Analysis Date2015-09-17 15:22:13
MD5e9446e66402f16dd94a64b69ef9ef31d
SHA1d77275206204289fd29b89e5919a7d91c98d42d9

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 3e6f35bb23f25fab779fca317c723df5 sha1: f4dc07acb1f6b92b958094532872b64c80e88184 size: 161792
Section.rdata md5: 6ab7d40dfcf9ce5aca56b46b7ccfbae3 sha1: 34b5ea7c2963c322e503d313754170943780846d size: 38912
Section.data md5: 5c5655670eb81fff3fa1194a9146a5e7 sha1: e70272040acea6df25415331c7c92125a82feed3 size: 7168
Timestamp2015-03-13 09:24:30
PackerMicrosoft Visual C++ ?.?
PEhash9620b6e3b8eb4f6a27ee64fbb2889826c1a2867a
IMPhasha0ca0670748cecdbacd0637225fc6943
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Rodecap.1
AVDr. Webno_virus
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVBullGuardGen:Variant.Rodecap.1
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Generic
AVZillya!no_virus
AVEmsisoftGen:Variant.Rodecap.1
AVIkarusTrojan.Win32.Rodecap
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVMalwareBytesTrojan.Agent
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort
AVK7no_virus
AVBitDefenderGen:Variant.Rodecap.1
AVFortinetW32/Rodecap.BJ!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Rodecap.BJ
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVAd-AwareGen:Variant.Rodecap.1
AVTwisterTrojan.Generic.cret
AVAvira (antivir)TR/AD.Rodecap.Y.10
AVMcafeeTrojan-FEVX!E9446E66402F
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\ostxufjsir\eoqzr1kufxlzdvtfbo.exe
Creates FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates FileC:\ostxufjsir\bzaojxdxyh
Deletes FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates ProcessC:\ostxufjsir\eoqzr1kufxlzdvtfbo.exe

Process
↳ C:\ostxufjsir\eoqzr1kufxlzdvtfbo.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Internet Level Encrypting Storage Shadow Play ➝
C:\ostxufjsir\kvevqnq.exe
Creates FileC:\ostxufjsir\kvevqnq.exe
Creates FileC:\ostxufjsir\grrltnrlb
Creates FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates FileC:\ostxufjsir\bzaojxdxyh
Deletes FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates ProcessC:\ostxufjsir\kvevqnq.exe
Creates ServicePublication Client Protection Location - C:\ostxufjsir\kvevqnq.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1852

Process
↳ Pid 1152

Process
↳ C:\ostxufjsir\kvevqnq.exe

Creates FileC:\ostxufjsir\raakckpe.exe
Creates Filepipe\net\NtControlPipe10
Creates FileC:\ostxufjsir\r0summpdzr5
Creates FileC:\ostxufjsir\grrltnrlb
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates FileC:\ostxufjsir\bzaojxdxyh
Deletes FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates Processxformncjxhyp "c:\ostxufjsir\kvevqnq.exe"

Process
↳ C:\ostxufjsir\kvevqnq.exe

Creates FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates FileC:\ostxufjsir\bzaojxdxyh
Deletes FileC:\WINDOWS\ostxufjsir\bzaojxdxyh

Process
↳ xformncjxhyp "c:\ostxufjsir\kvevqnq.exe"

Creates FileC:\WINDOWS\ostxufjsir\bzaojxdxyh
Creates FileC:\ostxufjsir\bzaojxdxyh
Deletes FileC:\WINDOWS\ostxufjsir\bzaojxdxyh

Network Details:

