Analysis Date2015-08-19 10:32:40
MD58450b03590e8d7c344d3fd99a429a145
SHA1bafe4b6a55126717dc526a0bc14adba30fde99e4

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 48c0f348d3233d9095eb32bf113adc8f sha1: e64fa87196a582df3b480a18b744180cf7e59233 size: 154624
Section.rdata md5: ab6ed46b2abf18f5efaeb2dd177a14a4 sha1: fe46c86918ccca334150730b553955e39ee0489e size: 37376
Section.data md5: 51fe5a52fa98bfb9b8ad18ff993eb065 sha1: 5c4568f15cd84f922d156c06dec42d2d9f735a06 size: 7168
Timestamp2015-03-13 09:26:26
PackerMicrosoft Visual C++ ?.?
PEhash630728e19e63b1cbb5ec70269839c844ec8cc9f6
IMPhash9f4bba6c2d2b49bfd05d075f9c653903
AVRisingno_virus
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Rodecap.1
AVDr. Webno_virus
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVBullGuardGen:Variant.Rodecap.1
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Generic
AVZillya!no_virus
AVEmsisoftGen:Variant.Rodecap.1
AVIkarusTrojan-Spy.Win32.Nivdort
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Scar.U.gen!Eldorado
AVMalwareBytesTrojan.Agent
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort
AVK7no_virus
AVBitDefenderGen:Variant.Rodecap.1
AVFortinetW32/Rodecap.BJ!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Rodecap.BJ
AVAlwil (avast)Evo-gen [Susp]
AVAd-AwareGen:Variant.Rodecap.1
AVTwisterno_virus
AVAvira (antivir)TR/Crypt.ZPACK.153519
AVMcafeeTrojan-FEVX!8450B03590E8

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\tyzesjqs\stj1ln3fbmndxqadnnz.exe
Creates FileC:\tyzesjqs\dhdxnao
Creates FileC:\WINDOWS\tyzesjqs\dhdxnao
Deletes FileC:\WINDOWS\tyzesjqs\dhdxnao
Creates ProcessC:\tyzesjqs\stj1ln3fbmndxqadnnz.exe

Process
↳ C:\tyzesjqs\stj1ln3fbmndxqadnnz.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Visual Management Time Modules ➝
C:\tyzesjqs\vgfemcyr.exe
Creates FileC:\tyzesjqs\tevnyqq
Creates FileC:\tyzesjqs\vgfemcyr.exe
Creates FileC:\tyzesjqs\dhdxnao
Creates FileC:\WINDOWS\tyzesjqs\dhdxnao
Deletes FileC:\WINDOWS\tyzesjqs\dhdxnao
Creates ProcessC:\tyzesjqs\vgfemcyr.exe
Creates ServicePlayer Configuration Net.Tcp Port - C:\tyzesjqs\vgfemcyr.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1872

Process
↳ Pid 1132

Process
↳ C:\tyzesjqs\vgfemcyr.exe

Creates FileC:\tyzesjqs\tevnyqq
Creates Filepipe\net\NtControlPipe10
Creates FileC:\tyzesjqs\ndozigktecz
Creates FileC:\tyzesjqs\dhdxnao
Creates File\Device\Afd\Endpoint
Creates FileC:\tyzesjqs\nolwgfgk.exe
Creates FileC:\WINDOWS\tyzesjqs\dhdxnao
Deletes FileC:\WINDOWS\tyzesjqs\dhdxnao
Creates Processswjifkgoewyl "c:\tyzesjqs\vgfemcyr.exe"

Process
↳ C:\tyzesjqs\vgfemcyr.exe

Creates FileC:\tyzesjqs\dhdxnao
Creates FileC:\WINDOWS\tyzesjqs\dhdxnao
Deletes FileC:\WINDOWS\tyzesjqs\dhdxnao

Process
↳ swjifkgoewyl "c:\tyzesjqs\vgfemcyr.exe"

Creates FileC:\tyzesjqs\dhdxnao
Creates FileC:\WINDOWS\tyzesjqs\dhdxnao
Deletes FileC:\WINDOWS\tyzesjqs\dhdxnao

Network Details:

