Analysis Date2014-02-12 04:41:35
MD517cad7211355a7f1e998010d7cb24ae2
SHA15d637d1d60933134a13b44616bcaf8af74e1b303

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
SectionCODE md5: cca13871171ec08597b473f1f67a2156 sha1: 742996b7b66babef1396a12f46e2db39506fc081 size: 14336
SectionDATA md5: b435dfaa64a9b57d4450b367daefc511 sha1: 39a03ede79c7fdb5bfe4bc92d34ae754a4fc095d size: 153088
SectionBSS md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
Section.idata md5: bd55d93f0c5bd43cab49ee2f58e37408 sha1: 097489567bda2afeb56d0fdd57f2bcc9ae8969aa size: 1536
Section.edata md5: e0816cbd57998a82650de47342f1a272 sha1: c360779c25bac9ed445db293199954ff092d1bc5 size: 512
Section.reloc md5: 7013bcc4e43b8bb4cee6e2519c8a3d69 sha1: 1a1be53c734b295db68ba2138c4640260b34b384 size: 512
Section.rsrc md5: 0d1daf4560ebac7fcfa7491febaf2c10 sha1: b8a829312a172c23a1624e85039eb2bfe6d13773 size: 1024
Timestamp1992-06-19 22:22:17
PEhash7235bc926040c1fe9584bc35bfbf2dd546fbc358
IMPhash5c4ba5fa149cfa36f14e367f789afddd
AVavgFakeAV.NPR
AVclamavWin.Trojan.Fakeav-12101
AVaviraTR/Crypt.XPACK.Gen2
AVmsseTrojanDownloader:Win32/Renos.PG
AVmcafeeDownloader-CEW.bd

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates ProcessC:\malware.exe
Creates MutexGlobal\{F5CC5A0A-B9E5-411f-BF7E-EACE3BBC2BF1}
Creates Mutex{A14B1A1D-023F-40dc-BBFE-208B1DAD2F82}

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\D1T2EUR7FZ ➝
C:\malware.exe
RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\D1T2EUR7FZ\OteH ➝
xC7aKZ+O6wyPlq1krRM4sG7m2LFGsYtHjHOagBf10Uk/n4gL8s8xs9LeD5KQVh3/j+XFa0mnr175UElKKyciA2gn6tUEA721Fj4P\\x00
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\\\x03\1601 ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\WINDOWS\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexGlobal\{F5CC5A0A-B9E5-411f-BF7E-EACE3BBC2BF1}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Creates Mutex{A14B1A1D-023F-40dc-BBFE-208B1DAD2F82}
Winsock DNSkiqconsultants.com
Winsock DNSclubhamm.com

Network Details:

DNSjoomla.org
Type: A
72.249.159.57
DNScsdn.net
Type: A
117.79.157.225
DNStechcrunch.com
Type: A
76.74.255.123
DNStechcrunch.com
Type: A
192.0.83.250
DNStechcrunch.com
Type: A
192.0.82.250
DNStechcrunch.com
Type: A
76.74.255.117
DNStechcrunch.com
Type: A
66.155.9.244
DNStechcrunch.com
Type: A
66.155.11.244
DNSclubhamm.com
Type: A
50.63.202.87
DNSkiqconsultants.com
Type: A
DNSfirstjs.com
Type: A
DNStopkoel.com
Type: A
HTTP POSThttp://clubhamm.com/borders.php
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Flows TCP192.168.1.1:1031 ➝ 50.63.202.87:80

