Analysis Date2016-01-28 11:02:49
MD5e81c8524f9a7403e455f3681e2a03cf8
SHA191308ed5cb4bed069975dbe78e66f64c371580b1

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 0bb14d1c7c5740cc743953285caea443 sha1: 3f3b97210fdef159b48a3aafc849ea666a995e76 size: 1112576
Section.rdata md5: 93cdeb985f9606fd8bba9703094bbd7c sha1: b047105b089c5b8ac3d38651c7a854c012f2896f size: 309760
Section.data md5: 2d964561eae792f17bb40ed67b477540 sha1: 494a1ff732bf7614b547c17ab849bb049576a338 size: 3072
Section.reloc md5: 479266926446c5d9023daf15eabe112b sha1: 99931aa603f8f5629c9dcf6ccf211e25753a9995 size: 141312
Timestamp2015-09-18 19:55:54
PackerMicrosoft Visual C++ ?.?
PEhashfc429b41cde6df6f0e4b24bb662df6830ac379b8
IMPhash81966d072c998a11431afa661fe981e0
AVRisingNo Virus
AVMcafeeNo Virus
AVAvira (antivir)TR/Nivdort.A.31743
AVTwisterNo Virus
AVAd-AwareGen:Variant.Kazy.794416
AVAlwil (avast)No Virus
AVEset (nod32)Win32/Bayrob.BK
AVGrisoft (avg)Generic37.AECJ
AVSymantecNo Virus
AVFortinetW32/Bayrob.AT!tr
AVBitDefenderGen:Variant.Kazy.794416
AVK7Trojan ( 004da8bd1 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.DF
AVMicroWorld (escan)No Virus
AVMalwareBytesNo Virus
AVAuthentiumNo Virus
AVFrisk (f-prot)No Virus
AVIkarusNo Virus
AVEmsisoftGen:Variant.Kazy.794416
AVZillya!No Virus
AVKasperskyTrojan.Win32.Generic
AVTrend MicroNo Virus
AVCAT (quickheal)No Virus
AVVirusBlokAda (vba32)No Virus
AVBullGuardGen:Variant.Kazy.794416
AVArcabit (arcavir)Gen:Variant.Kazy.794416
AVClamAVNo Virus
AVDr. WebNo Virus
AVF-SecureGen:Variant.Kazy.794416
AVCA (E-Trust Ino)No Virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\WINDOWS\system32\ivrhgnpbmd\tst
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\tslbvcwweypqxhilkefeivpb.exe
Creates FilePIPE\lsarpc
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\tslbvcwweypqxhilkefeivpb.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\tslbvcwweypqxhilkefeivpb.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Tunneling RPC Access SPP WLAN ➝
C:\WINDOWS\system32\cgsgbcnjiupx.exe
Creates FileC:\WINDOWS\system32\cgsgbcnjiupx.exe
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\lck
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\tst
Creates FilePIPE\lsarpc
Creates ProcessC:\WINDOWS\system32\cgsgbcnjiupx.exe
Creates ServiceWorkstation Spooler Process Internet - C:\WINDOWS\system32\cgsgbcnjiupx.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\LogonTime ➝
NULL
Creates FileWMIDataDevice

Process
↳ Pid 1852

Process
↳ Pid 1144

Process
↳ C:\WINDOWS\system32\cgsgbcnjiupx.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\cfg
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\rng
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\lck
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\tst
Creates FileC:\WINDOWS\TEMP\tslbvcww94s72vilk.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\ivznffzqqwh.exe
Creates FileC:\WINDOWS\system32\ivrhgnpbmd\run
Creates ProcessC:\WINDOWS\TEMP\tslbvcww94s72vilk.exe -r 47365 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\cgsgbcnjiupx.exe"

Process
↳ c:\windows\system32\cgsgbcnjiupx.exe

Creates FileC:\WINDOWS\system32\ivrhgnpbmd\tst

Process
↳ C:\WINDOWS\system32\cgsgbcnjiupx.exe

Creates FileC:\WINDOWS\system32\ivrhgnpbmd\tst
Creates FilePIPE\lsarpc

Process
↳ WATCHDOGPROC "c:\windows\system32\cgsgbcnjiupx.exe"

Creates FileC:\WINDOWS\system32\ivrhgnpbmd\tst
Creates Processc:\windows\system32\cgsgbcnjiupx.exe

