Analysis Date2015-08-14 09:50:43
MD58b2d16697d950d513bb9b494fe65375e
SHA17bfabc5f7a9acce80054d490ae5dc31d87fe3f53

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: a5e3dfff03bd487d029e83fd88a06fa5 sha1: b2f6b752c172495c6613cb96e6cb749c85c1afe0 size: 197632
Section.rdata md5: 90f3fdc3203b7cb6795824c108e6dd9e sha1: 2031c607ce2ebb599903791ee83f51a624343f11 size: 53248
Section.data md5: 31fe2bffb69a41279b36596a58462ca5 sha1: c01479084380fb165b12be46676fb5cf0c3e0377 size: 6656
Section.reloc md5: 5d67c97b04685961ea970c9f1bbbd948 sha1: d912fdad9181772685238ef169079cecb2a5245e size: 14336
Timestamp2015-04-29 19:04:00
PackerMicrosoft Visual C++ 8
PEhash954b74048356e19a1c39fbd4973ca9360ccedfc3
IMPhashf66d6f7884773d2c0f73c4d5fb53ccd1
AVGrisoft (avg)Win32/Cryptor
AVK7Trojan ( 004c12491 )
AVMcafeeTrojan-FGIJ!8B2D16697D95
AVFrisk (f-prot)no_virus
AVSymantecDownloader.Upatre!g15
AVCA (E-Trust Ino)no_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AL
AVBullGuardGen:Variant.Kazy.604861
AVTwisterTrojan.0000E9000000006A1.mg
AVKasperskyTrojan.Win32.Generic
AVFortinetW32/Generic.AC.215362
AVEset (nod32)Win32/Bayrob.Q
AVDr. WebTrojan.DownLoader13.14439
AVRisingTrojan.Win32.Bayrod.a
AVZillya!no_virus
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVAuthentiumW32/Scar.R.gen!Eldorado
AVMalwareBytesTrojan.Agent.KVTGen
AVAlwil (avast)VB-AJEW [Trj]
AVClamAVno_virus
AVVirusBlokAda (vba32)no_virus
AVAvira (antivir)TR/Crypt.Xpack.196052
AVAd-AwareGen:Variant.Kazy.604861
AVIkarusTrojan.Win32.Bayrob
AVTrend MicroTROJ_BAYROB.SM0
AVMicroWorld (escan)Gen:Variant.Kazy.604861
AVArcabit (arcavir)Gen:Variant.Kazy.604861
AVEmsisoftGen:Variant.Kazy.604861
AVBitDefenderGen:Variant.Kazy.604861
AVPadvishno_virus
AVF-SecureGen:Variant.Kazy.604861

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\uuyqyeauofcdn\fknjvtmzwa1htkkqqj.exe
Creates FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates FileC:\uuyqyeauofcdn\wvm2txtor
Deletes FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates ProcessC:\uuyqyeauofcdn\fknjvtmzwa1htkkqqj.exe

Process
↳ C:\uuyqyeauofcdn\fknjvtmzwa1htkkqqj.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Security TCP/IP Panel Filtering Counter Base ➝
C:\uuyqyeauofcdn\grkpwmgt.exe
Creates FileC:\uuyqyeauofcdn\grkpwmgt.exe
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates FileC:\uuyqyeauofcdn\pf9vuu3
Creates FileC:\uuyqyeauofcdn\wvm2txtor
Deletes FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates ProcessC:\uuyqyeauofcdn\grkpwmgt.exe
Creates ServiceOffline Transfer Secondary Cache DHCP Log - C:\uuyqyeauofcdn\grkpwmgt.exe

Process
↳ Pid 804

Process
↳ Pid 856

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\Prefetch\GRKPWMGT.EXE-382D7901.pf
Creates FileC:\WINDOWS\Prefetch\7BFABC5F7A9ACCE80054D490AE5DC-3AAFEE6D.pf
Creates FileC:\WINDOWS\Prefetch\VOXNYTXR.EXE-221AD449.pf
Creates FileC:\WINDOWS\Prefetch\CMD.EXE-087B4001.pf
Creates FileC:\WINDOWS\Prefetch\NET1.EXE-029B9DB4.pf
Creates FileC:\WINDOWS\Prefetch\EXPLORER.EXE-082F38A9.pf
Creates FileC:\WINDOWS\Prefetch\USERINIT.EXE-30B18140.pf
Creates FileC:\WINDOWS\Prefetch\READER_SL.EXE-3614FA6E.pf
Creates FileC:\WINDOWS\Prefetch\monitor.exe-1949D260.pf
Creates FileC:\WINDOWS\Prefetch\FKNJVTMZWA1HTKKQQJ.EXE-25A0A067.pf
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log
Creates FileC:\WINDOWS\Prefetch\svchost.EXE-0C867EC1.pf

Process
↳ Pid 1116

Process
↳ Pid 1212

Process
↳ Pid 1328

Process
↳ Pid 1876

Process
↳ Pid 896

Process
↳ C:\uuyqyeauofcdn\grkpwmgt.exe

Creates FileC:\uuyqyeauofcdn\fvsds3czjngk
Creates Filepipe\net\NtControlPipe10
Creates File\Device\Afd\Endpoint
Creates FileC:\uuyqyeauofcdn\voxnytxr.exe
Creates FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates FileC:\uuyqyeauofcdn\pf9vuu3
Creates FileC:\uuyqyeauofcdn\wvm2txtor
Deletes FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates Processwllczwjlfxgx "c:\uuyqyeauofcdn\grkpwmgt.exe"

