Analysis Date | 2016-02-22 10:11:15 |
---|---|
MD5 | 2f8724703a35613c4abe2e79d984ba32 |
SHA1 | ce2c4389f00b3b9d31443d019b1d45a4e1555aee |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: 4290658d34434015e14825f8a616276e sha1: 816955bc6837376e6a2b0b87ebf0f50f4e375935 size: 182784 | |
Section | .rdata md5: 2517ae329282c6c3416718c3c2a140f2 sha1: 661fbfc0cac5c883de473e37fc82fb86aa3a03b4 size: 2560 | |
Section | .data md5: 40bb08914fb95d4c4f49bf2b0abff441 sha1: 6852abe1698e4ce597050f7e783c8e3706297245 size: 14848 | |
Section | .reloc md5: e0e9d72a7bcbc6a2b9ac1971c8b3971b sha1: 87edee6f2687e26ac6b64f508c83bf25b36ae769 size: 30208 | |
Timestamp | 2014-01-23 17:56:46 | |
PEhash | 0fd1c9caa585aa42a03daa90a6b8d4a710e1e284 | |
IMPhash | 64c3d4f958b85108a3bf322cbd51bee1 | |
AV | CA (E-Trust Ino) | Gen:Variant.Razy.15676 |
AV | Rising | No Virus |
AV | Mcafee | Trojan-FHQT!2F8724703A35 |
AV | Avira (antivir) | No Virus |
AV | Twister | No Virus |
AV | Ad-Aware | Gen:Variant.Razy.15676 |
AV | Alwil (avast) | Vupa [Cryp] |
AV | Eset (nod32) | Win32/Bayrob.BA |
AV | Grisoft (avg) | Generic37.AJZO |
AV | Symantec | Trojan.Bayrob!gen6 |
AV | Fortinet | W32/Bayrob.AQ!tr |
AV | BitDefender | Gen:Variant.Razy.15676 |
AV | K7 | Trojan ( 004dc2a31 ) |
AV | Microsoft Security Essentials | TrojanSpy:Win32/Nivdort.DE |
AV | MicroWorld (escan) | Gen:Variant.Razy.15676 |
AV | MalwareBytes | No Virus |
AV | Authentium | W32/Nivdort.G.gen!Eldorado |
AV | Emsisoft | Gen:Variant.Razy.15676 |
AV | Frisk (f-prot) | W32/Nivdort.G.gen!Eldorado |
AV | Ikarus | Trojan.Win32.Bayrob |
AV | Zillya! | No Virus |
AV | Kaspersky | Trojan.Win32.Generic |
AV | Trend Micro | No Virus |
AV | VirusBlokAda (vba32) | No Virus |
AV | CAT (quickheal) | No Virus |
AV | BullGuard | Gen:Variant.Razy.15676 |
AV | Arcabit (arcavir) | Gen:Variant.Razy.15676 |
AV | ClamAV | No Virus |
AV | Dr. Web | No Virus |
AV | F-Secure | Gen:Variant.Razy.15676 |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\luemyxanqjrptad\qjrnwfb |
---|---|
Creates File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Creates File | C:\luemyxanqjrptad\mw5h1kvbvewliuwmcory8.exe |
Deletes File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Creates Process | C:\luemyxanqjrptad\mw5h1kvbvewliuwmcory8.exe |
Process
↳ C:\luemyxanqjrptad\mw5h1kvbvewliuwmcory8.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Function Desktop Isolation Time ➝ C:\luemyxanqjrptad\vikmzogcxib.exe |
---|---|
Creates File | C:\luemyxanqjrptad\vikmzogcxib.exe |
Creates File | C:\luemyxanqjrptad\qjrnwfb |
Creates File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Creates File | C:\luemyxanqjrptad\xfuvvoa |
Creates File | PIPE\lsarpc |
Deletes File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Creates Process | C:\luemyxanqjrptad\vikmzogcxib.exe |
Creates Service | Interactive WinHTTP Credential - C:\luemyxanqjrptad\vikmzogcxib.exe |
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ Pid 804
Process
↳ Pid 852
Process
↳ C:\WINDOWS\System32\svchost.exe
Creates File | pipe\PCHFaultRepExecPipe |
---|
Process
↳ Pid 1208
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝ NULL |
---|---|
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝ 7 |
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝ C:\WINDOWS\System32\spool\PRINTERS\\x00 |
Process
↳ Pid 1876
Process
↳ Pid 1176
Process
↳ C:\luemyxanqjrptad\vikmzogcxib.exe
Creates File | pipe\net\NtControlPipe10 |
---|---|
Creates File | C:\luemyxanqjrptad\qjrnwfb |
Creates File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Creates File | C:\luemyxanqjrptad\xfuvvoa |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\luemyxanqjrptad\pguljoufpdk |
Creates File | C:\luemyxanqjrptad\nhppcphkkfyf.exe |
Deletes File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Creates Process | ueyzfybehdvn "c:\luemyxanqjrptad\vikmzogcxib.exe" |
Process
↳ C:\luemyxanqjrptad\vikmzogcxib.exe
Creates File | C:\luemyxanqjrptad\qjrnwfb |
---|---|
Creates File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Deletes File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Process
↳ ueyzfybehdvn "c:\luemyxanqjrptad\vikmzogcxib.exe"
Creates File | C:\luemyxanqjrptad\qjrnwfb |
---|---|
Creates File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Deletes File | C:\WINDOWS\luemyxanqjrptad\qjrnwfb |
Network Details:
Raw Pcap
0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a206d : close..Host: m 0x00000040 (00064) 6f76656d 656e7463 68617267 652e6e65 ovementcharge.ne 0x00000050 (00080) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2062 : close..Host: b 0x00000040 (00064) 75696c64 696e6763 68617267 652e6e65 uildingcharge.ne 0x00000050 (00080) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 746f7265 73696e67 6c652e6e 65740d0a toresingle.net.. 0x00000050 (00080) 0d0a0a0d 0a ..... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a206d : close..Host: m 0x00000040 (00064) 61636869 6e65636f 6e74726f 6c2e6e65 achinecontrol.ne 0x00000050 (00080) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2066 : close..Host: f 0x00000040 (00064) 6f726569 676e636f 6e74726f 6c2e6e65 oreigncontrol.ne 0x00000050 (00080) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2072 : close..Host: r 0x00000040 (00064) 69676874 746f6765 74686572 2e6e6574 ighttogether.net 0x00000050 (00080) 0d0a0d0a 0a ..... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2063 : close..Host: c 0x00000040 (00064) 68696c64 72656e6d 61747465 722e6e65 hildrenmatter.ne 0x00000050 (00080) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2066 : close..Host: f 0x00000040 (00064) 616d696c 79746f67 65746865 722e6e65 amilytogether.ne 0x00000050 (00080) 740d0a0d 0a t....
Strings