Analysis Date2015-11-01 13:39:20
MD5b4cb922d6369c950d73cc0575d8e0869
SHA1a3c624f12746e3958a2c5547085b7d20d89df9d5

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: dc2712c77411ed3516f10c024eb910bf sha1: def59cc13197b19d52007590257106d0008f8574 size: 794112
Section.rdata md5: bb22f34f1e50779cc5deb5e20da26db1 sha1: edcfafe404b19952ca1efd386c381dad576aefd2 size: 59392
Section.data md5: 05668e66faacc5eb83abb657f8fb4d72 sha1: 4f59e55aca976804e3680ac52c22e9efe92755fc size: 398848
Timestamp2014-09-05 11:47:26
PackerMicrosoft Visual C++ ?.?
PEhash901f07c3af307561fd6408c46516c1b29e1a6ae6
IMPhash5e48edf65ef147e95e71113be1eb13e1
AVDr. WebTrojan.KillFiles.30556
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVEmsisoftGen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AE
AVSymantecDownloader.Upatre!g15
AVEset (nod32)Win32/Kryptik.CCLE
AVPadvishno_virus
AVCA (E-Trust Ino)no_virus
AVFortinetW32/Kryptik.DDQD!tr
AVAvira (antivir)TR/Crypt.Xpack.307401
AVTrend MicroTROJ_WONTON.SMJ1
AVFrisk (f-prot)no_virus
AVAlwil (avast)Kryptik-OOC [Trj]
AVClamAVno_virus
AVF-SecureGen:Variant.Symmi.22722
AVMcafeeno_virus
AVTwisterTrojan.Agent.VNC.aanx.mg
AVGrisoft (avg)Win32/Cryptor
AVBitDefenderGen:Variant.Symmi.22722
AVRisingno_virus
AVIkarusTrojan.Win32.Crypt
AVAd-AwareGen:Variant.Symmi.22722
AVCAT (quickheal)no_virus
AVK7Trojan ( 004cd0081 )
AVVirusBlokAda (vba32)no_virus
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVKasperskyTrojan.Win32.Generic
AVBullGuardGen:Variant.Symmi.22722
AVMalwareBytesno_virus
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\xthew91l1tyegsdanlu1b.exe
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\xthew91l1tyegsdanlu1b.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\xthew91l1tyegsdanlu1b.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Panel Transfer Class Internet Management ➝
C:\WINDOWS\system32\tejnitjkewnn.exe
Creates FileC:\WINDOWS\system32\tejnitjkewnn.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\etc
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\lck
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\tejnitjkewnn.exe
Creates ServiceSocket Audio Peer iSCSI Print Configuration - C:\WINDOWS\system32\tejnitjkewnn.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1112

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1864

Process
↳ Pid 1176

Process
↳ C:\WINDOWS\system32\tejnitjkewnn.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\run
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\lck
Creates FileC:\WINDOWS\system32\imzsypuyneag.exe
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\rng
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\ijcitwmshnedph\cfg
Creates FileC:\WINDOWS\TEMP\xthew91rq9yeg.exe
Creates ProcessC:\WINDOWS\TEMP\xthew91rq9yeg.exe -r 35243 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\tejnitjkewnn.exe"

Process
↳ C:\WINDOWS\system32\tejnitjkewnn.exe

Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\tejnitjkewnn.exe"

