Analysis Date | 2015-08-15 02:04:31 |
---|---|
MD5 | 1d4bf8c27d827e4a1dd1702723f11d58 |
SHA1 | 8f8ea7ef50a0e7a848f29741f2a55c511f854ca2 |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: ee4987802e3a6fc2f2eb0d9c8084de40 sha1: 357c1ede37131331d3c38bce82a2088923681901 size: 313344 | |
Section | .rdata md5: f1321e85ffb6c537770a56b151875a82 sha1: 343990107e221d47efcf0f179c74fd37e637082d size: 60416 | |
Section | .data md5: a2cabd39e3042b2e158036a9b3431268 sha1: d859625616536e02fcdf4147fe11d9584dfe9cb2 size: 7680 | |
Section | .reloc md5: 65d9894f0e8a5a3a459db342cad383ba sha1: 7caec84b7de5c0d7d0f9f1378019324cd8414ee4 size: 25088 | |
Timestamp | 2015-05-11 07:02:37 | |
Packer | Microsoft Visual C++ 8 | |
PEhash | 92ef373417fb5197caad0c25d655b6c9d8eaf486 | |
IMPhash | 1b603153bc552ff9f93e6beb95956be4 | |
AV | CA (E-Trust Ino) | no_virus |
AV | F-Secure | Gen:Variant.Kazy.611009 |
AV | Dr. Web | Trojan.Bayrob.1 |
AV | ClamAV | no_virus |
AV | Arcabit (arcavir) | Gen:Variant.Kazy.611009 |
AV | BullGuard | Gen:Variant.Kazy.611009 |
AV | Padvish | no_virus |
AV | VirusBlokAda (vba32) | no_virus |
AV | CAT (quickheal) | TrojanSpy.Nivdort.OD4 |
AV | Trend Micro | TROJ_BAYROB.SM0 |
AV | Kaspersky | Trojan.Win32.Generic |
AV | Zillya! | no_virus |
AV | Emsisoft | Gen:Variant.Kazy.611009 |
AV | Ikarus | Trojan.Win32.Bayrob |
AV | Frisk (f-prot) | no_virus |
AV | Authentium | W32/Nivdort.B.gen!Eldorado |
AV | MalwareBytes | Trojan.Agent.KVTGen |
AV | MicroWorld (escan) | Gen:Variant.Kazy.611009 |
AV | Microsoft Security Essentials | TrojanSpy:Win32/Nivdort |
AV | K7 | Trojan ( 004c3a4d1 ) |
AV | BitDefender | Gen:Variant.Kazy.611009 |
AV | Fortinet | W32/Bayrob.T!tr |
AV | Symantec | Downloader.Upatre!g15 |
AV | Grisoft (avg) | Win32/Cryptor |
AV | Eset (nod32) | Win32/Bayrob.V.gen |
AV | Alwil (avast) | Malware-gen:Win32:Malware-gen |
AV | Ad-Aware | Gen:Variant.Kazy.611009 |
AV | Twister | no_virus |
AV | Avira (antivir) | TR/Spy.ZBot.xbbeomq |
AV | Mcafee | PWS-FCCE!1D4BF8C27D82 |
AV | Rising | Trojan.Win32.Bayrod.b |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\mykgwzh\ausy1kgjh76beylesxm.exe |
---|---|
Creates File | C:\mykgwzh\mxjceng |
Creates File | C:\WINDOWS\mykgwzh\mxjceng |
Deletes File | C:\WINDOWS\mykgwzh\mxjceng |
Creates Process | C:\mykgwzh\ausy1kgjh76beylesxm.exe |
Process
↳ C:\mykgwzh\ausy1kgjh76beylesxm.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Trap VC Proxy Event Port Tunneling ➝ C:\mykgwzh\bfdnmgzmci.exe |
---|---|
Creates File | C:\mykgwzh\mxjceng |
Creates File | C:\mykgwzh\x8d2ibcpdcft |
Creates File | PIPE\lsarpc |
Creates File | C:\mykgwzh\bfdnmgzmci.exe |
Creates File | C:\WINDOWS\mykgwzh\mxjceng |
Deletes File | C:\WINDOWS\mykgwzh\mxjceng |
Creates Process | C:\mykgwzh\bfdnmgzmci.exe |
Creates Service | Connection Process Session Credential Software - C:\mykgwzh\bfdnmgzmci.exe |
Process
↳ Pid 808
Process
↳ Pid 852
Process
↳ C:\WINDOWS\System32\svchost.exe
Creates File | C:\WINDOWS\system32\WBEM\Logs\wbemess.log |
---|
Process
↳ Pid 1120
Process
↳ Pid 1208
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝ NULL |
---|---|
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝ 7 |
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝ C:\WINDOWS\System32\spool\PRINTERS\\x00 |
Process
↳ Pid 1856
Process
↳ Pid 1148
Process
↳ C:\mykgwzh\bfdnmgzmci.exe
Creates File | pipe\net\NtControlPipe10 |
---|---|
Creates File | C:\mykgwzh\ywitjbu |
Creates File | C:\mykgwzh\xfranlbopnu.exe |
Creates File | C:\mykgwzh\mxjceng |
Creates File | C:\mykgwzh\x8d2ibcpdcft |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\WINDOWS\mykgwzh\mxjceng |
Deletes File | C:\WINDOWS\mykgwzh\mxjceng |
Creates Process | locyzyttoraq "c:\mykgwzh\bfdnmgzmci.exe" |
Process
↳ C:\mykgwzh\bfdnmgzmci.exe
Creates File | C:\mykgwzh\mxjceng |
---|---|
Creates File | C:\WINDOWS\mykgwzh\mxjceng |
Deletes File | C:\WINDOWS\mykgwzh\mxjceng |
Process
↳ locyzyttoraq "c:\mykgwzh\bfdnmgzmci.exe"
Creates File | C:\mykgwzh\mxjceng |
---|---|
Creates File | C:\WINDOWS\mykgwzh\mxjceng |
Deletes File | C:\WINDOWS\mykgwzh\mxjceng |
Network Details:
Raw Pcap
0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2066 : close..Host: f 0x00000040 (00064) 616d696c 79747261 696e696e 672e6e65 amilytraining.ne 0x00000050 (00080) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2065 : close..Host: e 0x00000040 (00064) 6e676c69 73687472 61696e69 6e672e6e nglishtraining.n 0x00000050 (00080) 65740d0a 0d0a et.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2065 : close..Host: e 0x00000040 (00064) 78706563 74686f77 65766572 2e6e6574 xpecthowever.net 0x00000050 (00080) 0d0a0d0a 0d0a ......
Strings