Analysis Date2014-04-20 01:44:34
MD5af6a3fe1498d2d951a754337337e6a75
SHA179e33ab4a0b6e4c01a7aee4feffe36fac5e1cd6b

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 53b89a64f285b3b1ef5efd5cfa185fbb sha1: cdf78eb867820f16fdf6c5506f69fc00f9b5fc9b size: 120320
Section.rdata md5: 50a82a7cf56c0847a45f786806647558 sha1: 3077f5f606acd80995710f941a48035d5c7f66d7 size: 15872
Section.data md5: 56420b7daaa94b11f25266992d196702 sha1: f9a01671728869f301d966995836ad40a6f176bb size: 17408
Timestamp2014-01-22 06:40:51
PackerMicrosoft Visual C++ ?.?
PEhashe7ee5b209d44a1190e4622f46c5f4bfb7c834055
IMPhash28277a0f7db5adee87528e8cdce46d5e
AVmcafeeGeneric-FAOV!AF6A3FE1498D
AVavgGeneric_r.DMB

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Visual Netlogon NGEN Computer ➝
C:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\axsjnhisuk.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.lt
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\yzatxrhwppws\acnjmwbnu.exe"

Network Details:

DNSquietsuccess.net
Type: A
184.168.221.44
DNSnightguard.net
Type: A
173.199.172.26
DNSelectricairplane.net
Type: A
72.52.4.90
DNSelectricfence.net
Type: A
208.91.197.27
DNSstreetguard.net
Type: A
184.168.221.35
DNStradeguard.net
Type: A
184.168.221.29
DNSquietfence.net
Type: A
184.168.221.15
DNSthinkshould.net
Type: A
50.63.202.44
DNSflierbanker.net
Type: A
DNSbreadbanker.net
Type: A
DNSquietfound.net
Type: A
DNSseasonfound.net
Type: A
DNSquietspring.net
Type: A
DNSseasonspring.net
Type: A
DNSseasonsuccess.net
Type: A
DNSquietbanker.net
Type: A
DNSseasonbanker.net
Type: A
DNSagainstairplane.net
Type: A
DNSdoubtairplane.net
Type: A
DNSagainststraight.net
Type: A
DNSdoubtstraight.net
Type: A
DNSagainstguard.net
Type: A
DNSdoubtguard.net
Type: A
DNSagainstfence.net
Type: A
DNSdoubtfence.net
Type: A
DNSnightairplane.net
Type: A
DNSdecideairplane.net
Type: A
DNSnightstraight.net
Type: A
DNSdecidestraight.net
Type: A
DNSdecideguard.net
Type: A
DNSnightfence.net
Type: A
DNSdecidefence.net
Type: A
DNSlargeairplane.net
Type: A
DNScaptainairplane.net
Type: A
DNSlargestraight.net
Type: A
DNScaptainstraight.net
Type: A
DNSlargeguard.net
Type: A
DNScaptainguard.net
Type: A
DNSlargefence.net
Type: A
DNScaptainfence.net
Type: A
DNSrecordairplane.net
Type: A
DNSrecordstraight.net
Type: A
DNSelectricstraight.net
Type: A
DNSrecordguard.net
Type: A
DNSelectricguard.net
Type: A
DNSrecordfence.net
Type: A
DNSstreetairplane.net
Type: A
DNStradeairplane.net
Type: A
DNSstreetstraight.net
Type: A
DNStradestraight.net
Type: A
DNSstreetfence.net
Type: A
DNStradefence.net
Type: A
DNSbetterairplane.net
Type: A
DNSgatherairplane.net
Type: A
DNSbetterstraight.net
Type: A
DNSgatherstraight.net
Type: A
DNSbetterguard.net
Type: A
DNSgatherguard.net
Type: A
DNSbetterfence.net
Type: A
DNSgatherfence.net
Type: A
DNSflierairplane.net
Type: A
DNSbreadairplane.net
Type: A
DNSflierstraight.net
Type: A
DNSbreadstraight.net
Type: A
DNSflierguard.net
Type: A
DNSbreadguard.net
Type: A
DNSflierfence.net
Type: A
DNSbreadfence.net
Type: A
DNSquietairplane.net
Type: A
DNSseasonairplane.net
Type: A
DNSquietstraight.net
Type: A
DNSseasonstraight.net
Type: A
DNSquietguard.net
Type: A
DNSseasonguard.net
Type: A
DNSseasonfence.net
Type: A
DNSpresentshould.net
Type: A
DNSthinkshort.net
Type: A
DNSpresentshort.net
Type: A
DNSthinkopinion.net
Type: A
DNSpresentopinion.net
Type: A
DNSthinkpromise.net
Type: A
DNSpresentpromise.net
Type: A
DNSchiefshould.net
Type: A
DNScollegeshould.net
Type: A
DNSchiefshort.net
Type: A
HTTP GEThttp://quietsuccess.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://nightguard.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://electricairplane.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://electricfence.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://streetguard.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://tradeguard.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://quietfence.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
HTTP GEThttp://thinkshould.net/forum/search.php?email=beycj@cox.net&method=post
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.44:80
Flows TCP192.168.1.1:1032 ➝ 173.199.172.26:80
Flows TCP192.168.1.1:1033 ➝ 72.52.4.90:80
Flows TCP192.168.1.1:1034 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1035 ➝ 184.168.221.35:80
Flows TCP192.168.1.1:1036 ➝ 184.168.221.29:80
Flows TCP192.168.1.1:1037 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1038 ➝ 50.63.202.44:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a207175 69657473 75636365   Host: quietsucce
0x00000070 (00112)   73732e6e 65740d0a 0d0a                ss.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a206e69 67687467 75617264   Host: nightguard
0x00000070 (00112)   2e6e6574 0d0a0d0a 0d0a                .net......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a20656c 65637472 69636169   Host: electricai
0x00000070 (00112)   72706c61 6e652e6e 65740d0a 0d0a       rplane.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a20656c 65637472 69636665   Host: electricfe
0x00000070 (00112)   6e63652e 6e65740d 0a0d0a0a 0d0a       nce.net.......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a207374 72656574 67756172   Host: streetguar
0x00000070 (00112)   642e6e65 740d0a0d 0a0d0a0a 0d0a       d.net.........

