Analysis Date2015-08-13 05:19:44
MD50f2305fdc7b91a3e1789d97a46ee745b
SHA1b4890f3d5fe652552d0fdf67ba41c10f31fad217

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: c99ddb4aee5bcc6e718bf2c6b8f8ec56 sha1: 7dff7879cf1dc38f11ca45f75f0465120c221e13 size: 289792
Section.rdata md5: bd4dbe097b43ec12c4fded325d908bd9 sha1: 66b0a584c0c7b689b0290de0a3246375a276da8d size: 58880
Section.data md5: 3a9bf6aeda83dba5f3b80f9f92b792b9 sha1: 38b394ae9942ba08cc677ee95e601e041b005303 size: 7680
Section.reloc md5: bf87b61f62317f3509dfb80189d54e91 sha1: 5d2d9405ad09571728cad74501c01b8bfe831cbc size: 20480
Timestamp2015-05-11 06:10:50
PackerMicrosoft Visual C++ 8
PEhash186c7fbba99f997f6911dded9fad5b4c944ea7cf
IMPhash688558d253829caa1cdc183be195ee04
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Kazy.611009
AVDr. WebTrojan.Bayrob.1
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Kazy.611009
AVBullGuardGen:Variant.Kazy.611009
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVTrend MicroTROJ_BAYROB.SM0
AVKasperskyTrojan.Win32.Generic
AVZillya!Trojan.Scar.Win32.91275
AVEmsisoftGen:Variant.Kazy.611009
AVIkarusTrojan.Win32.Bayrob
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.B.gen!Eldorado
AVMalwareBytesTrojan.Agent.KVTGen
AVMicroWorld (escan)Gen:Variant.Kazy.611009
AVMicrosoft Security Essentialsno_virus
AVK7Trojan ( 004c3a4d1 )
AVBitDefenderGen:Variant.Kazy.611009
AVFortinetW32/Bayrob.T!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Generic36.BLJX
AVEset (nod32)Win32/Bayrob.V.gen
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVAd-AwareGen:Variant.Kazy.611009
AVTwisterTrojan.Scar.jlvz.wywc
AVAvira (antivir)TR/Spy.ZBot.xbbeomq
AVMcafeePWS-FCCE!0F2305FDC7B9
AVRisingTrojan.Win32.Bayrod.b

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\ckxumvrar\tz1m1uqnfb7fwawyz.exe
Creates FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Creates FileC:\ckxumvrar\tzl30ptgcmom
Deletes FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Deletes FileC:\ckxumvrar\tzl30ptgcmom
Creates ProcessC:\ckxumvrar\tz1m1uqnfb7fwawyz.exe

Process
↳ C:\ckxumvrar\tz1m1uqnfb7fwawyz.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Process Net.Tcp Virtual Image Audio Cache Call ➝
C:\ckxumvrar\azlhrzada.exe
Creates FileC:\ckxumvrar\azlhrzada.exe
Creates FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Creates FilePIPE\lsarpc
Creates FileC:\ckxumvrar\nhdnsou4
Creates FileC:\ckxumvrar\tzl30ptgcmom
Deletes FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Creates ProcessC:\ckxumvrar\azlhrzada.exe
Creates ServiceLauncher Auto-Discovery Filtering Acquisition - C:\ckxumvrar\azlhrzada.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1840

Process
↳ Pid 1092

Process
↳ C:\ckxumvrar\azlhrzada.exe

Creates FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Creates Filepipe\net\NtControlPipe10
Creates FileC:\ckxumvrar\w5aaay961rnj
Creates FileC:\ckxumvrar\mqdfnabje.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\ckxumvrar\nhdnsou4
Creates FileC:\ckxumvrar\tzl30ptgcmom
Deletes FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Deletes FileC:\ckxumvrar\tzl30ptgcmom
Creates Processimq8hgotzfzo "c:\ckxumvrar\azlhrzada.exe"

Process
↳ C:\ckxumvrar\azlhrzada.exe

Creates FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Creates FileC:\ckxumvrar\tzl30ptgcmom
Deletes FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom

Process
↳ imq8hgotzfzo "c:\ckxumvrar\azlhrzada.exe"

Creates FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom
Creates FileC:\ckxumvrar\tzl30ptgcmom
Deletes FileC:\WINDOWS\ckxumvrar\tzl30ptgcmom

Network Details:

DNSchildrencontrol.net
Type: A
95.211.230.75
DNSpersonmeasure.net
Type: A
184.168.221.35
DNSmachinemeasure.net
Type: A
95.211.230.75
DNSfamilycontrol.net
Type: A
DNSeithermatter.net
Type: A
DNSenglishmatter.net
Type: A
DNSeitherspent.net
Type: A
DNSenglishspent.net
Type: A
DNSeithertogether.net
Type: A
DNSenglishtogether.net
Type: A
DNSeithercontrol.net
Type: A
DNSenglishcontrol.net
Type: A
DNSexpectfather.net
Type: A
DNSbecausefather.net
Type: A
DNSexpectapple.net
Type: A
DNSbecauseapple.net
Type: A
DNSexpectbuilt.net
Type: A
DNSbecausebuilt.net
Type: A
DNSexpectcarry.net
Type: A
DNSbecausecarry.net
Type: A
DNSpersonfather.net
Type: A
DNSmachinefather.net
Type: A
DNSpersonapple.net
Type: A
DNSmachineapple.net
Type: A
DNSpersonbuilt.net
Type: A
DNSmachinebuilt.net
Type: A
DNSpersoncarry.net
Type: A
DNSmachinecarry.net
Type: A
DNSsuddenfather.net
Type: A
DNSforeignfather.net
Type: A
DNSsuddenapple.net
Type: A
DNSforeignapple.net
Type: A
DNSsuddenbuilt.net
Type: A
DNSforeignbuilt.net
Type: A
DNSsuddencarry.net
Type: A
DNSforeigncarry.net
Type: A
DNSwhetherfather.net
Type: A
DNSrightfather.net
Type: A
DNSwhetherapple.net
Type: A
DNSrightapple.net
Type: A
DNSwhetherbuilt.net
Type: A
DNSrightbuilt.net
Type: A
DNSwhethercarry.net
Type: A
DNSrightcarry.net
Type: A
DNSfigurefather.net
Type: A
DNSthoughfather.net
Type: A
DNSfigureapple.net
Type: A
DNSthoughapple.net
Type: A
DNSfigurebuilt.net
Type: A
DNSthoughbuilt.net
Type: A
DNSfigurecarry.net
Type: A
DNSthoughcarry.net
Type: A
DNSpicturefather.net
Type: A
DNScigarettefather.net
Type: A
DNSpictureapple.net
Type: A
DNScigaretteapple.net
Type: A
DNSpicturebuilt.net
Type: A
DNScigarettebuilt.net
Type: A
DNSpicturecarry.net
Type: A
DNScigarettecarry.net
Type: A
DNSchildrenfather.net
Type: A
DNSfamilyfather.net
Type: A
DNSchildrenapple.net
Type: A
DNSfamilyapple.net
Type: A
DNSchildrenbuilt.net
Type: A
DNSfamilybuilt.net
Type: A
DNSchildrencarry.net
Type: A
DNSfamilycarry.net
Type: A
DNSeitherfather.net
Type: A
DNSenglishfather.net
Type: A
DNSeitherapple.net
Type: A
DNSenglishapple.net
Type: A
DNSeitherbuilt.net
Type: A
DNSenglishbuilt.net
Type: A
DNSeithercarry.net
Type: A
DNSenglishcarry.net
Type: A
DNSexpectmeasure.net
Type: A
DNSbecausemeasure.net
Type: A
DNSexpectdinner.net
Type: A
DNSbecausedinner.net
Type: A
DNSexpectafraid.net
Type: A
DNSbecauseafraid.net
Type: A
DNSexpectcircle.net
Type: A
DNSbecausecircle.net
Type: A
DNSpersondinner.net
Type: A
HTTP GEThttp://childrencontrol.net/index.php
User-Agent:
HTTP GEThttp://personmeasure.net/index.php
User-Agent:
HTTP GEThttp://machinemeasure.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1032 ➝ 184.168.221.35:80
Flows TCP192.168.1.1:1033 ➝ 95.211.230.75:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   68696c64 72656e63 6f6e7472 6f6c2e6e   hildrencontrol.n
0x00000050 (00080)   65740d0a 0d0a                         et....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   6572736f 6e6d6561 73757265 2e6e6574   ersonmeasure.net
0x00000050 (00080)   0d0a0d0a 0d0a                         ......

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206d   : close..Host: m
0x00000040 (00064)   61636869 6e656d65 61737572 652e6e65   achinemeasure.ne
0x00000050 (00080)   740d0a0d 0a0a                         t.....


Strings