Analysis Date2015-09-16 02:15:32
MD5b10d29d48f3a241ca6ad4d7debecbfc7
SHA1da0684e051713dac993fa906bb6558465f865c09

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: e046fe5d1b7e61a2d6752194523f132c sha1: c46bfff70559d086f07505599506a51009738037 size: 835072
Section.rdata md5: c4305036007ffc4fcd412e4a123a1642 sha1: 2523211db1075a23fcd5e8f13f8b0d98d9ed55c2 size: 315392
Section.data md5: 34f66e01ab067c82f469711484aa2b5d sha1: 7bda02679dabe558fe7501b673d6c4b4f2c8570e size: 7680
Timestamp2015-04-12 19:54:23
PackerMicrosoft Visual C++ ?.?
PEhasha55f8860c3c6e1d7dadfa4aa15fd336be1ad142d
IMPhash6903b7878273ddf02664c2ed611caf2f
AVCA (E-Trust Ino)no_virus
AVRising0x590623c9
AVMcafeeno_virus
AVAvira (antivir)TR/Crypt.Xpack.251612
AVTwisterno_virus
AVAd-AwareGen:Variant.Zusy.133308
AVAlwil (avast)Downloader-TLD [Trj]
AVEset (nod32)Win32/Kryptik.DDQD
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Kryptik.DDQD!tr
AVBitDefenderGen:Variant.Zusy.133308
AVK7Trojan ( 004bb8ba1 )
AVMicrosoft Security EssentialsTrojan:Win32/Dynamer!ac
AVMicroWorld (escan)Gen:Variant.Zusy.133308
AVMalwareBytesno_virus
AVAuthentiumW32/Zusy.X.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Crypt
AVEmsisoftGen:Variant.Zusy.133308
AVZillya!no_virus
AVKasperskyTrojan.Win32.Generic
AVTrend Microno_virus
AVCAT (quickheal)no_virus
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Zusy.133308
AVArcabit (arcavir)Gen:Variant.Zusy.133308
AVClamAVno_virus
AVDr. WebTrojan.DownLoader16.22421
AVF-SecureGen:Variant.Zusy.133308

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\dfzzhsbv1kiqwrq5tnvjvhjub.exe
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\dfzzhsbv1kiqwrq5tnvjvhjub.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\dfzzhsbv1kiqwrq5tnvjvhjub.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Presentation Resource IPsec Plug Collector ➝
C:\WINDOWS\system32\aquzbmn.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\etc
Creates FileC:\WINDOWS\system32\aquzbmn.exe
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\lck
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\aquzbmn.exe
Creates ServiceProvider Acquisition Bluetooth - C:\WINDOWS\system32\aquzbmn.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 804

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1860

Process
↳ Pid 1128

Process
↳ C:\WINDOWS\system32\aquzbmn.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\cfg
Creates FileC:\WINDOWS\system32\fgfpilmqrkc.exe
Creates FileC:\WINDOWS\TEMP\dfzzhsbv1rpuwrq5t.exe
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\rng
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\lck
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\run
Creates ProcessWATCHDOGPROC "c:\windows\system32\aquzbmn.exe"
Creates ProcessC:\WINDOWS\TEMP\dfzzhsbv1rpuwrq5t.exe -r 48316 tcp

Process
↳ C:\WINDOWS\system32\aquzbmn.exe

Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\aquzbmn.exe"

Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst

Process
↳ C:\WINDOWS\TEMP\dfzzhsbv1rpuwrq5t.exe -r 48316 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSnailthere.net
Type: A
98.139.135.129
DNSgroupgrain.net
Type: A
208.91.197.241
DNSthreeonly.net
Type: A
208.91.197.241
DNSnaildeep.com
Type: A
74.220.215.218
DNSlifeclock.net
Type: A
198.46.51.193
DNSlifeclock.net
Type: A
162.212.2.137
DNSlifemake.net
Type: A
192.64.119.44
DNSenemyrush.net
Type: A
95.211.230.75
DNSdeeprush.net
Type: A
184.168.221.26
DNSpushhard.net
Type: A
66.96.147.159
DNSpushclock.net
Type: A
217.70.184.38
DNSpushmake.net
Type: A
37.59.4.217
DNSlongshine.net
Type: A
218.107.207.37
DNSableread.net
Type: A
DNSfearstate.net
Type: A
DNSlongcold.net
Type: A
DNSfridayloss.net
Type: A
DNSwrongbelow.net
Type: A
DNShilldance.net
Type: A
DNSeggbraker.com
Type: A
DNSithouneed.com
Type: A
DNSlongrush.net
Type: A
DNSsoilrush.net
Type: A
DNSwheelhard.net
Type: A
DNSsaidhard.net
Type: A
DNSwheelclock.net
Type: A
DNSsaidclock.net
Type: A
DNSwheelmake.net
Type: A
DNSsaidmake.net
Type: A
DNSwheelrush.net
Type: A
DNSsaidrush.net
Type: A
DNSstickhard.net
Type: A
DNSballhard.net
Type: A
DNSstickclock.net
Type: A
DNSballclock.net
Type: A
DNSstickmake.net
Type: A
DNSballmake.net
Type: A
DNSstickrush.net
Type: A
DNSballrush.net
Type: A
DNSenemyhard.net
Type: A
DNSlifehard.net
Type: A
DNSenemyclock.net
Type: A
DNSenemymake.net
Type: A
DNSliferush.net
Type: A
DNSmouthhard.net
Type: A
DNStillhard.net
Type: A
DNSmouthclock.net
Type: A
DNStillclock.net
Type: A
DNSmouthmake.net
Type: A
DNStillmake.net
Type: A
DNSmouthrush.net
Type: A
DNStillrush.net
Type: A
DNSshallhard.net
Type: A
DNSdeephard.net
Type: A
DNSshallclock.net
Type: A
DNSdeepclock.net
Type: A
DNSshallmake.net
Type: A
DNSdeepmake.net
Type: A
DNSshallrush.net
Type: A
DNSfridayhard.net
Type: A
DNSfridayclock.net
Type: A
DNSfridaymake.net
Type: A
DNSpushrush.net
Type: A
DNSfridayrush.net
Type: A
DNSalonghard.net
Type: A
DNSdecemberhard.net
Type: A
DNSalongclock.net
Type: A
DNSdecemberclock.net
Type: A
DNSalongmake.net
Type: A
DNSdecembermake.net
Type: A
DNSalongrush.net
Type: A
DNSdecemberrush.net
Type: A
DNSlongfifth.net
Type: A
DNSsoilfifth.net
Type: A
DNSsoilshine.net
Type: A
DNSlongdone.net
Type: A
DNSsoildone.net
Type: A
DNSlongknew.net
Type: A
DNSsoilknew.net
Type: A
DNSwheelfifth.net
Type: A
DNSsaidfifth.net
Type: A
DNSwheelshine.net
Type: A
DNSsaidshine.net
Type: A
DNSwheeldone.net
Type: A
DNSsaiddone.net
Type: A
DNSwheelknew.net
Type: A
DNSsaidknew.net
Type: A
DNSstickfifth.net
Type: A
DNSballfifth.net
Type: A
DNSstickshine.net
Type: A
DNSballshine.net
Type: A
DNSstickdone.net
Type: A
DNSballdone.net
Type: A
DNSstickknew.net
Type: A
DNSballknew.net
Type: A
DNSenemyfifth.net
Type: A
DNSlifefifth.net
Type: A
DNSenemyshine.net
Type: A
HTTP GEThttp://nailthere.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://groupgrain.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://threeonly.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://lifeclock.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://lifemake.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://enemyrush.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://deeprush.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://pushhard.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://pushclock.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://pushmake.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://longshine.net/index.php?method=validate&mode=sox&v=047&sox=4b4e6800&lenhdr
User-Agent:
Flows TCP192.168.1.1:1037 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1041 ➝ 198.46.51.193:80
Flows TCP192.168.1.1:1042 ➝ 192.64.119.44:80
Flows TCP192.168.1.1:1043 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1044 ➝ 184.168.221.26:80
Flows TCP192.168.1.1:1045 ➝ 66.96.147.159:80
Flows TCP192.168.1.1:1046 ➝ 217.70.184.38:80
Flows TCP192.168.1.1:1047 ➝ 37.59.4.217:80
Flows TCP192.168.1.1:1048 ➝ 218.107.207.37:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206e61 696c7468 6572652e 6e65740d   : nailthere.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206772 6f757067 7261696e 2e6e6574   : groupgrain.net
0x00000080 (00128)   0d0a0d0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207468 7265656f 6e6c792e 6e65740d   : threeonly.net.
0x00000080 (00128)   0a0d0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206e61 696c6465 65702e63 6f6d0d0a   : naildeep.com..
0x00000080 (00128)   0d0a0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 6665636c 6f636b2e 6e65740d   : lifeclock.net.
0x00000080 (00128)   0a0d0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656d61 6b652e6e 65740d0a   : lifemake.net..
0x00000080 (00128)   0d0a0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656e 656d7972 7573682e 6e65740d   : enemyrush.net.
0x00000080 (00128)   0a0d0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 65707275 73682e6e 65740d0a   : deeprush.net..
0x00000080 (00128)   0d0a0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207075 73686861 72642e6e 65740d0a   : pushhard.net..
0x00000080 (00128)   0d0a0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207075 7368636c 6f636b2e 6e65740d   : pushclock.net.
0x00000080 (00128)   0a0d0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207075 73686d61 6b652e6e 65740d0a   : pushmake.net..
0x00000080 (00128)   0d0a0a0a                              ....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3726736f   ode=sox&v=047&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c6f 6e677368 696e652e 6e65740d   : longshine.net.
0x00000080 (00128)   0a0d0a0a                              ....


Strings