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a207472 61646567 75617264   Host: tradeguard
0x00000070 (00112)   2e6e6574 0d0a0d0a 0a0d0a0a 0d0a       .net..........

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a207175 69657466 656e6365   Host: quietfence
0x00000070 (00112)   2e6e6574 0d0a0d0a 0a0d0a0a 0d0a       .net..........

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62657963   h.php?email=beyc
0x00000020 (00032)   6a40636f 782e6e65 74266d65 74686f64   j@cox.net&method
0x00000030 (00048)   3d706f73 74204854 54502f31 2e300d0a   =post HTTP/1.0..
0x00000040 (00064)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a207468 696e6b73 686f756c   Host: thinkshoul
0x00000070 (00112)   642e6e65 740d0a0d 0a0d0a0a 0d0a       d.net.........


Strings
.
-E-
-0
-0010+-0
0
-0
CC
00-+ 
.
.
-e-
. 
\
 
00
.
:\
:..
...........?- 
0
0
0
0
-
..u
E(null)
                                 H
         (((((                  H
         h((((                  H
jjjjh
jjjjj
KERNEL32.DLL
mscoree.dll
                          
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
0SSSSS
0WWWWW
$1_)`;[G
1#QNAN
1#SNAN
7j3eDg
8VVVVV
9;}	_^
9t]{iU
a	8wOI$
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ADVAPI32.dll
An application has made an attempt to load the C runtime library incorrectly.
ASJ#j}
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
August
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
bad allocation
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
BeginPaint
BuildCommDCBAndTimeoutsA
__cdecl
CheckMenuRadioItem
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
CombineRgn
CompareStringA
CompareStringW
 Complete Object Locator'
CONOUT$
`copy constructor closure'
CopyFileA
CorExitProcess
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
D$,_^][
D$(][_^
D$4PQVWW
D$4PWV
@.data
D$d_^[
D$@;D$
?%@!dDD
dddd, MMMM dd, yyyy
D$DPQR
D$\+D$T
D$`+D$X+
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
DispatchMessageA
D$LUVW
DOMAIN error
DPtoLP
}Ds3JV
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
EncodePointer
EndPaint
EnterCriticalSection
ExitProcess
F;5`LB
__fastcall
f(/De$k
February
FileEncryptionStatusA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
fL $1O
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
Friday
^F<-uB
GAIsProcessorFeaturePresent
GDI32.dll
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserObjectInformationA
GetWindowDC
GetWindowRect
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
`h````
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
Hy]B~mCKf
i^Dc4/u
>If90t
InflateRect
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
InvalidateRect
invalid string position
IsDebuggerPresent
IsValidCodePage
J1RV%YA
JaB]@o$
JanFebMarAprMayJunJulAugSepOctNovDec
January
Je0XrC
j$hT5B
j@j ^V
j"^SSSSS
JY!:re
KERNEL32
KERNEL32.dll
L$4QRV
L$4QRVW
L$4QWVU
LCMapStringA
LCMapStringW
L$DQUPV
LeaveCriticalSection
L$LRWPQS
LoadCursorA
LoadLibraryA
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
LPtoDP
L$@QRW
L$ QUV
L$\RPQ
L$(SQP
L$X_^]3
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
MessageBoxA
Microsoft Visual C++ Runtime Library
MM/dd/yy
Monday
MoveWindow
MulDiv
MultiByteToWideChar
 new[]
NoRemove
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
n=/}-Tu
(null)
October
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenJobObjectA
OpenProcess
operator
__pascal
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
PostQuitMessage
PPPPPPPP
Process32First
Process32Next
Program: 
<program name unknown>
__ptr64
- pure virtual function call
qc~Y81
QQSVWd
QueryPerformanceCounter
RaiseException
`.rdata
ReadFile
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegSetValueExA
__restrict
rM@4~e
RtlUnwind
runtime error 
Runtime Error!
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetLastError
SetMapMode
SetStdHandle
SetUnhandledExceptionFilter
SetWindowsHookA
SetWindowTextA
ShowWindow
SING error
s[S;7|G;w
^SSSSS
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
T$4RPVWW
T$4RWVPP
t$4WPQ
T$DRPQ
TerminateProcess
tGHt.Ht&
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
< tK<	tG
T@lhtJ64
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
<\tM</tI
tR99u2
TranslateMessage
T$(RPj
T$ RPPj
t"SS9]
<+t(<-t$:
t$<"u	3
Tuesday
;t$,v-
t$(WSQ3
t+WWVPV
T$XQPR
 Type Descriptor'
`typeof'
>:u8FV
uBhAGA
`udt returning'
uG`U,W
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
Unknown exception
UnregisterWaitEx
UpdateWindow
UQPXY]Y[
URPQQh
USER32.dll
USER32.DLL
u[SSSP
UTF-16LE
uwSVj4h
v6b?QV
v8<i]c
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
v	N+D$
_VVVVV
VVVVVQRSSj
WaitForSingleObject
Wednesday
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
^WWWWW
X7zL>Mk;
)XJod`
xppwpp
xpxxxx
<xtX<XtT
>=Yt1j
Z5U5Y]
#Z!nU,OX