Analysis Date2015-08-26 14:23:48
MD55b4f9c0515bd365793c7e1edb13f657d
SHA1ac483509d85ea958604879aaa38e0efd13d89f8a

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 4a049c89ffc135c0a3c3fdaecda77271 sha1: 34c87f8144f06b57b0c9abc52274ebeeb673efe9 size: 324096
Section.rdata md5: bba1f2313a7800c8ef7e03bc50b2a523 sha1: 2d0f76909f930a86bd6cf43b21a8d68129e99a7e size: 60416
Section.data md5: 5fd27896e23e15e0246e38c7e46cf65a sha1: c2030530f0d9ff2ed10efcae7f1345a8120459e1 size: 7168
Section.reloc md5: 7679f79a4bb103e5635acc1af81f23f9 sha1: 2f9c40411ad9b38c35bc4dd1e793d95c20e2832b size: 27136
Timestamp2015-05-11 06:32:08
PackerMicrosoft Visual C++ 8
PEhashd3dd931295ee3107bb7523c0857f8705aa3be00b
IMPhashacacb089172d0d95b7497c2ab8c91fcb
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Kazy.611009
AVDr. WebTrojan.Bayrob.1
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Kazy.611009
AVBullGuardGen:Variant.Kazy.611009
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Scar.jodi
AVZillya!no_virus
AVEmsisoftGen:Variant.Kazy.611009
AVIkarusTrojan.Win32.Bayrob
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.B.gen!Eldorado
AVMalwareBytesTrojan.Agent.KVTGen
AVMicroWorld (escan)Gen:Variant.Kazy.611009
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BE
AVK7Trojan ( 004c3a4d1 )
AVBitDefenderGen:Variant.Kazy.611009
AVFortinetW32/Bayrob.T!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Bayrob.W
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVAd-AwareGen:Variant.Kazy.611009
AVTwisterno_virus
AVAvira (antivir)TR/Spy.ZBot.xbbeomq
AVMcafeePWS-FCCE!5B4F9C0515BD
AVRisingTrojan.Win32.Bayrod.b

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates FileC:\amstdxemxzno\pijbb1kysajuekkb6h2.exe
Creates FileC:\amstdxemxzno\erhhn6kck
Deletes FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates ProcessC:\amstdxemxzno\pijbb1kysajuekkb6h2.exe

Process
↳ C:\amstdxemxzno\pijbb1kysajuekkb6h2.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Portable Credential Identity ➝
C:\amstdxemxzno\roiisfl.exe
Creates FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates FilePIPE\lsarpc
Creates FileC:\amstdxemxzno\yvih3a
Creates FileC:\amstdxemxzno\roiisfl.exe
Creates FileC:\amstdxemxzno\erhhn6kck
Deletes FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates ProcessC:\amstdxemxzno\roiisfl.exe
Creates ServiceShadow Center Gateway File Search - C:\amstdxemxzno\roiisfl.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1848

Process
↳ Pid 1164

Process
↳ C:\amstdxemxzno\roiisfl.exe

Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates FileC:\amstdxemxzno\uczkazsvvbv.exe
Creates FileC:\amstdxemxzno\yvih3a
Creates File\Device\Afd\Endpoint
Creates FileC:\amstdxemxzno\dxga1hlo
Creates FileC:\amstdxemxzno\erhhn6kck
Deletes FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates Processiqzjqu7pw1rw "c:\amstdxemxzno\roiisfl.exe"

Process
↳ C:\amstdxemxzno\roiisfl.exe

Creates FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates FileC:\amstdxemxzno\erhhn6kck
Deletes FileC:\WINDOWS\amstdxemxzno\erhhn6kck

Process
↳ iqzjqu7pw1rw "c:\amstdxemxzno\roiisfl.exe"

Creates FileC:\WINDOWS\amstdxemxzno\erhhn6kck
Creates FileC:\amstdxemxzno\erhhn6kck
Deletes FileC:\WINDOWS\amstdxemxzno\erhhn6kck

Network Details:

DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSpossibletraining.net
Type: A
50.63.202.54
DNSsimpletherefore.net
Type: A
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
DNSmountainhunger.net
Type: A
DNSpossiblehunger.net
Type: A
DNSmountaintraining.net
Type: A
DNSmountainstorm.net
Type: A
DNSpossiblestorm.net
Type: A
DNSmountainthrown.net
Type: A
DNSpossiblethrown.net
Type: A
DNSperhapshunger.net
Type: A
DNSwindowhunger.net
Type: A
DNSperhapstraining.net
Type: A
DNSwindowtraining.net
Type: A
DNSperhapsstorm.net
Type: A
DNSwindowstorm.net
Type: A
DNSperhapsthrown.net
Type: A
DNSwindowthrown.net
Type: A
DNSwinterhunger.net
Type: A
DNSsubjecthunger.net
Type: A
DNSwintertraining.net
Type: A
HTTP GEThttp://mountainschool.net/index.php
User-Agent:
HTTP GEThttp://windowwhile.net/index.php
User-Agent:
HTTP GEThttp://winterschool.net/index.php
User-Agent:
HTTP GEThttp://finishschool.net/index.php
User-Agent:
HTTP GEThttp://possibletraining.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1032 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1033 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1035 ➝ 50.63.202.54:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   6f756e74 61696e73 63686f6f 6c2e6e65   ountainschool.ne
0x00000050 (00080)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   696e646f 77776869 6c652e6e 65740d0a   indowwhile.net..
0x00000050 (00080)   0d0a0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   696e7465 72736368 6f6f6c2e 6e65740d   interschool.net.
0x00000050 (00080)   0a0d0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   696e6973 68736368 6f6f6c2e 6e65740d   inishschool.net.
0x00000050 (00080)   0a0d0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   6f737369 626c6574 7261696e 696e672e   ossibletraining.
0x00000050 (00080)   6e65740d 0a0d0a                       net....


Strings