\1601 ➝
NULL
RegistryHKEY_CURRENT_USER\Software\0ESKOMO9JO\OteH ➝
xC7aKZ+O6wyPlq1krRM4sG7m2LFGsYtHjHOagBf10Uk/n4gL8s8xs9LeD5KQVh3/j+XFa0mnr175UElKKyciA2gn6tUEA721Fj4P\\x00
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\WINDOWS\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\malware.exe
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexGlobal\{F5CC5A0A-B9E5-411f-BF7E-EACE3BBC2BF1}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Creates Mutex{A14B1A1D-023F-40dc-BBFE-208B1DAD2F82}
Winsock DNSkiqconsultants.com
Winsock DNSclubhamm.com

Process
↳ C:\malware.exe

Creates Mutex{A14B1A1D-023F-40dc-BBFE-208B1DAD2F82}

Network Details:

DNSwsj.com
Type: A
205.203.140.65
DNSwsj.com
Type: A
205.203.132.1
DNSwsj.com
Type: A
205.203.132.65
DNSwsj.com
Type: A
205.203.140.1
DNSfastclick.com
Type: A
64.156.167.84
DNSnifty.com
Type: A
210.131.4.217
DNSclubhamm.com
Type: A
184.168.221.41
DNSkiqconsultants.com
Type: A
DNSfirstjs.com
Type: A
DNStopkoel.com
Type: A
HTTP POSThttp://clubhamm.com/borders.php
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Flows TCP192.168.1.1:1031 ➝ 184.168.221.41:80

Raw Pcap
0x00000000 (00000)   504f5354 202f626f 72646572 732e7068   POST /borders.ph
0x00000010 (00016)   70204854 54502f31 2e310d0a 41636365   p HTTP/1.1..Acce
0x00000020 (00032)   70743a20 2a2f2a0d 0a436f6e 74656e74   pt: */*..Content
0x00000030 (00048)   2d547970 653a2061 70706c69 63617469   -Type: applicati
0x00000040 (00064)   6f6e2f78 2d777777 2d666f72 6d2d7572   on/x-www-form-ur
0x00000050 (00080)   6c656e63 6f646564 0d0a5573 65722d41   lencoded..User-A
0x00000060 (00096)   67656e74 3a204d6f 7a696c6c 612f342e   gent: Mozilla/4.
0x00000070 (00112)   30202863 6f6d7061 7469626c 653b204d   0 (compatible; M
0x00000080 (00128)   53494520 362e303b 2057696e 646f7773   SIE 6.0; Windows
0x00000090 (00144)   204e5420 352e3029 0d0a486f 73743a20    NT 5.0)..Host: 
0x000000a0 (00160)   636c7562 68616d6d 2e636f6d 0d0a436f   clubhamm.com..Co
0x000000b0 (00176)   6e74656e 742d4c65 6e677468 3a203334   ntent-Length: 34
0x000000c0 (00192)   310d0a43 6f6e6e65 6374696f 6e3a204b   1..Connection: K
0x000000d0 (00208)   6565702d 416c6976 650d0a43 61636865   eep-Alive..Cache
0x000000e0 (00224)   2d436f6e 74726f6c 3a206e6f 2d636163   -Control: no-cac
0x000000f0 (00240)   68650d0a 0d0a6461 74613d2f 436a4566   he....data=/CjEf
0x00000100 (00256)   5a445376 78714369 4b306c34 304d7937   ZDSvxqCiK0l40My7
0x00000110 (00272)   53766a7a 2b456436 746b5a6d 417a3971   Svjz+Ed6tkZmAz9q
0x00000120 (00288)   32546e67 51512f6e 5a6c702f 70427376   2TngQQ/nZlp/pBsv
0x00000130 (00304)   5a436646 37726942 6b472f67 2b375643   ZCfF7riBkG/g+7VC
0x00000140 (00320)   432f3139 6b72694f 48703765 52634850   C/19kriOHp7eRcHP
0x00000150 (00336)   69596f39 39304d55 756a6755 57346276   iYo990MUujgUW4bv
0x00000160 (00352)   5449644e 2f6a5058 7547506a 61427a78   TIdN/jPXuGPjaBzx
0x00000170 (00368)   6c636335 6d704e30 31613674 2f516953   lcc5mpN01a6t/QiS
0x00000180 (00384)   58587770 7a39486d 306b7a39 66426661   XXwpz9Hm0kz9fBfa
0x00000190 (00400)   556e3130 782f474c 636f6652 6948344c   Un10x/GLcofRiH4L
0x000001a0 (00416)   76467341 69475946 7361696f 4d573037   vFsAiGYFsaioMW07
0x000001b0 (00432)   4b304533 726b6b33 4d655a55 79674465   K0E3rkk3MeZUygDe
0x000001c0 (00448)   4c477732 7331322b 6f504d4e 726e4a5a   LGw2s12+oPMNrnJZ
0x000001d0 (00464)   637a687a 5a387869 4e577535 54674f68   czhzZ8xiNWu5TgOh
0x000001e0 (00480)   71344f71 55533042 4d54644b 32625a79   q4OqUS0BMTdK2bZy
0x000001f0 (00496)   2f687833 546e6d47 7954464c 48684c63   /hx3TnmGyTFLHhLc
0x00000200 (00512)   52662b76 417a494f 424e6d76 34334344   Rf+vAzIOBNmv43CD
0x00000210 (00528)   4b325130 35415663 6d413832 4b685466   K2Q05AVcmA82KhTf
0x00000220 (00544)   5573732f 476f6c77 786c6d39 6b4c6e72   Uss/Golwxlm9kLnr
0x00000230 (00560)   6e6c4936 7034366e 3336642f 33346b70   nlI6p46n36d/34kp
0x00000240 (00576)   56563261 6151672f 673d3d              VV2aaQg/g==


Strings