DNSmountainsupply.net
Type: A
67.18.199.2
DNSwindowsupply.net
Type: A
173.236.172.44
DNSsweetoffice.net
Type: A
162.213.251.173
DNSmaterialsupply.net
Type: A
184.168.221.36
DNSlaughstrong.net
Type: A
50.21.189.209
DNSpossiblesupply.net
Type: A
DNSmountaindistance.net
Type: A
DNSpossibledistance.net
Type: A
DNSmountainoffice.net
Type: A
DNSpossibleoffice.net
Type: A
DNSmountainarrive.net
Type: A
DNSpossiblearrive.net
Type: A
DNSperhapssupply.net
Type: A
DNSperhapsdistance.net
Type: A
DNSwindowdistance.net
Type: A
DNSperhapsoffice.net
Type: A
DNSwindowoffice.net
Type: A
DNSperhapsarrive.net
Type: A
DNSwindowarrive.net
Type: A
DNSwintersupply.net
Type: A
DNSsubjectsupply.net
Type: A
DNSwinterdistance.net
Type: A
DNSsubjectdistance.net
Type: A
DNSwinteroffice.net
Type: A
DNSsubjectoffice.net
Type: A
DNSwinterarrive.net
Type: A
DNSsubjectarrive.net
Type: A
DNSfinishsupply.net
Type: A
DNSleavesupply.net
Type: A
DNSfinishdistance.net
Type: A
DNSleavedistance.net
Type: A
DNSfinishoffice.net
Type: A
DNSleaveoffice.net
Type: A
DNSfinisharrive.net
Type: A
DNSleavearrive.net
Type: A
DNSsweetsupply.net
Type: A
DNSprobablysupply.net
Type: A
DNSsweetdistance.net
Type: A
DNSprobablydistance.net
Type: A
DNSprobablyoffice.net
Type: A
DNSsweetarrive.net
Type: A
DNSprobablyarrive.net
Type: A
DNSseveralsupply.net
Type: A
DNSseveraldistance.net
Type: A
DNSmaterialdistance.net
Type: A
DNSseveraloffice.net
Type: A
DNSmaterialoffice.net
Type: A
DNSseveralarrive.net
Type: A
DNSmaterialarrive.net
Type: A
DNSseverastrong.net
Type: A
DNSseveratrouble.net
Type: A
DNSlaughtrouble.net
Type: A
DNSseverapresident.net
Type: A
DNSlaughpresident.net
Type: A
DNSseveracaught.net
Type: A
DNSlaughcaught.net
Type: A
DNSsimplestrong.net
Type: A
DNSmotherstrong.net
Type: A
DNSsimpletrouble.net
Type: A
DNSmothertrouble.net
Type: A
DNSsimplepresident.net
Type: A
DNSmotherpresident.net
Type: A
DNSsimplecaught.net
Type: A
DNSmothercaught.net
Type: A
DNSmountainstrong.net
Type: A
DNSpossiblestrong.net
Type: A
DNSmountaintrouble.net
Type: A
DNSpossibletrouble.net
Type: A
DNSmountainpresident.net
Type: A
DNSpossiblepresident.net
Type: A
DNSmountaincaught.net
Type: A
DNSpossiblecaught.net
Type: A
DNSperhapsstrong.net
Type: A
DNSwindowstrong.net
Type: A
DNSperhapstrouble.net
Type: A
DNSwindowtrouble.net
Type: A
DNSperhapspresident.net
Type: A
DNSwindowpresident.net
Type: A
DNSperhapscaught.net
Type: A
DNSwindowcaught.net
Type: A
DNSwinterstrong.net
Type: A
DNSsubjectstrong.net
Type: A
DNSwintertrouble.net
Type: A
DNSsubjecttrouble.net
Type: A
DNSwinterpresident.net
Type: A
HTTP GEThttp://mountainsupply.net/index.php?method&len
User-Agent:
HTTP GEThttp://windowsupply.net/index.php?method&len
User-Agent:
HTTP GEThttp://sweetoffice.net/index.php?method&len
User-Agent:
HTTP GEThttp://materialsupply.net/index.php?method&len
User-Agent:
HTTP GEThttp://laughstrong.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 67.18.199.2:80
Flows TCP192.168.1.1:1032 ➝ 173.236.172.44:80
Flows TCP192.168.1.1:1033 ➝ 162.213.251.173:80
Flows TCP192.168.1.1:1034 ➝ 184.168.221.36:80
Flows TCP192.168.1.1:1035 ➝ 50.21.189.209:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d6f 756e7461   se..Host: mounta
0x00000050 (00080)   696e7375 70706c79 2e6e6574 0d0a0d0a   insupply.net....
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207769 6e646f77   se..Host: window
0x00000050 (00080)   73757070 6c792e6e 65740d0a 0d0a0d0a   supply.net......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207377 6565746f   se..Host: sweeto
0x00000050 (00080)   66666963 652e6e65 740d0a0d 0a0a0d0a   ffice.net.......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d61 74657269   se..Host: materi
0x00000050 (00080)   616c7375 70706c79 2e6e6574 0d0a0d0a   alsupply.net....
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206c61 75676873   se..Host: laughs
0x00000050 (00080)   74726f6e 672e6e65 740d0a0d 0a0a0d0a   trong.net.......
0x00000060 (00096)                                         


Strings