Process
↳ C:\uuyqyeauofcdn\grkpwmgt.exe

Creates FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates FileC:\uuyqyeauofcdn\wvm2txtor
Deletes FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor

Process
↳ wllczwjlfxgx "c:\uuyqyeauofcdn\grkpwmgt.exe"

Creates FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor
Creates FileC:\uuyqyeauofcdn\wvm2txtor
Deletes FileC:\WINDOWS\uuyqyeauofcdn\wvm2txtor

Network Details:

DNSenglishforest.net
Type: A
59.188.232.88
DNSpersonschool.net
Type: A
165.160.15.20
DNSpersonschool.net
Type: A
165.160.13.20
DNSforeignquestion.net
Type: A
195.22.26.231
DNSforeignquestion.net
Type: A
195.22.26.254
DNSforeignquestion.net
Type: A
195.22.26.253
DNSforeignquestion.net
Type: A
195.22.26.252
DNSrightschool.net
Type: A
82.144.197.54
DNSrightquestion.net
Type: A
208.91.197.27
DNSfamilyschool.net
Type: A
50.63.202.104
DNSchildrenwhile.net
Type: A
95.211.230.75
DNSenglishschool.net
Type: A
72.52.4.119
DNSenglishquestion.net
Type: A
85.25.201.249
DNSexpectschool.net
Type: A
DNSbecauseschool.net
Type: A
DNSexpectwhile.net
Type: A
DNSbecausewhile.net
Type: A
DNSexpectquestion.net
Type: A
DNSbecausequestion.net
Type: A
DNSexpecttherefore.net
Type: A
DNSbecausetherefore.net
Type: A
DNSmachineschool.net
Type: A
DNSpersonwhile.net
Type: A
DNSmachinewhile.net
Type: A
DNSpersonquestion.net
Type: A
DNSmachinequestion.net
Type: A
DNSpersontherefore.net
Type: A
DNSmachinetherefore.net
Type: A
DNSsuddenschool.net
Type: A
DNSforeignschool.net
Type: A
DNSsuddenwhile.net
Type: A
DNSforeignwhile.net
Type: A
DNSsuddenquestion.net
Type: A
DNSsuddentherefore.net
Type: A
DNSforeigntherefore.net
Type: A
DNSwhetherschool.net
Type: A
DNSwhetherwhile.net
Type: A
DNSrightwhile.net
Type: A
DNSwhetherquestion.net
Type: A
DNSwhethertherefore.net
Type: A
DNSrighttherefore.net
Type: A
DNSfigureschool.net
Type: A
DNSthoughschool.net
Type: A
DNSfigurewhile.net
Type: A
DNSthoughwhile.net
Type: A
DNSfigurequestion.net
Type: A
DNSthoughquestion.net
Type: A
DNSfiguretherefore.net
Type: A
DNSthoughtherefore.net
Type: A
DNSpictureschool.net
Type: A
DNScigaretteschool.net
Type: A
DNSpicturewhile.net
Type: A
DNScigarettewhile.net
Type: A
DNSpicturequestion.net
Type: A
DNScigarettequestion.net
Type: A
DNSpicturetherefore.net
Type: A
DNScigarettetherefore.net
Type: A
DNSchildrenschool.net
Type: A
DNSfamilywhile.net
Type: A
DNSchildrenquestion.net
Type: A
DNSfamilyquestion.net
Type: A
DNSchildrentherefore.net
Type: A
DNSfamilytherefore.net
Type: A
DNSeitherschool.net
Type: A
DNSeitherwhile.net
Type: A
DNSenglishwhile.net
Type: A
DNSeitherquestion.net
Type: A
DNSeithertherefore.net
Type: A
DNSenglishtherefore.net
Type: A
DNSexpecthunger.net
Type: A
DNSbecausehunger.net
Type: A
DNSexpecttraining.net
Type: A
DNSbecausetraining.net
Type: A
DNSexpectstorm.net
Type: A
DNSbecausestorm.net
Type: A
DNSexpectthrown.net
Type: A
DNSbecausethrown.net
Type: A
DNSpersonhunger.net
Type: A
DNSmachinehunger.net
Type: A
DNSpersontraining.net
Type: A
DNSmachinetraining.net
Type: A
DNSpersonstorm.net
Type: A
DNSmachinestorm.net
Type: A
DNSpersonthrown.net
Type: A
DNSmachinethrown.net
Type: A
DNSsuddenhunger.net
Type: A
DNSforeignhunger.net
Type: A
DNSsuddentraining.net
Type: A
DNSforeigntraining.net
Type: A
HTTP GEThttp://englishforest.net/index.php
User-Agent:
HTTP GEThttp://personschool.net/index.php
User-Agent:
HTTP GEThttp://foreignquestion.net/index.php
User-Agent:
HTTP GEThttp://rightschool.net/index.php
User-Agent:
HTTP GEThttp://rightquestion.net/index.php
User-Agent:
HTTP GEThttp://familyschool.net/index.php
User-Agent:
HTTP GEThttp://childrenwhile.net/index.php
User-Agent:
HTTP GEThttp://englishschool.net/index.php
User-Agent:
HTTP GEThttp://englishquestion.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 59.188.232.88:80
Flows TCP192.168.1.1:1032 ➝ 165.160.15.20:80
Flows TCP192.168.1.1:1033 ➝ 195.22.26.231:80
Flows TCP192.168.1.1:1034 ➝ 82.144.197.54:80
Flows TCP192.168.1.1:1035 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1036 ➝ 50.63.202.104:80
Flows TCP192.168.1.1:1037 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1038 ➝ 72.52.4.119:80
Flows TCP192.168.1.1:1039 ➝ 85.25.201.249:80

Raw Pcap

Strings