Analysis Date2015-08-26 18:06:37
MD5c75df7b6bc98c37e8b04ac25b9ccfba8
SHA1776372805dc609731536c49c0ec671dfa1cc3369

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: c93cafaf0cae277c89e9ead6352a60bb sha1: 9f1d57b6f27daf33a69be9581cbadb8907f95777 size: 296960
Section.rdata md5: f90eb345aecaa34c70fb08e3a7044f1c sha1: 29e719b494f7bcd53f6b486df22eec097bd51a41 size: 34304
Section.data md5: 2a59dad75e54ae6379fc4f00b10669e5 sha1: a22856e5129cb83b017124ab16d33c83267ca993 size: 103424
Timestamp2014-10-30 10:31:39
PackerMicrosoft Visual C++ ?.?
PEhashb22341aded5790be62a0c1d1051970219218a859
IMPhash19dab1b7ade04ab5f23974a57ca1ad4c
AVCA (E-Trust Ino)Win32/Tnega.XAXB!suspicious
AVF-SecureGen:Variant.Symmi.22722
AVDr. WebTrojan.DownLoader13.48963
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVBullGuardGen:Variant.Symmi.22722
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)Trojan.Dynamer.AC3
AVTrend MicroTSPY_NIVDORT.SMB
AVKasperskyTrojan.Win32.Generic
AVZillya!Trojan.Agent.Win32.565668
AVEmsisoftGen:Variant.Symmi.22722
AVIkarusTrojan.FBAccountLock
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Wonton.B.gen!Eldorado
AVMalwareBytesTrojan.Zbot.WHE
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BD
AVK7Trojan ( 004938ec1 )
AVBitDefenderGen:Variant.Symmi.22722
AVFortinetW32/Agent.VNC!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Agent.VNC
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVAd-AwareGen:Variant.Symmi.22722
AVTwisterno_virus
AVAvira (antivir)BDS/Zegost.Gen4
AVMcafeeTrojan-FEMT!C75DF7B6BC98
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\BranchCache Firewall Source ➝
C:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\dpjndfrah\jqzaibknr.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.hm
Creates File\Device\Afd\Endpoint
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\dpjndfrah\bebxzudwurll.exe"

Network Details:

DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSpossibletraining.net
Type: A
50.63.202.54
DNSwinterstorm.net
Type: A
64.91.240.250
DNSleavethrown.net
Type: A
95.211.230.75
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
DNSmountainhunger.net
Type: A
DNSpossiblehunger.net
Type: A
DNSmountaintraining.net
Type: A
DNSmountainstorm.net
Type: A
DNSpossiblestorm.net
Type: A
DNSmountainthrown.net
Type: A
DNSpossiblethrown.net
Type: A
DNSperhapshunger.net
Type: A
DNSwindowhunger.net
Type: A
DNSperhapstraining.net
Type: A
DNSwindowtraining.net
Type: A
DNSperhapsstorm.net
Type: A
DNSwindowstorm.net
Type: A
DNSperhapsthrown.net
Type: A
DNSwindowthrown.net
Type: A
DNSwinterhunger.net
Type: A
DNSsubjecthunger.net
Type: A
DNSwintertraining.net
Type: A
DNSsubjecttraining.net
Type: A
DNSsubjectstorm.net
Type: A
DNSwinterthrown.net
Type: A
DNSsubjectthrown.net
Type: A
DNSfinishhunger.net
Type: A
DNSleavehunger.net
Type: A
DNSfinishtraining.net
Type: A
DNSleavetraining.net
Type: A
DNSfinishstorm.net
Type: A
DNSleavestorm.net
Type: A
DNSfinishthrown.net
Type: A
DNSsweethunger.net
Type: A
DNSprobablyhunger.net
Type: A
DNSsweettraining.net
Type: A
HTTP GEThttp://winterschool.net/index.php?email=bighornguns@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://finishschool.net/index.php?email=bighornguns@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://possibletraining.net/index.php?email=bighornguns@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://winterstorm.net/index.php?email=bighornguns@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://leavethrown.net/index.php?email=bighornguns@hotmail.com&method=post&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1032 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1033 ➝ 50.63.202.54:80
Flows TCP192.168.1.1:1034 ➝ 64.91.240.250:80
Flows TCP192.168.1.1:1035 ➝ 95.211.230.75:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d626967 686f726e 67756e73   mail=bighornguns
0x00000020 (00032)   40686f74 6d61696c 2e636f6d 266d6574   @hotmail.com&met
0x00000030 (00048)   686f643d 706f7374 266c656e 20485454   hod=post&len HTT
0x00000040 (00064)   502f312e 300d0a41 63636570 743a202a   P/1.0..Accept: *
0x00000050 (00080)   2f2a0d0a 436f6e6e 65637469 6f6e3a20   /*..Connection: 
0x00000060 (00096)   636c6f73 650d0a48 6f73743a 2077696e   close..Host: win
0x00000070 (00112)   74657273 63686f6f 6c2e6e65 740d0a0d   terschool.net...
0x00000080 (00128)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d626967 686f726e 67756e73   mail=bighornguns
0x00000020 (00032)   40686f74 6d61696c 2e636f6d 266d6574   @hotmail.com&met
0x00000030 (00048)   686f643d 706f7374 266c656e 20485454   hod=post&len HTT
0x00000040 (00064)   502f312e 300d0a41 63636570 743a202a   P/1.0..Accept: *
0x00000050 (00080)   2f2a0d0a 436f6e6e 65637469 6f6e3a20   /*..Connection: 
0x00000060 (00096)   636c6f73 650d0a48 6f73743a 2066696e   close..Host: fin
0x00000070 (00112)   69736873 63686f6f 6c2e6e65 740d0a0d   ishschool.net...
0x00000080 (00128)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d626967 686f726e 67756e73   mail=bighornguns
0x00000020 (00032)   40686f74 6d61696c 2e636f6d 266d6574   @hotmail.com&met
0x00000030 (00048)   686f643d 706f7374 266c656e 20485454   hod=post&len HTT
0x00000040 (00064)   502f312e 300d0a41 63636570 743a202a   P/1.0..Accept: *
0x00000050 (00080)   2f2a0d0a 436f6e6e 65637469 6f6e3a20   /*..Connection: 
0x00000060 (00096)   636c6f73 650d0a48 6f73743a 20706f73   close..Host: pos
0x00000070 (00112)   7369626c 65747261 696e696e 672e6e65   sibletraining.ne
0x00000080 (00128)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d626967 686f726e 67756e73   mail=bighornguns
0x00000020 (00032)   40686f74 6d61696c 2e636f6d 266d6574   @hotmail.com&met
0x00000030 (00048)   686f643d 706f7374 266c656e 20485454   hod=post&len HTT
0x00000040 (00064)   502f312e 300d0a41 63636570 743a202a   P/1.0..Accept: *
0x00000050 (00080)   2f2a0d0a 436f6e6e 65637469 6f6e3a20   /*..Connection: 
0x00000060 (00096)   636c6f73 650d0a48 6f73743a 2077696e   close..Host: win
0x00000070 (00112)   74657273 746f726d 2e6e6574 0d0a0d0a   terstorm.net....
0x00000080 (00128)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d626967 686f726e 67756e73   mail=bighornguns
0x00000020 (00032)   40686f74 6d61696c 2e636f6d 266d6574   @hotmail.com&met
0x00000030 (00048)   686f643d 706f7374 266c656e 20485454   hod=post&len HTT
0x00000040 (00064)   502f312e 300d0a41 63636570 743a202a   P/1.0..Accept: *
0x00000050 (00080)   2f2a0d0a 436f6e6e 65637469 6f6e3a20   /*..Connection: 
0x00000060 (00096)   636c6f73 650d0a48 6f73743a 206c6561   close..Host: lea
0x00000070 (00112)   76657468 726f776e 2e6e6574 0d0a0d0a   vethrown.net....
0x00000080 (00128)   740d0a0d 0a                           t....


Strings