Analysis Date2015-11-05 08:04:45
MD5a7e905069aaaf5677f3c5e5173f72000
SHA19224d58a0b213c00c5610de336e61e9f94f784a0

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: ffce17450faf228cb5f36ea5f9470bb4 sha1: 9e973d0884c9c9c413b52814b694a98274be2d74 size: 1398272
Section.rdata md5: 031691124e5cb1c68080846812e171ae sha1: f119fcf81ab1edf201044386e08b58cbab3a7fdb size: 302592
Section.data md5: b8a68ad52fbf498226a26d8e05b2c06a sha1: 86c0750fb4f1395cb30b032fbfe5a4821c6be7c1 size: 8192
Section.reloc md5: bdd16d809ff23742cdb2e63f9dc1b9ce sha1: 5c728d957da1f0b397d467f08ef24c96920093e0 size: 196608
Timestamp2015-05-11 04:27:01
PackerVC8 -> Microsoft Corporation
PEhashc9b516adbf404fe882a0337020e2db5ce3d014ba
IMPhash210122518939741d853e5a0cec7565a3
AVRisingno_virus
AVMcafeeTrojan-FGIJ!A7E905069AAA
AVAvira (antivir)TR/Crypt.Xpack.308983
AVTwisterno_virus
AVAd-AwareGen:Variant.Diley.1
AVAlwil (avast)Dropper-OJQ [Drp]
AVEset (nod32)Win32/Bayrob.Y
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Bayrob.X!tr
AVBitDefenderGen:Variant.Diley.1
AVK7Trojan ( 004c77f41 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort!rfn
AVMicroWorld (escan)Gen:Variant.Diley.1
AVMalwareBytesno_virus
AVAuthentiumW32/SoxGrave.A.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Bayrob
AVEmsisoftGen:Variant.Diley.1
AVZillya!no_virus
AVKasperskyTrojan.Win32.Generic
AVTrend Microno_virus
AVCAT (quickheal)no_virus
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Diley.1
AVArcabit (arcavir)Gen:Variant.Diley.1
AVClamAVno_virus
AVDr. WebTrojan.Bayrob.5
AVF-SecureGen:Variant.Diley.1
AVCA (E-Trust Ino)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\gzeb6r1l34jxlcwhghke7.exe
Creates FileC:\WINDOWS\system32\cauzhhvlmp\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\gzeb6r1l34jxlcwhghke7.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\gzeb6r1l34jxlcwhghke7.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Counter Locator Profile Quality ➝
C:\WINDOWS\system32\mniprcv.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\cauzhhvlmp\etc
Creates FileC:\WINDOWS\system32\cauzhhvlmp\tst
Creates FileC:\WINDOWS\system32\cauzhhvlmp\lck
Creates FileC:\WINDOWS\system32\mniprcv.exe
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\mniprcv.exe
Creates ServiceCompatibility User BitLocker Logs - C:\WINDOWS\system32\mniprcv.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1868

Process
↳ Pid 1156

Process
↳ C:\WINDOWS\system32\mniprcv.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\TEMP\gzeb6r1so4jxlc.exe
Creates FileC:\WINDOWS\system32\cauzhhvlmp\rng
Creates FileC:\WINDOWS\system32\cauzhhvlmp\tst
Creates FileC:\WINDOWS\system32\cauzhhvlmp\lck
Creates FileC:\WINDOWS\system32\cauzhhvlmp\cfg
Creates FileC:\WINDOWS\system32\cauzhhvlmp\run
Creates FileC:\WINDOWS\system32\rdqylffu.exe
Creates Filepipe\net\NtControlPipe10
Creates File\Device\Afd\Endpoint
Creates ProcessC:\WINDOWS\TEMP\gzeb6r1so4jxlc.exe -r 38771 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\mniprcv.exe"

Process
↳ C:\WINDOWS\system32\mniprcv.exe

Creates FileC:\WINDOWS\system32\cauzhhvlmp\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\mniprcv.exe"

