Analysis Date2015-11-02 15:23:26
MD50e93a45c6998d0474e917e7e0793190c
SHA17ce8c27e7990c0aa25b433e7a3273a4488e359fd

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 3dbd20c27d2b13fa1932636fbaef68d3 sha1: c7345642faf56a4af1e32bbccd6e6cda16446ba6 size: 1289728
Section.rdata md5: 19f8fb807f7a66d8fd22f3f41235a827 sha1: 16d6780ec0473f7763d3a43016d5c63e73baca54 size: 289792
Section.data md5: 1df13644d4da8bd3a9bcf0b9753a9631 sha1: af6ace48501c585b1367d54fe99538c75c49a9e2 size: 8192
Section.reloc md5: 9c9eb67bb158397a200193b736dfb0f0 sha1: 5c4cf568790158e8c0effdd934a7bff9d3affad3 size: 171008
Timestamp2015-05-11 04:38:26
PackerVC8 -> Microsoft Corporation
PEhash65d214fad8b1581e17c424fa9fbbe70d76da2fb4
IMPhash83d751daaaa022b16702dd33cd58c6a8
AVAd-AwareGen:Variant.Diley.1
AVGrisoft (avg)Generic36.BNMI
AVCAT (quickheal)no_virus
AVIkarusTrojan.Win32.Bayrob
AVAvira (antivir)TR/Crypt.Xpack.308287
AVK7Trojan ( 004c77f41 )
AVClamAVno_virus
AVKasperskyTrojan.Win32.Generic
AVArcabit (arcavir)Gen:Variant.Diley.1
AVMalwareBytesno_virus
AVDr. WebTrojan.Bayrob.5
AVMcafeeTrojan-FGIJ!0E93A45C6998
AVBitDefenderGen:Variant.Diley.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BN
AVEmsisoftGen:Variant.Diley.1
AVMicroWorld (escan)Gen:Variant.Diley.1
AVAlwil (avast)Dropper-OJQ [Drp]
AVPadvishno_virus
AVEset (nod32)Win32/Bayrob.Y
AVRisingno_virus
AVBullGuardGen:Variant.Diley.1
AVFortinetW32/Bayrob.X!tr
AVSymantecDownloader.Upatre!g15
AVAuthentiumW32/SoxGrave.A.gen!Eldorado
AVTrend Microno_virus
AVFrisk (f-prot)no_virus
AVTwisterno_virus
AVCA (E-Trust Ino)no_virus
AVVirusBlokAda (vba32)no_virus
AVF-SecureGen:Variant.Diley.1
AVZillya!Backdoor.SoxGrave.Win32.317

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\avomeim1kjlo3m2ncwtizze.exe
Creates FileC:\WINDOWS\system32\tjtkgfuwk\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\avomeim1kjlo3m2ncwtizze.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\avomeim1kjlo3m2ncwtizze.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Redirector TP Services Browser Application ➝
C:\WINDOWS\system32\avpcjuoebjj.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\tjtkgfuwk\lck
Creates FileC:\WINDOWS\system32\tjtkgfuwk\etc
Creates FileC:\WINDOWS\system32\tjtkgfuwk\tst
Creates FileC:\WINDOWS\system32\avpcjuoebjj.exe
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\avpcjuoebjj.exe
Creates ServiceWebClient UserMode Detection Smart Browser - C:\WINDOWS\system32\avpcjuoebjj.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 816

Process
↳ Pid 860

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\WERe60a.dir00\svchost.exe.mdmp
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log
Creates Filepipe\PCHFaultRepExecPipe
Creates ProcessC:\WINDOWS\system32\dumprep.exe 1028 -dm 7 7 C:\Documents and Settings\Administrator\Local Settings\Temp\WERe60a.dir00\svchost.exe.mdmp 16325836412030932

Process
↳ Pid 1216

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1864

Process
↳ Pid 1168

Process
↳ C:\WINDOWS\system32\avpcjuoebjj.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\tjtkgfuwk\rng
Creates FileC:\WINDOWS\system32\tjtkgfuwk\run
Creates FileC:\WINDOWS\TEMP\avomeim1rzdo3m2n.exe
Creates FileC:\WINDOWS\system32\wowuuka.exe
Creates FileC:\WINDOWS\system32\tjtkgfuwk\lck
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\tjtkgfuwk\cfg
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\tjtkgfuwk\tst
Creates ProcessWATCHDOGPROC "c:\windows\system32\avpcjuoebjj.exe"
Creates ProcessC:\WINDOWS\TEMP\avomeim1rzdo3m2n.exe -r 37276 tcp