Process
↳ C:\WINDOWS\TEMP\tslbvcww94s72vilk.exe -r 47365 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSdoubleobject.net
Type: A
69.195.124.153
DNSbrokenthird.net
Type: A
74.220.215.249
DNSriddenstorm.net
Type: A
66.147.240.171
DNSgentleangry.net
Type: A
98.139.135.129
DNSsimonettedwerryhouse.net
Type: A
98.139.135.129
DNSmorningduring.net
Type: A
98.139.135.129
DNSwifeabout.net
Type: A
98.139.135.129
DNScasestep.net
Type: A
98.139.135.129
DNSwestboat.net
Type: A
213.186.33.104
DNSwestrest.net
Type: A
208.100.26.234
DNSleadpress.net
Type: A
98.124.199.4
DNSmightspecial.net
Type: A
DNSdulcibellamartinson.net
Type: A
DNSmariabellabotwright.net
Type: A
DNSsimonettesherisse.net
Type: A
DNSdecidebetween.net
Type: A
DNSaloneneighbor.net
Type: A
DNSgwendolynhuddleston.net
Type: A
DNSseasonstrong.net
Type: A
DNSoftensurprise.net
Type: A
DNSchiefanother.net
Type: A
DNSfearkind.net
Type: A
DNSwestkind.net
Type: A
DNStablewild.net
Type: A
DNSleadwild.net
Type: A
DNStablejune.net
Type: A
DNSleadjune.net
Type: A
DNStablebegan.net
Type: A
DNSleadbegan.net
Type: A
DNStablekind.net
Type: A
DNSleadkind.net
Type: A
DNSpointwild.net
Type: A
DNScallwild.net
Type: A
DNSpointjune.net
Type: A
DNScalljune.net
Type: A
DNSpointbegan.net
Type: A
DNScallbegan.net
Type: A
DNSpointkind.net
Type: A
DNScallkind.net
Type: A
DNSnonewild.net
Type: A
DNSliarwild.net
Type: A
DNSnonejune.net
Type: A
DNSliarjune.net
Type: A
DNSnonebegan.net
Type: A
DNSliarbegan.net
Type: A
DNSnonekind.net
Type: A
DNSliarkind.net
Type: A
DNSwellwild.net
Type: A
DNSnosewild.net
Type: A
DNSwelljune.net
Type: A
DNSnosejune.net
Type: A
DNSwellbegan.net
Type: A
DNSnosebegan.net
Type: A
DNSwellkind.net
Type: A
DNSnosekind.net
Type: A
DNSringwild.net
Type: A
DNSfavorwild.net
Type: A
DNSringjune.net
Type: A
DNSfavorjune.net
Type: A
DNSringbegan.net
Type: A
DNSfavorbegan.net
Type: A
DNSringkind.net
Type: A
DNSfavorkind.net
Type: A
DNSsorryboat.net
Type: A
DNSfiftyboat.net
Type: A
DNSsorrypress.net
Type: A
DNSfiftypress.net
Type: A
DNSsorryrest.net
Type: A
DNSfiftyrest.net
Type: A
DNSsorryopen.net
Type: A
DNSfiftyopen.net
Type: A
DNStheirboat.net
Type: A
DNSlikrboat.net
Type: A
DNStheirpress.net
Type: A
DNSlikrpress.net
Type: A
DNStheirrest.net
Type: A
DNSlikrrest.net
Type: A
DNStheiropen.net
Type: A
DNSlikropen.net
Type: A
DNSfearboat.net
Type: A
DNSfearpress.net
Type: A
DNSwestpress.net
Type: A
DNSfearrest.net
Type: A
DNSfearopen.net
Type: A
DNSwestopen.net
Type: A
DNStableboat.net
Type: A
DNSleadboat.net
Type: A
DNStablepress.net
Type: A
DNStablerest.net
Type: A
DNSleadrest.net
Type: A
DNStableopen.net
Type: A
DNSleadopen.net
Type: A
DNSpointboat.net
Type: A
DNScallboat.net
Type: A
DNSpointpress.net
Type: A
DNScallpress.net
Type: A
DNSpointrest.net
Type: A
DNScallrest.net
Type: A
DNSpointopen.net
Type: A
HTTP GEThttp://doubleobject.net/index.php
User-Agent:
HTTP GEThttp://brokenthird.net/index.php
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php
User-Agent:
HTTP GEThttp://gentleangry.net/index.php
User-Agent:
HTTP GEThttp://simonettedwerryhouse.net/index.php
User-Agent:
HTTP GEThttp://morningduring.net/index.php
User-Agent:
HTTP GEThttp://wifeabout.net/index.php
User-Agent:
HTTP GEThttp://casestep.net/index.php
User-Agent:
HTTP GEThttp://westboat.net/index.php
User-Agent:
HTTP GEThttp://westrest.net/index.php
User-Agent:
HTTP GEThttp://leadpress.net/index.php
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 69.195.124.153:80
Flows TCP192.168.1.1:1037 ➝ 74.220.215.249:80
Flows TCP192.168.1.1:1038 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1040 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1041 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1042 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1043 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1044 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1045 ➝ 213.186.33.104:80
Flows TCP192.168.1.1:1046 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1047 ➝ 98.124.199.4:80

Raw Pcap

Strings