Analysis Date2014-06-20 07:52:21
MD562d0d46626e05499b080f9d68ee0d63c
SHA1a0ca95cb4d9399162712d478f28c82d30063d0cc

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: 30dd9c20c3e07fef25d4b2e522986640 sha1: 5d10e2ccea725cd68c5038b95c7e5f8eb53a4340 size: 174080
Section.rdata md5: 87929dc6ce4286045bb577ac6a5663b0 sha1: 4529471c318bf237da4c2573a2f4b7dfce428db7 size: 2048
Section.data md5: aa83ab78765afa8e55a08c04f78889b4 sha1: c21af60b58e4382c4f877ea52d81ae0118d1c7a4 size: 18944
Section.lib md5: a0aa577f56d780247551ae89b7e4658e sha1: fef47b6ab36b797c0e406afc98a6b218a7d699e2 size: 512
Timestamp2005-10-26 19:13:50
VersionPrivateBuild: 1396
PEhash545b869cb950d7608523525628ae5ed94a569c07
IMPhashd74c040955331876ee03b49aa2408c1a

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝
C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates Mutex{4D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{EEEB680D-AE62-4375-B93E-E9AE5FF585C1}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS127.0.0.1
Winsock DNSweb20ikastaroa.wikispaces.com
Winsock DNSelworldonline.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNSwikispaces.com
Type: A
75.126.104.177
DNSwikispaces.com
Type: A
208.43.192.33
DNSzonetf.com
Type: A
208.73.211.246
DNSzonetf.com
Type: A
208.73.211.235
DNSzonetf.com
Type: A
208.73.211.233
DNSzonetf.com
Type: A
208.73.211.174
DNSzonetf.com
Type: A
208.73.210.219
DNSzonetf.com
Type: A
208.73.210.219
DNSzonetf.com
Type: A
208.73.211.246
DNSzonetf.com
Type: A
208.73.211.235
DNSzonetf.com
Type: A
208.73.211.233
DNSzonetf.com
Type: A
208.73.211.174
DNSweb20ikastaroa.wikispaces.com
Type: A
DNSelworldonline.com
Type: A
HTTP GEThttp://web20ikastaroa.wikispaces.com/file/view/Observa3.jpg/45498543/Observa3.jpg?v18=7&tq=gKZEtzytXEsZULc7buNYvz%2BJTgshg9OQUaDItUJe3VvyiaNSX5ycMiejWlyU%2F0kaZq3%2BSNrTIQwRedhAPRvYCHbmfZpxikRetM3RjAdVy%2FY%2BwcAMq%2BsT4qeZVF6AuU9l5HrHI2JseqNABfTARIRWXUNFhwNIONQ2lj7pr2Wf0Y4g5vAir4GpHMSyriLSoWybYoQ%2FxIs4bRCn%2FTx7hV0UvaToakamk3La6fQRF0z98dRa8TMSanBf4H6
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJkX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxVKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJkX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJtX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 75.126.104.177:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.246:80
Flows TCP192.168.1.1:1034 ➝ 208.73.210.219:80

