Analysis Date2015-08-11 21:24:29
MD546454228346820ccedeb4aa949177750
SHA1952008ba7ad7afd09f248236a93ce6c7e2cf7dd5

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: d0e0e53d63a78b710b62b255f8a2706d sha1: 610bd879cc83be5ae9d76deef8e882b633eba57d size: 160768
Section.rdata md5: f2f670b5d1eb53e66bedae70c8a21dae sha1: f87ee5a381e38ae385345456e8bd3b9bb5ad049a size: 37376
Section.data md5: 0963bbee21d87ece92518e1b5d096d08 sha1: c834b18b8c24f38c44c9e1d913ba1359db253e5a size: 6656
Timestamp2015-03-13 09:09:54
PackerMicrosoft Visual C++ ?.?
PEhashb52b72073e4bd80faabe95b69d3d0c8bc075cfab
IMPhash64c3deae224546056c9d0ab2a5cb52be
AVCA (E-Trust Ino)no_virus
AVAd-AwareGen:Variant.Rodecap.1
AVCAT (quickheal)Trojan.Scar.r3
AVAvira (antivir)TR/Crypt.ZPACK.147147
AVTrend Microno_virus
AVArcabit (arcavir)Error Scanning File
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVIkarusTrojan-Spy.Win32.Nivdort
AVEmsisoftGen:Variant.Rodecap.1
AVBitDefenderGen:Variant.Rodecap.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort!rfn
AVFortinetW32/Rodecap.BJ!tr
AVVirusBlokAda (vba32)no_virus
AVMcafeeTrojan-FEVX!464542283468
AVMalwareBytesTrojan.Agent
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVBullGuardGen:Variant.Rodecap.1
AVClamAVno_virus
AVZillya!no_virus
AVDr. WebTrojan.DownLoader13.12494
AVKasperskyTrojan.Win32.Generic
AVF-SecureGen:Variant.Rodecap.1
AVEset (nod32)Win32/Rodecap.BJ
AVTwisterW32.Rodecap.BJ.feyp
AVFrisk (f-prot)no_virus
AVPadvishno_virus
AVK7Trojan ( 004bda2e1 )
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\kaxpyoaryrsnlt\fenlwgwr
Creates FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Creates FileC:\kaxpyoaryrsnlt\yght1m1ugoqsv1wytojx.exe
Deletes FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Creates ProcessC:\kaxpyoaryrsnlt\yght1m1ugoqsv1wytojx.exe

Process
↳ C:\kaxpyoaryrsnlt\yght1m1ugoqsv1wytojx.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Foundation Protection Tracking Themes ➝
C:\kaxpyoaryrsnlt\aptbzwsprvn.exe
Creates FileC:\kaxpyoaryrsnlt\fenlwgwr
Creates FileC:\kaxpyoaryrsnlt\gkygyq
Creates FileC:\kaxpyoaryrsnlt\aptbzwsprvn.exe
Creates FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Deletes FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Creates ProcessC:\kaxpyoaryrsnlt\aptbzwsprvn.exe
Creates ServiceThread Spooler Visual Manager Registrar Level - C:\kaxpyoaryrsnlt\aptbzwsprvn.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1884

Process
↳ Pid 1172

Process
↳ C:\kaxpyoaryrsnlt\aptbzwsprvn.exe

Creates FileC:\kaxpyoaryrsnlt\fenlwgwr
Creates Filepipe\net\NtControlPipe10
Creates FileC:\kaxpyoaryrsnlt\nbkfjpdt.exe
Creates FileC:\kaxpyoaryrsnlt\gkygyq
Creates File\Device\Afd\Endpoint
Creates FileC:\kaxpyoaryrsnlt\bnovojp2
Creates FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Deletes FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Creates Processyzerxcpawz1j "c:\kaxpyoaryrsnlt\aptbzwsprvn.exe"

Process
↳ C:\kaxpyoaryrsnlt\aptbzwsprvn.exe

Creates FileC:\kaxpyoaryrsnlt\fenlwgwr
Creates FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Deletes FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr

Process
↳ yzerxcpawz1j "c:\kaxpyoaryrsnlt\aptbzwsprvn.exe"

Creates FileC:\kaxpyoaryrsnlt\fenlwgwr
Creates FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr
Deletes FileC:\WINDOWS\kaxpyoaryrsnlt\fenlwgwr

Network Details:

DNSdoctortraining.net
Type: A
184.168.221.34
DNSdoctorstorm.net
Type: A
72.21.91.60
DNSresultstorm.net
Type: A
98.139.135.129
DNSdesirestorm.net
Type: A
195.22.26.253
DNSdesirestorm.net
Type: A
195.22.26.254
DNSdesirestorm.net
Type: A
195.22.26.231
DNSdesirestorm.net
Type: A
195.22.26.252
DNSstrengthtraining.net
Type: A
165.160.15.20
DNSstrengthtraining.net
Type: A
165.160.13.20
DNSstrengthstorm.net
Type: A
50.63.202.27
DNSdoctorhunger.net
Type: A
DNSprettyhunger.net
Type: A
DNSprettytraining.net
Type: A
DNSprettystorm.net
Type: A
DNSdoctorthrown.net
Type: A
DNSprettythrown.net
Type: A
DNSfellowhunger.net
Type: A
DNSdoublehunger.net
Type: A
DNSfellowtraining.net
Type: A
DNSdoubletraining.net
Type: A
DNSfellowstorm.net
Type: A
DNSdoublestorm.net
Type: A
DNSfellowthrown.net
Type: A
DNSdoublethrown.net
Type: A
DNSbrokenhunger.net
Type: A
DNSresulthunger.net
Type: A
DNSbrokentraining.net
Type: A
DNSresulttraining.net
Type: A
DNSbrokenstorm.net
Type: A
DNSbrokenthrown.net
Type: A
DNSresultthrown.net
Type: A
DNSpreparehunger.net
Type: A
DNSdesirehunger.net
Type: A
DNSpreparetraining.net
Type: A
DNSdesiretraining.net
Type: A
DNSpreparestorm.net
Type: A
DNSpreparethrown.net
Type: A
DNSdesirethrown.net
Type: A
DNSstrengthhunger.net
Type: A
DNSstillhunger.net
Type: A
DNSstilltraining.net
Type: A
DNSstillstorm.net
Type: A
DNSstrengththrown.net
Type: A
DNSstillthrown.net
Type: A
DNSmovementchoose.net
Type: A
DNSoutsidechoose.net
Type: A
DNSmovementalthough.net
Type: A
DNSoutsidealthough.net
Type: A
DNSmovementperiod.net
Type: A
DNSoutsideperiod.net
Type: A
DNSmovementhowever.net
Type: A
DNSoutsidehowever.net
Type: A
DNSbuildingchoose.net
Type: A
DNSeveningchoose.net
Type: A
DNSbuildingalthough.net
Type: A
DNSeveningalthough.net
Type: A
DNSbuildingperiod.net
Type: A
DNSeveningperiod.net
Type: A
DNSbuildinghowever.net
Type: A
DNSeveninghowever.net
Type: A
DNSstorechoose.net
Type: A
DNSmightchoose.net
Type: A
DNSstorealthough.net
Type: A
DNSmightalthough.net
Type: A
DNSstoreperiod.net
Type: A
DNSmightperiod.net
Type: A
DNSstorehowever.net
Type: A
DNSmighthowever.net
Type: A
DNSdoctorchoose.net
Type: A
DNSprettychoose.net
Type: A
DNSdoctoralthough.net
Type: A
DNSprettyalthough.net
Type: A
DNSdoctorperiod.net
Type: A
DNSprettyperiod.net
Type: A
DNSdoctorhowever.net
Type: A
DNSprettyhowever.net
Type: A
DNSfellowchoose.net
Type: A
DNSdoublechoose.net
Type: A
DNSfellowalthough.net
Type: A
DNSdoublealthough.net
Type: A
DNSfellowperiod.net
Type: A
DNSdoubleperiod.net
Type: A
DNSfellowhowever.net
Type: A
DNSdoublehowever.net
Type: A
DNSbrokenchoose.net
Type: A
DNSresultchoose.net
Type: A
DNSbrokenalthough.net
Type: A
DNSresultalthough.net
Type: A
DNSbrokenperiod.net
Type: A
HTTP GEThttp://doctortraining.net/index.php?method&len
User-Agent:
HTTP GEThttp://doctorstorm.net/index.php?method&len
User-Agent:
HTTP GEThttp://resultstorm.net/index.php?method&len
User-Agent:
HTTP GEThttp://desirestorm.net/index.php?method&len
User-Agent:
HTTP GEThttp://strengthtraining.net/index.php?method&len
User-Agent:
HTTP GEThttp://strengthstorm.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.34:80
Flows TCP192.168.1.1:1032 ➝ 72.21.91.60:80
Flows TCP192.168.1.1:1033 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1034 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1035 ➝ 165.160.15.20:80
Flows TCP192.168.1.1:1036 ➝ 50.63.202.27:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20646f 63746f72   se..Host: doctor
0x00000050 (00080)   74726169 6e696e67 2e6e6574 0d0a0d0a   training.net....
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20646f 63746f72   se..Host: doctor
0x00000050 (00080)   73746f72 6d2e6e65 740d0a0d 0a0a0d0a   storm.net.......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207265 73756c74   se..Host: result
0x00000050 (00080)   73746f72 6d2e6e65 740d0a0d 0a0a0d0a   storm.net.......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206465 73697265   se..Host: desire
0x00000050 (00080)   73746f72 6d2e6e65 740d0a0d 0a0a0d0a   storm.net.......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207374 72656e67   se..Host: streng
0x00000050 (00080)   74687472 61696e69 6e672e6e 65740d0a   thtraining.net..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207374 72656e67   se..Host: streng
0x00000050 (00080)   74687374 6f726d2e 6e65740d 0a0d0a0a   thstorm.net.....
0x00000060 (00096)   0d0a                                  ..


Strings