Analysis Date2015-10-20 09:17:02
MD5c249b36f7b25abc3d694fd12de7d0d0c
SHA1d9f8ddce7a07200b86b95f0c0a1766b8e26cdee7

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Sectioncode1 md5: 8e1e0a91f79ef20477e8bdacf30c0666 sha1: 228f2ea846c07c7b78675febb5a0fb562a11d5cb size: 7680
Section.PDATA md5: cc65c69d6e050c51eacc808efa799d46 sha1: c7484848e1e74600405f4007613040e3ba171fde size: 9216
Section.RSRC md5: 604636f35567aa7030a6beb4756616ae sha1: 8d28f4c32f49e41a9303107eb43813f98f9da80f size: 28160
Section.relen md5: b1e4b11314603e8d9ba3736ae40fc692 sha1: 4d48270227c93709b861270721fa459eaaa1ec30 size: 1024
Section.dete2 md5: b1e4b11314603e8d9ba3736ae40fc692 sha1: 4d48270227c93709b861270721fa459eaaa1ec30 size: 1024
Section.dete2 md5: 146946356b1b22756de07a40ca3fc6d5 sha1: 44cca429e9869f832e947af0d4a3f7c37cdf7527 size: 512
Timestamp1997-10-25 21:15:36
PEhash07f0c675e948e6599c3b709763e7a5a1060efe81
IMPhash2e56f0141c923cf9d4c3d21a5b4e7d79
AVPadvishno_virus
AVFrisk (f-prot)W32/Trojan3.PYV
AVAvira (antivir)TR/Crypt.Xpack.240326
AVIkarusTrojan.Win32.Crypt
AVCA (E-Trust Ino)no_virus
AVEmsisoftTrojan.Downloader.JRVK
AVFortinetW32/Waski.F!tr
AVRisingTrojan.Win32.Downloader.bn
AVAlwil (avast)Crypt-SCG [Trj]
AVZillya!Downloader.Waski.Win32.3932
AVSymantecDownloader.Upatre!gen9
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre.BL
AVTwisterTrojanDldr.Waski.F.upwi
AVBitDefenderTrojan.Downloader.JRVK
AVMicroWorld (escan)Trojan.Downloader.JRVK
AVCAT (quickheal)TrojanDwnldr.Upatre.MUE.A5
AVAuthentiumW32/Trojan3.PYV
AVVirusBlokAda (vba32)BScope.Malware-Cryptor.Hlux
AVEset (nod32)Win32/TrojanDownloader.Waski.F
AVAd-AwareTrojan.Downloader.JRVK
AVGrisoft (avg)Generic_s.ESF
AVKasperskyTrojan.Win32.Generic
AVMcafeeUpatre-FACE!C249B36F7B25
AVMalwareBytesSpyware.Dyre
AVClamAVno_virus
AVK7Trojan-Downloader ( 004b8d561 )
AVArcabit (arcavir)Trojan.Downloader.JRVK
AVDr. WebTrojan.Siggen6.36359
AVF-SecureTrojan.Downloader.JRVK
AVTrend MicroTROJ_UP.1DCBD1E8
AVBullGuardTrojan.Downloader.JRVK

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\Ratenode.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\RateB4F0.tmp
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\Ratenode.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\Ratenode.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Deletes FileC:\malware.exe
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS96.46.99.215
Winsock DNS94.154.107.172
Winsock DNS178.222.250.35
Winsock DNS188.255.168.97
Winsock DNS95.143.130.63
Winsock DNS93.185.4.90
Winsock DNSicanhazip.com

Network Details:

DNSicanhazip.com
Type: A
104.238.136.31
DNSicanhazip.com
Type: A
104.238.145.30
DNSicanhazip.com
Type: A
104.238.141.75
HTTP GEThttp://icanhazip.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
HTTP GEThttp://93.185.4.90:13271/KAA1/COMPUTER-XXXXXX/0/51-SP3/0/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
Flows TCP192.168.1.1:1031 ➝ 104.238.136.31:80
Flows TCP192.168.1.1:1032 ➝ 93.185.4.90:13271
Flows TCP192.168.1.1:1033 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1034 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1035 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1036 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1037 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1038 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1039 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1040 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1041 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1042 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1043 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1044 ➝ 95.143.130.63:443
Flows TCP192.168.1.1:1045 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1046 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1047 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1048 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1049 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1050 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1051 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1052 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1053 ➝ 188.255.168.97:443
Flows TCP192.168.1.1:1054 ➝ 188.255.168.97:443
Flows TCP192.168.1.1:1055 ➝ 188.255.168.97:443
Flows TCP192.168.1.1:1056 ➝ 188.255.168.97:443

Raw Pcap
0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   41636365 70743a20 74657874 2f2a2c20   Accept: text/*, 
0x00000020 (00032)   6170706c 69636174 696f6e2f 2a0d0a55   application/*..U
0x00000030 (00048)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000040 (00064)   6c612f35 2e302028 57696e64 6f777320   la/5.0 (Windows 
0x00000050 (00080)   4e542036 2e313b57 4f573634 29204170   NT 6.1;WOW64) Ap
0x00000060 (00096)   706c6557 65624b69 742f3533 372e3336   pleWebKit/537.36
0x00000070 (00112)   20284b48 544d4c2c 206c696b 65204765    (KHTML, like Ge
0x00000080 (00128)   636b6f29 20436872 6f6d652f 34312e30   cko) Chrome/41.0
0x00000090 (00144)   2e323237 322e3839 20536166 6172692f   .2272.89 Safari/
0x000000a0 (00160)   3533372e 3336204f 50522f32 382e302e   537.36 OPR/28.0.
0x000000b0 (00176)   31373530 2e34380d 0a486f73 743a2069   1750.48..Host: i
0x000000c0 (00192)   63616e68 617a6970 2e636f6d 0d0a4361   canhazip.com..Ca
0x000000d0 (00208)   6368652d 436f6e74 726f6c3a 206e6f2d   che-Control: no-
0x000000e0 (00224)   63616368 650d0a0d 0a                  cache....

0x00000000 (00000)   47455420 2f4b4141 312f434f 4d505554   GET /KAA1/COMPUT
0x00000010 (00016)   45522d58 58585858 582f302f 35312d53   ER-XXXXXX/0/51-S
0x00000020 (00032)   50332f30 2f204854 54502f31 2e310d0a   P3/0/ HTTP/1.1..
0x00000030 (00048)   55736572 2d416765 6e743a20 4d6f7a69   User-Agent: Mozi
0x00000040 (00064)   6c6c612f 352e3020 2857696e 646f7773   lla/5.0 (Windows
0x00000050 (00080)   204e5420 362e313b 574f5736 34292041    NT 6.1;WOW64) A
0x00000060 (00096)   70706c65 5765624b 69742f35 33372e33   ppleWebKit/537.3
0x00000070 (00112)   3620284b 48544d4c 2c206c69 6b652047   6 (KHTML, like G
0x00000080 (00128)   65636b6f 29204368 726f6d65 2f34312e   ecko) Chrome/41.
0x00000090 (00144)   302e3232 37322e38 39205361 66617269   0.2272.89 Safari
0x000000a0 (00160)   2f353337 2e333620 4f50522f 32382e30   /537.36 OPR/28.0
0x000000b0 (00176)   2e313735 302e3438 0d0a486f 73743a20   .1750.48..Host: 
0x000000c0 (00192)   39332e31 38352e34 2e39303a 31333237   93.185.4.90:1327
0x000000d0 (00208)   310d0a43 61636865 2d436f6e 74726f6c   1..Cache-Control
0x000000e0 (00224)   3a206e6f 2d636163 68650d0a 0d0a       : no-cache....

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.


Strings