DNSmemberaction.net
Type: A
184.168.221.51
DNSmemberdirect.net
Type: A
209.53.114.33
DNSknownaction.net
Type: A
95.211.230.75
DNScrowdmethod.net
Type: A
50.63.202.63
DNSsummeraction.net
Type: A
184.168.221.36
DNScrowdaction.net
Type: A
97.74.42.79
DNScrowddirect.net
Type: A
69.64.147.242
DNSthoughtaction.net
Type: A
74.220.199.8
DNSwateraction.net
Type: A
50.63.202.22
DNSwaterdirect.net
Type: A
66.96.161.145
DNSfightmethod.net
Type: A
184.168.167.179
DNScrowdspeak.net
Type: A
54.235.159.97
DNSfollowaction.net
Type: A
DNSfollowdirect.net
Type: A
DNSfollowbrought.net
Type: A
DNSmemberbrought.net
Type: A
DNSbeginmethod.net
Type: A
DNSknownmethod.net
Type: A
DNSbeginaction.net
Type: A
DNSbegindirect.net
Type: A
DNSknowndirect.net
Type: A
DNSbeginbrought.net
Type: A
DNSknownbrought.net
Type: A
DNSsummermethod.net
Type: A
DNSsummerdirect.net
Type: A
DNSsummerbrought.net
Type: A
DNScrowdbrought.net
Type: A
DNSthoughtmethod.net
Type: A
DNSwatermethod.net
Type: A
DNSthoughtdirect.net
Type: A
DNSthoughtbrought.net
Type: A
DNSwaterbrought.net
Type: A
DNSwomanmethod.net
Type: A
DNSsmokemethod.net
Type: A
DNSwomanaction.net
Type: A
DNSsmokeaction.net
Type: A
DNSwomandirect.net
Type: A
DNSsmokedirect.net
Type: A
DNSwomanbrought.net
Type: A
DNSsmokebrought.net
Type: A
DNSpartymethod.net
Type: A
DNSpartyaction.net
Type: A
DNSfightaction.net
Type: A
DNSpartydirect.net
Type: A
DNSfightdirect.net
Type: A
DNSpartybrought.net
Type: A
DNSfightbrought.net
Type: A
DNSfreshspeak.net
Type: A
DNSexperiencespeak.net
Type: A
DNSfreshniece.net
Type: A
DNSexperienceniece.net
Type: A
DNSfreshwrite.net
Type: A
DNSexperiencewrite.net
Type: A
DNSfreshoclock.net
Type: A
DNSexperienceoclock.net
Type: A
DNSgentlemanspeak.net
Type: A
DNSalreadyspeak.net
Type: A
DNSgentlemanniece.net
Type: A
DNSalreadyniece.net
Type: A
DNSgentlemanwrite.net
Type: A
DNSalreadywrite.net
Type: A
DNSgentlemanoclock.net
Type: A
DNSalreadyoclock.net
Type: A
DNSfollowspeak.net
Type: A
DNSmemberspeak.net
Type: A
DNSfollowniece.net
Type: A
DNSmemberniece.net
Type: A
DNSfollowwrite.net
Type: A
DNSmemberwrite.net
Type: A
DNSfollowoclock.net
Type: A
DNSmemberoclock.net
Type: A
DNSbeginspeak.net
Type: A
DNSknownspeak.net
Type: A
DNSbeginniece.net
Type: A
DNSknownniece.net
Type: A
DNSbeginwrite.net
Type: A
DNSknownwrite.net
Type: A
DNSbeginoclock.net
Type: A
DNSknownoclock.net
Type: A
DNSsummerspeak.net
Type: A
DNSsummerniece.net
Type: A
DNScrowdniece.net
Type: A
DNSsummerwrite.net
Type: A
DNScrowdwrite.net
Type: A
DNSsummeroclock.net
Type: A
HTTP GEThttp://memberaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://memberdirect.net/index.php?method&len
User-Agent:
HTTP GEThttp://knownaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdmethod.net/index.php?method&len
User-Agent:
HTTP GEThttp://summeraction.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowddirect.net/index.php?method&len
User-Agent:
HTTP GEThttp://thoughtaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://wateraction.net/index.php?method&len
User-Agent:
HTTP GEThttp://waterdirect.net/index.php?method&len
User-Agent:
HTTP GEThttp://fightmethod.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdspeak.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.51:80
Flows TCP192.168.1.1:1032 ➝ 209.53.114.33:80
Flows TCP192.168.1.1:1033 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1034 ➝ 50.63.202.63:80
Flows TCP192.168.1.1:1035 ➝ 184.168.221.36:80
Flows TCP192.168.1.1:1036 ➝ 97.74.42.79:80
Flows TCP192.168.1.1:1037 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1038 ➝ 74.220.199.8:80
Flows TCP192.168.1.1:1039 ➝ 50.63.202.22:80
Flows TCP192.168.1.1:1040 ➝ 66.96.161.145:80
Flows TCP192.168.1.1:1041 ➝ 184.168.167.179:80
Flows TCP192.168.1.1:1042 ➝ 54.235.159.97:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d65 6d626572   se..Host: member
0x00000050 (00080)   61637469 6f6e2e6e 65740d0a 0d0a       action.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d65 6d626572   se..Host: member
0x00000050 (00080)   64697265 63742e6e 65740d0a 0d0a       direct.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206b6e 6f776e61   se..Host: knowna
0x00000050 (00080)   6374696f 6e2e6e65 740d0a0d 0a0a       ction.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f77646d   se..Host: crowdm
0x00000050 (00080)   6574686f 642e6e65 740d0a0d 0a0a       ethod.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207375 6d6d6572   se..Host: summer
0x00000050 (00080)   61637469 6f6e2e6e 65740d0a 0d0a       action.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f776461   se..Host: crowda
0x00000050 (00080)   6374696f 6e2e6e65 740d0a0d 0a0a       ction.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f776464   se..Host: crowdd
0x00000050 (00080)   69726563 742e6e65 740d0a0d 0a0a       irect.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207468 6f756768   se..Host: though
0x00000050 (00080)   74616374 696f6e2e 6e65740d 0a0d0a     taction.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657261   se..Host: watera
0x00000050 (00080)   6374696f 6e2e6e65 740d0a0d 0a0d0a     ction.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657264   se..Host: waterd
0x00000050 (00080)   69726563 742e6e65 740d0a0d 0a0d0a     irect.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206669 6768746d   se..Host: fightm
0x00000050 (00080)   6574686f 642e6e65 740d0a0d 0a         ethod.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f776473   se..Host: crowds
0x00000050 (00080)   7065616b 2e6e6574 0d0a0d0a 0a         peak.net.....


Strings