Analysis Date | 2016-02-22 02:50:14 |
---|---|
MD5 | 4f7e2e2adb94abeb87f45aa9211a64cc |
SHA1 | 84447aae72ae9735e43f2200db35b2dfc2a03186 |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: 43c5eeb8b978870a34ebbc67e79b5400 sha1: e090e3db20a421efd20b11e5af380476d6f5343a size: 258560 | |
Section | .rdata md5: 55b890230c9cc8d61d100fb7f8cbd2a1 sha1: 98dcdf39914e1e7540873942c49cb4d2811e8d32 size: 40448 | |
Section | .data md5: 05f315aff383f214462c91e65413bf35 sha1: 5eb26fe7bab88d34820b67ff0b23a161073e53c4 size: 1536 | |
Section | .reloc md5: 7051cb7b8fd960b709137c5594d8f701 sha1: b8698107d48d2da1ec6e9168b33f3d5393e7d336 size: 50688 | |
Timestamp | 2015-12-23 04:18:48 | |
Packer | Borland Delphi 3.0 (???) | |
PEhash | 045b38b5c898953621290076e18f14f549d58d2c | |
IMPhash | c76d84569cb9f62538bff9f09ba65c35 | |
AV | CA (E-Trust Ino) | Gen:Variant.Razy.11545 |
AV | Rising | No Virus |
AV | Mcafee | Trojan-FHPD!4F7E2E2ADB94 |
AV | Avira (antivir) | TR/Crypt.Xpack.408623 |
AV | Twister | No Virus |
AV | Ad-Aware | Gen:Variant.Razy.11545 |
AV | Alwil (avast) | Win32:Malware-gen |
AV | Eset (nod32) | Win32/Bayrob.AQ |
AV | Grisoft (avg) | Win32/Heur |
AV | Symantec | Trojan.Bayrob!gen6 |
AV | Fortinet | W32/Bayrob.AQ!tr |
AV | BitDefender | Gen:Variant.Razy.11545 |
AV | K7 | Trojan ( 004db0c61 ) |
AV | Microsoft Security Essentials | TrojanSpy:Win32/Nivdort.CW |
AV | MicroWorld (escan) | Gen:Variant.Razy.11545 |
AV | MalwareBytes | No Virus |
AV | Authentium | W32/Nivdort.F.gen!Eldorado |
AV | Emsisoft | Gen:Variant.Razy.11545 |
AV | Frisk (f-prot) | W32/Nivdort.F.gen!Eldorado |
AV | Ikarus | Trojan.Win32.Bayrob |
AV | Zillya! | Trojan.Bayrob.Win32.11810 |
AV | Kaspersky | Trojan.Win32.Generic |
AV | Trend Micro | No Virus |
AV | VirusBlokAda (vba32) | BScope.Malware-Cryptor.Msgfake |
AV | CAT (quickheal) | TrojanSpy.Nivdort.WR4 |
AV | BullGuard | Gen:Variant.Razy.11545 |
AV | Arcabit (arcavir) | Gen:Variant.Razy.11545 |
AV | ClamAV | No Virus |
AV | Dr. Web | Trojan.DownLoader18.47355 |
AV | F-Secure | Gen:Variant.Razy.11545 |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\jqroffijpohtxdk\ajfa60us |
---|---|
Creates File | C:\jqroffijpohtxdk\nc91kd2tyggbxlx.exe |
Creates File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Deletes File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Creates Process | C:\jqroffijpohtxdk\nc91kd2tyggbxlx.exe |
Process
↳ C:\jqroffijpohtxdk\nc91kd2tyggbxlx.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Discovery Files Bluetooth Base ➝ C:\jqroffijpohtxdk\znffimm.exe |
---|---|
Creates File | C:\jqroffijpohtxdk\ur49bf |
Creates File | C:\jqroffijpohtxdk\znffimm.exe |
Creates File | PIPE\lsarpc |
Creates File | C:\jqroffijpohtxdk\ajfa60us |
Creates File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Deletes File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Creates Process | C:\jqroffijpohtxdk\znffimm.exe |
Creates Service | Multimedia Access Service - C:\jqroffijpohtxdk\znffimm.exe |
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ Pid 804
Process
↳ Pid 852
Process
↳ C:\WINDOWS\System32\svchost.exe
Creates File | pipe\PCHFaultRepExecPipe |
---|
Process
↳ Pid 1208
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝ NULL |
---|---|
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝ 7 |
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝ C:\WINDOWS\System32\spool\PRINTERS\\x00 |
Process
↳ Pid 1880
Process
↳ Pid 1192
Process
↳ C:\jqroffijpohtxdk\znffimm.exe
Creates File | C:\jqroffijpohtxdk\yckdmiisir |
---|---|
Creates File | C:\jqroffijpohtxdk\ur49bf |
Creates File | pipe\net\NtControlPipe10 |
Creates File | C:\jqroffijpohtxdk\rubweirskltb.exe |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\jqroffijpohtxdk\ajfa60us |
Creates File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Deletes File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Creates Process | nnsjnhhh00jd "c:\jqroffijpohtxdk\znffimm.exe" |
Process
↳ C:\jqroffijpohtxdk\znffimm.exe
Creates File | C:\jqroffijpohtxdk\ajfa60us |
---|---|
Creates File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Deletes File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Process
↳ nnsjnhhh00jd "c:\jqroffijpohtxdk\znffimm.exe"
Creates File | C:\jqroffijpohtxdk\ajfa60us |
---|---|
Creates File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Deletes File | C:\WINDOWS\jqroffijpohtxdk\ajfa60us |
Network Details:
Raw Pcap
0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2072 : close..Host: r 0x00000040 (00064) 6573756c 7473746f 726d2e6e 65740d0a esultstorm.net.. 0x00000050 (00080) 0d0a .. 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 65736972 6573746f 726d2e6e 65740d0a esirestorm.net.. 0x00000050 (00080) 0d0a .. 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746874 7261696e 696e672e trengthtraining. 0x00000050 (00080) 6e65740d 0a0d0a net.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746873 746f726d 2e6e6574 trengthstorm.net 0x00000050 (00080) 0d0a0d0a 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 74696c6c 73746f72 6d2e6e65 740d0a0d tillstorm.net... 0x00000050 (00080) 0a0a0d0a 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a206d : close..Host: m 0x00000040 (00064) 6f76656d 656e7463 68617267 652e6e65 ovementcharge.ne 0x00000050 (00080) 740d0a0d 0a0d0a t...... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2062 : close..Host: b 0x00000040 (00064) 75696c64 696e6763 68617267 652e6e65 uildingcharge.ne 0x00000050 (00080) 740d0a0d 0a0d0a t...... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 746f7265 73696e67 6c652e6e 65740d0a toresingle.net.. 0x00000050 (00080) 0d0a0a0d 0a0d0a .......
Strings