Raw Pcap
0x00000000 (00000)   47455420 2f66696c 652f7669 65772f4f   GET /file/view/O
0x00000010 (00016)   62736572 7661332e 6a70672f 34353439   bserva3.jpg/4549
0x00000020 (00032)   38353433 2f4f6273 65727661 332e6a70   8543/Observa3.jp
0x00000030 (00048)   673f7631 383d3726 74713d67 4b5a4574   g?v18=7&tq=gKZEt
0x00000040 (00064)   7a797458 45735a55 4c633762 754e5976   zytXEsZULc7buNYv
0x00000050 (00080)   7a253242 4a546773 6867394f 51556144   z%2BJTgshg9OQUaD
0x00000060 (00096)   4974554a 65335676 7969614e 53583579   ItUJe3VvyiaNSX5y
0x00000070 (00112)   634d6965 6a576c79 55253246 306b615a   cMiejWlyU%2F0kaZ
0x00000080 (00128)   71332532 42534e72 54495177 52656468   q3%2BSNrTIQwRedh
0x00000090 (00144)   41505276 59434862 6d665a70 78696b52   APRvYCHbmfZpxikR
0x000000a0 (00160)   65744d33 526a4164 56792532 46592532   etM3RjAdVy%2FY%2
0x000000b0 (00176)   42776341 4d712532 42735434 71655a56   BwcAMq%2BsT4qeZV
0x000000c0 (00192)   46364175 55396c35 48724849 324a7365   F6AuU9l5HrHI2Jse
0x000000d0 (00208)   714e4142 66544152 49525758 554e4668   qNABfTARIRWXUNFh
0x000000e0 (00224)   774e494f 4e51326c 6a377072 32576630   wNIONQ2lj7pr2Wf0
0x000000f0 (00240)   59346735 76416972 34477048 4d537972   Y4g5vAir4GpHMSyr
0x00000100 (00256)   694c536f 57796259 6f512532 46784973   iLSoWybYoQ%2FxIs
0x00000110 (00272)   34625243 6e253246 54783768 56305576   4bRCn%2FTx7hV0Uv
0x00000120 (00288)   61546f61 6b616d6b 334c6136 66515246   aToakamk3La6fQRF
0x00000130 (00304)   307a3938 64526138 544d5361 6e426634   0z98dRa8TMSanBf4
0x00000140 (00320)   48362048 5454502f 312e300d 0a436f6e   H6 HTTP/1.0..Con
0x00000150 (00336)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000160 (00352)   486f7374 3a207765 62323069 6b617374   Host: web20ikast
0x00000170 (00368)   61726f61 2e77696b 69737061 6365732e   aroa.wikispaces.
0x00000180 (00384)   636f6d0d 0a416363 6570743a 202a2f2a   com..Accept: */*
0x00000190 (00400)   0d0a5573 65722d41 67656e74 3a206d6f   ..User-Agent: mo
0x000001a0 (00416)   7a696c6c 612f322e 300d0a0d 0a         zilla/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a6b5825 32425039 68253242 49307344   JkX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78564b76 39373558   JuX%2BSNxVKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a636c6f 73650d0a   close....close..
0x00000160 (00352)   486f7374 3a207765 62323069 6b617374   Host: web20ikast
0x00000170 (00368)   61726f61 2e77696b 69737061 6365732e   aroa.wikispaces.
0x00000180 (00384)   636f6d0d 0a416363 6570743a 202a2f2a   com..Accept: */*
0x00000190 (00400)   0d0a5573 65722d41 67656e74 3a206d6f   ..User-Agent: mo
0x000001a0 (00416)   7a696c6c 612f322e 300d0a0d 0a         zilla/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a6b5825 32425039 68253242 49307344   JkX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a74   OhLgjh88y%2BcoJt
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a0d 0a636c6f 73650d0a   ose......close..
0x00000160 (00352)   486f7374 3a207765 62323069 6b617374   Host: web20ikast
0x00000170 (00368)   61726f61 2e77696b 69737061 6365732e   aroa.wikispaces.
0x00000180 (00384)   636f6d0d 0a416363 6570743a 202a2f2a   com..Accept: */*
0x00000190 (00400)   0d0a5573 65722d41 67656e74 3a206d6f   ..User-Agent: mo
0x000001a0 (00416)   7a696c6c 612f322e 300d0a0d 0a         zilla/2.0....


Strings
.%oK.s..[.."-.3:.f.
.Q.
...+9(.c(
.bsV.]...
...}s....-{,<G...-..=%..
.UA..G.T..]
.J...J.
..|E...
D..
).=*
..I...........#<.o..0..V.........l...
..7 .........
.|....
B.
~..~.W
.
0".~...Ue&.p..A
...
.}Mt=.
v
.
.
..
040904b0
1396
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
:|~0'B
4T8yT_U)4
}4Tj*x
(7~^<"
7J4<UF
}7[R~\
7wt7Lo
:7}%ztx
8]495{"
8k(=mB
b CtL\ZU
BW7_{k
CallNextHookEx
ChildWindowFromPoint
ClipCursor
COMCTL32.dll
comdlg32.dll
CompareStringW
CreateFiber
':[cw[
@.data
DefWindowProcW
DestroyCursor
DestroyIcon
DrawEdge
}Dy<P?
E]1^%A
EmptyClipboard
EnumResourceNamesW
;FC0Ma
fC%Gj!h
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceExA
FlushFileBuffers
GetFileAttributesA
GetFileTime
GetFileTitleA
GetFileType
GetProfileStringW
GetSysColor
GetSysColorBrush
GetSystemDirectoryW
GetSystemTime
GetUserDefaultLangID
GetVersionExW
GetVolumeInformationW
G`&?;,@l
/hOLvHf
i(/\L|
ilL'Ya
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_GetIconSize
IsClipboardFormatAvailable
IsDBCSLeadByte
Itr%_R
i~{()x
=#*_j@
JRichu
KERNEL32.dll
KI	}u\
ki{Z\@
~K_*jK
]K&(vS
KV_\	WD
lDVWL[
lL1/0}$oW
LocalAlloc
LockFile
_l.vY(
M>=.;.0
MonitorFromWindow
M\^TZ,
NdrClientCall
\o),95
 o:i6]
O;wX|}
PathCanonicalizeW
PathCombineW
PathIsRelativeW
PathIsRootW
PathIsURLW
PathStripToRootW
@Q?-$B(
qm99aq
R63[v<
`.rdata
RegisterClassW
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RPCRT4.dll
RpcStringBindingComposeA
RpcStringFreeA
SearchPathW
SetClipboardData
SetEndOfFile
SetScrollRange
SetWindowPos
SetWindowsHookExW
SHLWAPI.dll
SVS704
*)}t9g
!This program cannot be run in DOS mode.
ToAscii
t/yK9T|
UnhookWindowsHookEx
UnlockFile
USER32.dll
U^/vM,>
^	V<?"
VerLanguageNameW
*VL4r"q
V}odGu
WinHelpW
W>l9W:
WriteFileGather
+W=+Y'
x-m2-T
-=X-&@$x
Y(<1zOj7C
Y4yL^m9x 
YmbmNI
y\P;:x
;	YyADH
z`{|UQ