Process
↳ C:\WINDOWS\system32\avpcjuoebjj.exe

Creates FileC:\WINDOWS\system32\tjtkgfuwk\tst

Process
↳ C:\WINDOWS\system32\dumprep.exe 1028 -dm 7 7 C:\Documents and Settings\Administrator\Local Settings\Temp\WERe60a.dir00\svchost.exe.mdmp 16325836412030932

Process
↳ WATCHDOGPROC "c:\windows\system32\avpcjuoebjj.exe"

Creates FileC:\WINDOWS\system32\tjtkgfuwk\tst

Process
↳ C:\WINDOWS\TEMP\avomeim1rzdo3m2n.exe -r 37276 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSrecordsoldier.net
Type: A
208.91.197.241
DNSfliersurprise.net
Type: A
208.91.197.241
DNShistorybright.net
Type: A
208.91.197.241
DNSchiefsoldier.net
Type: A
208.91.197.241
DNSclasssurprise.net
Type: A
208.91.197.241
DNSthosecontinue.net
Type: A
208.91.197.241
DNSthroughcontain.net
Type: A
208.91.197.241
DNSbelongguard.net
Type: A
208.91.197.241
DNSmaybellinethaddeus.net
Type: A
208.91.197.241
DNSkimberleyshavonne.net
Type: A
208.91.197.241
DNSnaildeep.com
Type: A
74.220.215.218
DNSriddenstorm.net
Type: A
66.147.240.171
DNSdestroystorm.net
Type: A
216.239.138.86
DNSwishfish.net
Type: A
50.63.202.55
DNSdeadwing.net
Type: A
85.25.214.16
DNSdeadlady.net
Type: A
195.22.26.253
DNSdeadlady.net
Type: A
195.22.26.254
DNSdeadlady.net
Type: A
195.22.26.231
DNSdeadlady.net
Type: A
195.22.26.252
DNSrocklady.net
Type: A
64.61.199.44
DNSdeadfish.net
Type: A
69.172.201.208
DNSrockfish.net
Type: A
96.45.83.235
DNSrockfish.net
Type: A
96.45.82.90
DNSrockfish.net
Type: A
96.45.82.194
DNSrockfish.net
Type: A
96.45.83.91
DNSwronglady.net
Type: A
208.100.26.234
DNSsouthcity.net
Type: A
207.148.248.143
DNSspotcity.net
Type: A
91.195.240.101
DNSsaltcity.net
Type: A
184.168.221.55
DNSgladcity.net
Type: A
65.254.248.183
DNSvisitcity.net
Type: A
104.193.110.28
DNSwatchcity.net
Type: A
207.148.248.143
DNSfaircity.net
Type: A
80.77.120.47
DNSdreamgrow.net
Type: A
213.180.31.141
DNShusbandfound.net
Type: A
DNSleadershort.net
Type: A
DNSeggbraker.com
Type: A
DNSithouneed.com
Type: A
DNSjoinwing.net
Type: A
DNSwishwing.net
Type: A
DNSjoinpast.net
Type: A
DNSwishpast.net
Type: A
DNSjoinlady.net
Type: A
DNSwishlady.net
Type: A
DNSjoinfish.net
Type: A
DNSrockwing.net
Type: A
DNSdeadpast.net
Type: A
DNSrockpast.net
Type: A
DNSwrongwing.net
Type: A
DNSmadewing.net
Type: A
DNSwrongpast.net
Type: A
DNSmadepast.net
Type: A
DNSmadelady.net
Type: A
DNSwrongfish.net
Type: A
DNSmadefish.net
Type: A
DNSarivegrow.net
Type: A
DNSsouthgrow.net
Type: A
DNSarivetear.net
Type: A
DNSsouthtear.net
Type: A
DNSarivethank.net
Type: A
DNSsouththank.net
Type: A
DNSarivecity.net
Type: A
DNSupongrow.net
Type: A
DNSwhichgrow.net
Type: A
DNSupontear.net
Type: A
DNSwhichtear.net
Type: A
DNSuponthank.net
Type: A
DNSwhichthank.net
Type: A
DNSuponcity.net
Type: A
DNSwhichcity.net
Type: A
DNSspotgrow.net
Type: A
DNSsaltgrow.net
Type: A
DNSspottear.net
Type: A
DNSsalttear.net
Type: A
DNSspotthank.net
Type: A
DNSsaltthank.net
Type: A
DNSgladgrow.net
Type: A
DNStakengrow.net
Type: A
DNSgladtear.net
Type: A
DNStakentear.net
Type: A
DNSgladthank.net
Type: A
DNStakenthank.net
Type: A
DNStakencity.net
Type: A
DNSequalgrow.net
Type: A
DNSgroupgrow.net
Type: A
DNSequaltear.net
Type: A
DNSgrouptear.net
Type: A
DNSequalthank.net
Type: A
DNSgroupthank.net
Type: A
DNSequalcity.net
Type: A
DNSgroupcity.net
Type: A
DNSspokegrow.net
Type: A
DNSvisitgrow.net
Type: A
DNSspoketear.net
Type: A
DNSvisittear.net
Type: A
DNSspokethank.net
Type: A
DNSvisitthank.net
Type: A
DNSspokecity.net
Type: A
DNSwatchgrow.net
Type: A
DNSfairgrow.net
Type: A
DNSwatchtear.net
Type: A
DNSfairtear.net
Type: A
DNSwatchthank.net
Type: A
DNSfairthank.net
Type: A
DNSthisgrow.net
Type: A
DNSdreamtear.net
Type: A
DNSthistear.net
Type: A
DNSdreamthank.net
Type: A