Creates FileC:\WINDOWS\system32\cauzhhvlmp\tst

Process
↳ C:\WINDOWS\TEMP\gzeb6r1so4jxlc.exe -r 38771 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSrecordsoldier.net
Type: A
208.91.197.241
DNSfliersurprise.net
Type: A
208.91.197.241
DNShistorybright.net
Type: A
208.91.197.241
DNSchiefsoldier.net
Type: A
208.91.197.241
DNSclasssurprise.net
Type: A
208.91.197.241
DNSthosecontinue.net
Type: A
208.91.197.241
DNSthroughcontain.net
Type: A
208.91.197.241
DNSbelongguard.net
Type: A
208.91.197.241
DNSmaybellinethaddeus.net
Type: A
208.91.197.241
DNSkimberleyshavonne.net
Type: A
208.91.197.241
DNSnaildeep.com
Type: A
74.220.215.218
DNSriddenstorm.net
Type: A
66.147.240.171
DNSdestroystorm.net
Type: A
216.239.138.86
DNSwatchfind.net
Type: A
69.172.201.208
DNSwatchwear.net
Type: A
184.168.221.96
DNSfairwear.net
Type: A
208.91.197.27
DNSdreamwear.net
Type: A
185.53.177.8
DNSspothelp.net
Type: A
184.168.221.40
DNSgrouphelp.net
Type: A
193.34.69.203
DNSfairhelp.net
Type: A
193.254.184.80
DNSwatchnovember.net
Type: A
208.100.26.234
DNShusbandfound.net
Type: A
DNSleadershort.net
Type: A
DNSeggbraker.com
Type: A
DNSithouneed.com
Type: A
DNSequalhurt.net
Type: A
DNSgrouphurt.net
Type: A
DNSspoketold.net
Type: A
DNSvisittold.net
Type: A
DNSspokefind.net
Type: A
DNSvisitfind.net
Type: A
DNSspokewear.net
Type: A
DNSvisitwear.net
Type: A
DNSspokehurt.net
Type: A
DNSvisithurt.net
Type: A
DNSwatchtold.net
Type: A
DNSfairtold.net
Type: A
DNSfairfind.net
Type: A
DNSwatchhurt.net
Type: A
DNSfairhurt.net
Type: A
DNSdreamtold.net
Type: A
DNSthistold.net
Type: A
DNSdreamfind.net
Type: A
DNSthisfind.net
Type: A
DNSthiswear.net
Type: A
DNSdreamhurt.net
Type: A
DNSthishurt.net
Type: A
DNSariveslow.net
Type: A
DNSsouthslow.net
Type: A
DNSarivefebruary.net
Type: A
DNSsouthfebruary.net
Type: A
DNSarivehelp.net
Type: A
DNSsouthhelp.net
Type: A
DNSarivenovember.net
Type: A
DNSsouthnovember.net
Type: A
DNSuponslow.net
Type: A
DNSwhichslow.net
Type: A
DNSuponfebruary.net
Type: A
DNSwhichfebruary.net
Type: A
DNSuponhelp.net
Type: A
DNSwhichhelp.net
Type: A
DNSuponnovember.net
Type: A
DNSwhichnovember.net
Type: A
DNSspotslow.net
Type: A
DNSsaltslow.net
Type: A
DNSspotfebruary.net
Type: A
DNSsaltfebruary.net
Type: A
DNSsalthelp.net
Type: A
DNSspotnovember.net
Type: A
DNSsaltnovember.net
Type: A
DNSgladslow.net
Type: A
DNStakenslow.net
Type: A
DNSgladfebruary.net
Type: A
DNStakenfebruary.net
Type: A
DNSgladhelp.net
Type: A
DNStakenhelp.net
Type: A
DNSgladnovember.net
Type: A
DNStakennovember.net
Type: A
DNSequalslow.net
Type: A
DNSgroupslow.net
Type: A
DNSequalfebruary.net
Type: A
DNSgroupfebruary.net
Type: A
DNSequalhelp.net
Type: A
DNSequalnovember.net
Type: A
DNSgroupnovember.net
Type: A
DNSspokeslow.net
Type: A
DNSvisitslow.net
Type: A
DNSspokefebruary.net
Type: A
DNSvisitfebruary.net
Type: A
DNSspokehelp.net
Type: A
DNSvisithelp.net
Type: A
DNSspokenovember.net
Type: A
DNSvisitnovember.net
Type: A
DNSwatchslow.net
Type: A
DNSfairslow.net
Type: A
DNSwatchfebruary.net
Type: A
DNSfairfebruary.net
Type: A
DNSwatchhelp.net
Type: A
DNSfairnovember.net
Type: A
DNSdreamslow.net
Type: A
DNSthisslow.net
Type: A
DNSdreamfebruary.net
Type: A
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://watchfind.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://watchwear.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://fairwear.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://dreamwear.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://spothelp.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://grouphelp.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://fairhelp.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://watchnovember.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://watchfind.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://watchwear.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://fairwear.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://dreamwear.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://spothelp.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://grouphelp.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://fairhelp.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
HTTP GEThttp://watchnovember.net/index.php?method=validate&mode=sox&v=050&sox=4e9af402&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1037 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1043 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1046 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1047 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1048 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1049 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1050 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1051 ➝ 184.168.221.96:80
Flows TCP192.168.1.1:1052 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1053 ➝ 185.53.177.8:80
Flows TCP192.168.1.1:1054 ➝ 184.168.221.40:80
Flows TCP192.168.1.1:1055 ➝ 193.34.69.203:80
Flows TCP192.168.1.1:1056 ➝ 193.254.184.80:80
Flows TCP192.168.1.1:1057 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1058 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1059 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1060 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1061 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1062 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1063 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1064 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1065 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1066 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1067 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1068 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1069 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1070 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1071 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1072 ➝ 184.168.221.96:80
Flows TCP192.168.1.1:1073 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1074 ➝ 185.53.177.8:80
Flows TCP192.168.1.1:1075 ➝ 184.168.221.40:80
Flows TCP192.168.1.1:1076 ➝ 193.34.69.203:80
Flows TCP192.168.1.1:1077 ➝ 193.254.184.80:80
Flows TCP192.168.1.1:1078 ➝ 208.100.26.234:80

Raw Pcap

Strings