Raw Pcap
0x00000000 (00000)   504f5354 202f626f 72646572 732e7068   POST /borders.ph
0x00000010 (00016)   70204854 54502f31 2e310d0a 41636365   p HTTP/1.1..Acce
0x00000020 (00032)   70743a20 2a2f2a0d 0a436f6e 74656e74   pt: */*..Content
0x00000030 (00048)   2d547970 653a2061 70706c69 63617469   -Type: applicati
0x00000040 (00064)   6f6e2f78 2d777777 2d666f72 6d2d7572   on/x-www-form-ur
0x00000050 (00080)   6c656e63 6f646564 0d0a5573 65722d41   lencoded..User-A
0x00000060 (00096)   67656e74 3a204d6f 7a696c6c 612f342e   gent: Mozilla/4.
0x00000070 (00112)   30202863 6f6d7061 7469626c 653b204d   0 (compatible; M
0x00000080 (00128)   53494520 362e303b 2057696e 646f7773   SIE 6.0; Windows
0x00000090 (00144)   204e5420 352e3029 0d0a486f 73743a20    NT 5.0)..Host: 
0x000000a0 (00160)   636c7562 68616d6d 2e636f6d 0d0a436f   clubhamm.com..Co
0x000000b0 (00176)   6e74656e 742d4c65 6e677468 3a203334   ntent-Length: 34
0x000000c0 (00192)   310d0a43 6f6e6e65 6374696f 6e3a204b   1..Connection: K
0x000000d0 (00208)   6565702d 416c6976 650d0a43 61636865   eep-Alive..Cache
0x000000e0 (00224)   2d436f6e 74726f6c 3a206e6f 2d636163   -Control: no-cac
0x000000f0 (00240)   68650d0a 0d0a6461 74613d2f 436a4566   he....data=/CjEf
0x00000100 (00256)   5a445376 78714369 4b306c74 554d3175   ZDSvxqCiK0ltUM1u
0x00000110 (00272)   79322f79 75345535 59704e6d 31762f2f   y2/yu4U5YpNm1v//
0x00000120 (00288)   6a546e67 56632b77 4d732b2b 5a426a37   jTngVc+wMs++ZBj7
0x00000130 (00304)   5a535954 72336942 6b472f67 2b375643   ZSYTr3iBkG/g+7VC
0x00000140 (00320)   432f3070 5572694f 48703765 52634850   C/0pUriOHp7eRcHP
0x00000150 (00336)   69596f39 39304d55 756a6755 57346276   iYo990MUujgUW4bv
0x00000160 (00352)   5449644e 2f6a5058 7547506a 61427a78   TIdN/jPXuGPjaBzx
0x00000170 (00368)   6c636335 6d704e30 31613674 2f516953   lcc5mpN01a6t/QiS
0x00000180 (00384)   58587770 7a39486d 306b7a39 66426661   XXwpz9Hm0kz9fBfa
0x00000190 (00400)   556e3130 782f474c 636f6652 6948344c   Un10x/GLcofRiH4L
0x000001a0 (00416)   76467341 69475946 7361696f 4d573037   vFsAiGYFsaioMW07
0x000001b0 (00432)   4b304533 726b6b33 4d655a55 79674465   K0E3rkk3MeZUygDe
0x000001c0 (00448)   4c477732 7331322b 6f504d4e 726e4a5a   LGw2s12+oPMNrnJZ
0x000001d0 (00464)   637a687a 5a387869 4e577535 54674f68   czhzZ8xiNWu5TgOh
0x000001e0 (00480)   71344f71 55533042 4d54644b 32625a79   q4OqUS0BMTdK2bZy
0x000001f0 (00496)   2f687833 546e6d47 7954464c 48684c63   /hx3TnmGyTFLHhLc
0x00000200 (00512)   52662b76 417a494f 424e6d76 34334344   Rf+vAzIOBNmv43CD
0x00000210 (00528)   4b325130 35415663 6d413832 4b685466   K2Q05AVcmA82KhTf
0x00000220 (00544)   5573732f 476f6c77 786c6d39 6b4c6e72   Uss/Golwxlm9kLnr
0x00000230 (00560)   6e6c4936 5a77366e 3336642f 33346e70   nlI6Zw6n36d/34np
0x00000240 (00576)   6c563059 71516a2b 773d3d              lV0YqQj+w==


Strings
[.
\S.06
.
...on
..h.!.$.
.c.......2
8\.``c...CM...x...
...B.Q
.l... 
....Sm.

;%+&
|_*0
`+3d
5J	g[
5u'9m
)9WD
/{Ao
aRsQ
<>B-
b\A'w
cT"l
dbaT,
dFpG
&.E.
%`E+
Fbb3
fMO`
fWvW~.
GDG<
hSoL
=!hw
lvvR
M2K_
MC@L
#mmn
N|{2
Na[1N
QLUt
q'o)
SBA!
T@O;k
	T[X
 'Up
u[X%#
x8uG
xVCt
XXo!
z#^,
z6b#
z+9vd
ZNzr
z\/T
0T1Z1r2
^1e1x1
2:2E2L2T2[2g2n2t2~2
3+3<3P3{3
3e132f69
458534843
5%5+51575=5C5I5O5U5[5a5g5m5s5y5
`5d5h5l5p5t5x5|5
5m8u8~8
8&8.868>8F8N8V8^8f8n8v8~8
9">&>*>.>2>6>:>>>B>F>K>U>_>i>s>}>
9-9J9Q9
adsldpc.dll
Ajo+5[
AppendMenuA
  </application> 
  <application> 
</assembly>
   <assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Windows - Setup UAC" type="win32"/>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> 
CDu@fG
CharToOemA
CompareFileTime
</compatibility> 
<compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"> 
ConfigurePortA
CreateEventA
&CW8HF
DdeClientTransaction
DdeNameService
DeleteAtom
DeleteFiber
DeletePortW
DllCanUnloadNow
D$ OIG9M
.edata
EndDialog
EnumChildWindows
EnumFormsA
EqualRect
ExtractIconExA
]f@c#t
FindFirstVolumeMountPointW
FindResourceW
GetConsoleDisplayMode
GetConsoleWindow
GetFileSizeEx
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetUpdateRect
G@KB;T$
GlobalAddAtomA
GlobalAlloc
GlobalFree
@HHOIG
HOK8|$
.idata
IMPQueryIMEA
InternalExtractIconListA
kernel32.dll
LoadLibraryA
lstrcpynW
LZInit
ORCy5#z
;O=V=%?
P.reloc
P.rsrc
,@q)))
qCv5r)au
            <requestedExecutionLevel level="highestAvailable"/> 
         </requestedPrivileges>
         <requestedPrivileges>
      </security>
      <security>
SetFileTime
SetFormA
SetPrinterDataExW
SetScrollInfo
shell32.dll
SHGetUnreadMailCountW
SHQueryRecycleBinW
SleepEx
StrChrW
      <supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/> 
      <supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/> 
    <!--The ID below indicates application support for Windows 7 --> 
    <!--The ID below indicates application support for Windows Vista --> 
This program must be run under Win32
:t#q.0
   </trustInfo>
      <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
user32.dll
VirtualAllocEx
VkKeyScanW
winspool.drv
xmax.exe
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
&zp*)))