Creates FileC:\WINDOWS\system32\ijcitwmshnedph\tst

Process
↳ C:\WINDOWS\TEMP\xthew91rq9yeg.exe -r 35243 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSsaltsecond.net
Type: A
74.220.199.6
DNSdeadbody.net
Type: A
64.74.223.34
DNSrockbody.net
Type: A
66.96.161.129
DNShumancolor.net
Type: A
219.94.203.116
DNShaircolor.net
Type: A
185.53.177.30
DNShaironly.net
Type: A
62.116.130.8
DNSmusicfeel.net
Type: A
89.161.255.8
DNSmusichigh.net
Type: A
64.29.151.221
DNSmusiconly.net
Type: A
207.148.248.143
DNSspendhigh.net
Type: A
208.100.26.234
DNSfrontfeel.net
Type: A
195.22.26.231
DNSfrontfeel.net
Type: A
195.22.26.252
DNSfrontfeel.net
Type: A
195.22.26.253
DNSfrontfeel.net
Type: A
195.22.26.254
DNSwishhigh.net
Type: A
69.64.147.242
DNSrockfeel.net
Type: A
211.196.153.94
DNShumanguide.net
Type: A
141.8.226.15
DNShairguide.net
Type: A
69.172.201.208
DNSsouthblood.net
Type: A
DNSenemydont.net
Type: A
DNSsellsmall.net
Type: A
DNSwheelreply.net
Type: A
DNSdeadtell.net
Type: A
DNSrocktell.net
Type: A
DNSwrongdare.net
Type: A
DNSmadedare.net
Type: A
DNSwrongdance.net
Type: A
DNSmadedance.net
Type: A
DNSwrongbody.net
Type: A
DNSmadebody.net
Type: A
DNSwrongtell.net
Type: A
DNSmadetell.net
Type: A
DNShumanfeel.net
Type: A
DNShairfeel.net
Type: A
DNShumanhigh.net
Type: A
DNShairhigh.net
Type: A
DNShumanonly.net
Type: A
DNSyardfeel.net
Type: A
DNSyardhigh.net
Type: A
DNSyardcolor.net
Type: A
DNSmusiccolor.net
Type: A
DNSyardonly.net
Type: A
DNSwentfeel.net
Type: A
DNSspendfeel.net
Type: A
DNSwenthigh.net
Type: A
DNSwentcolor.net
Type: A
DNSspendcolor.net
Type: A
DNSwentonly.net
Type: A
DNSspendonly.net
Type: A
DNSofferfeel.net
Type: A
DNSfronthigh.net
Type: A
DNSofferhigh.net
Type: A
DNSfrontcolor.net
Type: A
DNSoffercolor.net
Type: A
DNSfrontonly.net
Type: A
DNSofferonly.net
Type: A
DNShangfeel.net
Type: A
DNSseptemberfeel.net
Type: A
DNShanghigh.net
Type: A
DNSseptemberhigh.net
Type: A
DNShangcolor.net
Type: A
DNSseptembercolor.net
Type: A
DNShangonly.net
Type: A
DNSseptemberonly.net
Type: A
DNSjoinfeel.net
Type: A
DNSwishfeel.net
Type: A
DNSjoinhigh.net
Type: A
DNSjoincolor.net
Type: A
DNSwishcolor.net
Type: A
DNSjoinonly.net
Type: A
DNSwishonly.net
Type: A
DNSdeadfeel.net
Type: A
DNSdeadhigh.net
Type: A
DNSrockhigh.net
Type: A
DNSdeadcolor.net
Type: A
DNSrockcolor.net
Type: A
DNSdeadonly.net
Type: A
DNSrockonly.net
Type: A
DNSwrongfeel.net
Type: A
DNSmadefeel.net
Type: A
DNSwronghigh.net
Type: A
DNSmadehigh.net
Type: A
DNSwrongcolor.net
Type: A
DNSmadecolor.net
Type: A
DNSwrongonly.net
Type: A
DNSmadeonly.net
Type: A
DNShumanhalf.net
Type: A
DNShairhalf.net
Type: A
DNShumanname.net
Type: A
DNShairname.net
Type: A
DNShumanlate.net
Type: A
DNShairlate.net
Type: A
DNSyardhalf.net
Type: A
HTTP GEThttp://saltsecond.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://deadbody.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://rockbody.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://humancolor.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://haircolor.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://haironly.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://musicfeel.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://musichigh.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://musiconly.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://spendhigh.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://frontfeel.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://wishhigh.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://rockfeel.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://humanguide.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://hairguide.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://saltsecond.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://deadbody.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://rockbody.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://humancolor.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://haircolor.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://haironly.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://musicfeel.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://musichigh.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://musiconly.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://spendhigh.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://frontfeel.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://wishhigh.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://rockfeel.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://humanguide.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
HTTP GEThttp://hairguide.net/index.php?method=validate&mode=sox&v=031&sox=3bb4d404
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 74.220.199.6:80
Flows TCP192.168.1.1:1037 ➝ 64.74.223.34:80
Flows TCP192.168.1.1:1038 ➝ 66.96.161.129:80
Flows TCP192.168.1.1:1039 ➝ 219.94.203.116:80
Flows TCP192.168.1.1:1040 ➝ 185.53.177.30:80
Flows TCP192.168.1.1:1042 ➝ 62.116.130.8:80
Flows TCP192.168.1.1:1043 ➝ 89.161.255.8:80
Flows TCP192.168.1.1:1044 ➝ 64.29.151.221:80
Flows TCP192.168.1.1:1045 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1046 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1047 ➝ 195.22.26.231:80
Flows TCP192.168.1.1:1048 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1049 ➝ 211.196.153.94:80
Flows TCP192.168.1.1:1050 ➝ 141.8.226.15:80
Flows TCP192.168.1.1:1051 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1052 ➝ 74.220.199.6:80
Flows TCP192.168.1.1:1053 ➝ 64.74.223.34:80
Flows TCP192.168.1.1:1054 ➝ 66.96.161.129:80
Flows TCP192.168.1.1:1055 ➝ 219.94.203.116:80
Flows TCP192.168.1.1:1056 ➝ 185.53.177.30:80
Flows TCP192.168.1.1:1057 ➝ 62.116.130.8:80
Flows TCP192.168.1.1:1058 ➝ 89.161.255.8:80
Flows TCP192.168.1.1:1059 ➝ 64.29.151.221:80
Flows TCP192.168.1.1:1060 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1061 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1062 ➝ 195.22.26.231:80
Flows TCP192.168.1.1:1063 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1064 ➝ 211.196.153.94:80
Flows TCP192.168.1.1:1065 ➝ 141.8.226.15:80
Flows TCP192.168.1.1:1066 ➝ 69.172.201.208:80

Raw Pcap

Strings