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://wishfish.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://deadwing.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://deadlady.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://rocklady.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://deadfish.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://rockfish.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://wronglady.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://southcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://spotcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://saltcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://gladcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://visitcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://watchcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://faircity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://dreamgrow.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://wishfish.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://deadwing.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://deadlady.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://rocklady.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://deadfish.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://rockfish.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://wronglady.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://southcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://spotcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://saltcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://gladcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://visitcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://watchcity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://faircity.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
HTTP GEThttp://dreamgrow.net/index.php?method=validate&mode=sox&v=050&sox=3ffb1809&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1037 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1043 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1046 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1047 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1048 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1049 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1050 ➝ 50.63.202.55:80
Flows TCP192.168.1.1:1051 ➝ 85.25.214.16:80
Flows TCP192.168.1.1:1052 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1053 ➝ 64.61.199.44:80
Flows TCP192.168.1.1:1054 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1055 ➝ 96.45.83.235:80
Flows TCP192.168.1.1:1056 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1057 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1058 ➝ 91.195.240.101:80
Flows TCP192.168.1.1:1059 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1060 ➝ 65.254.248.183:80
Flows TCP192.168.1.1:1061 ➝ 104.193.110.28:80
Flows TCP192.168.1.1:1062 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1063 ➝ 80.77.120.47:80
Flows TCP192.168.1.1:1064 ➝ 213.180.31.141:80
Flows TCP192.168.1.1:1065 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1066 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1067 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1068 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1069 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1070 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1071 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1072 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1073 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1074 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1075 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1076 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1077 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1078 ➝ 50.63.202.55:80
Flows TCP192.168.1.1:1079 ➝ 85.25.214.16:80
Flows TCP192.168.1.1:1080 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1081 ➝ 64.61.199.44:80
Flows TCP192.168.1.1:1082 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1083 ➝ 96.45.83.235:80
Flows TCP192.168.1.1:1084 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1085 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1086 ➝ 91.195.240.101:80
Flows TCP192.168.1.1:1087 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1088 ➝ 65.254.248.183:80
Flows TCP192.168.1.1:1089 ➝ 104.193.110.28:80
Flows TCP192.168.1.1:1090 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1091 ➝ 80.77.120.47:80
Flows TCP192.168.1.1:1092 ➝ 213.180.31.141:80

Raw Pcap

Strings