Analysis Date2015-11-02 16:06:41
MD5b179f4a83f8fdba24480aee58c752bd9
SHA1e068bc6823d1f8df8bec045b13ff475897b62dce

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 17f720cf41ebc986bbf128e34e089ed2 sha1: 13975abc6635c63a8ef608cb5a06d521296f0599 size: 787968
Section.rdata md5: 6b5017aa4fab118c2b34c4dc5921f64c sha1: 60582f6f170c88b71c6613ed70eebb5f5543619b size: 58368
Section.data md5: 92eca5397dd6c83d7fa5e0790704f95e sha1: 9c75aa212ee1068735fec2e15b4873c2db748192 size: 407040
Timestamp2014-07-24 02:38:32
PackerMicrosoft Visual C++ ?.?
PEhash9341ab7e62c9f78da8924fddebd184bcfaf345e4
IMPhash33810b490b3b722d837b963e1af6a38a
AVAd-AwareGen:Variant.Symmi.22722
AVGrisoft (avg)Win32/Cryptor
AVCAT (quickheal)no_virus
AVIkarusTrojan.Win32.Crypt
AVAvira (antivir)TR/Crypt.ZPACK.Gen8
AVK7Trojan ( 004cd0081 )
AVClamAVno_virus
AVKasperskyTrojan.Win32.Generic
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVMalwareBytesTrojan.FakePDF
AVDr. WebTrojan.DownLoader17.36285
AVMcafeeno_virus
AVBitDefenderGen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BD
AVEmsisoftGen:Variant.Symmi.22722
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVAlwil (avast)Kryptik-OOC [Trj]
AVPadvishno_virus
AVEset (nod32)Win32/Kryptik.CCLE
AVRisingno_virus
AVBullGuardGen:Variant.Symmi.22722
AVFortinetW32/Kryptik.DDQD!tr
AVSymantecDownloader.Upatre!g15
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVTrend MicroTROJ_WONTON.SMJ1
AVFrisk (f-prot)no_virus
AVTwisterno_virus
AVCA (E-Trust Ino)no_virus
AVVirusBlokAda (vba32)no_virus
AVF-SecureGen:Variant.Symmi.22722
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\b5vwsjra1m66qldyygmz.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\b5vwsjra1m66qldyygmz.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\b5vwsjra1m66qldyygmz.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Interactive Connections List Auto ➝
C:\WINDOWS\system32\seathvj.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\etc
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\lck
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst
Creates FileC:\WINDOWS\system32\seathvj.exe
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\seathvj.exe
Creates ServiceAudio Driver DHCP Fax Link-Layer - C:\WINDOWS\system32\seathvj.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1120

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1860

Process
↳ Pid 1160

Process
↳ C:\WINDOWS\system32\seathvj.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\run
Creates FileC:\WINDOWS\system32\vphxcvk.exe
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\lck
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\rng
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\TEMP\b5vwsjra1t2gql.exe
Creates FileC:\WINDOWS\system32\efbfbdsnhqj\cfg
Creates ProcessC:\WINDOWS\TEMP\b5vwsjra1t2gql.exe -r 46393 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\seathvj.exe"

Process
↳ C:\WINDOWS\system32\seathvj.exe

Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\seathvj.exe"

Creates FileC:\WINDOWS\system32\efbfbdsnhqj\tst

Process
↳ C:\WINDOWS\TEMP\b5vwsjra1t2gql.exe -r 46393 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSsaltsecond.net
Type: A
74.220.199.6
DNSwishfish.net
Type: A
50.63.202.55
DNSdeadwing.net
Type: A
85.25.214.16
DNSdeadlady.net
Type: A
195.22.26.254
DNSdeadlady.net
Type: A
195.22.26.231
DNSdeadlady.net
Type: A
195.22.26.252
DNSdeadlady.net
Type: A
195.22.26.253
DNSrocklady.net
Type: A
64.61.199.44
DNSdeadfish.net
Type: A
69.172.201.208
DNSrockfish.net
Type: A
96.45.82.194
DNSrockfish.net
Type: A
96.45.83.91
DNSrockfish.net
Type: A
96.45.83.235
DNSrockfish.net
Type: A
96.45.82.90
DNSwronglady.net
Type: A
208.100.26.234
DNSsouthcity.net
Type: A
207.148.248.143
DNSspotcity.net
Type: A
91.195.240.101
DNSsaltcity.net
Type: A
184.168.221.55
DNSgladcity.net
Type: A
65.254.248.183
DNSvisitcity.net
Type: A
104.193.110.28
DNSwatchcity.net
Type: A
207.148.248.143
DNSfaircity.net
Type: A
80.77.120.47
DNSdreamgrow.net
Type: A
213.180.31.141
DNSdreamcity.net
Type: A
72.52.4.119
DNSthiscity.net
Type: A
121.42.126.34
DNSsouthcity.net
Type: A
207.148.248.143
DNSsignarmy.net
Type: A
DNSsouthblood.net
Type: A
DNSwifeknew.net
Type: A
DNSrockknew.net
Type: A
DNSspendstudy.net
Type: A
DNSringfirst.net
Type: A
DNSpointdeal.net
Type: A
DNSjoinfish.net
Type: A
DNSrockwing.net
Type: A
DNSdeadpast.net
Type: A
DNSrockpast.net
Type: A
DNSwrongwing.net
Type: A
DNSmadewing.net
Type: A
DNSwrongpast.net
Type: A
DNSmadepast.net
Type: A
DNSmadelady.net
Type: A
DNSwrongfish.net
Type: A
DNSmadefish.net
Type: A
DNSarivegrow.net
Type: A
DNSsouthgrow.net
Type: A
DNSarivetear.net
Type: A
DNSsouthtear.net
Type: A
DNSarivethank.net
Type: A
DNSsouththank.net
Type: A
DNSarivecity.net
Type: A
DNSupongrow.net
Type: A
DNSwhichgrow.net
Type: A
DNSupontear.net
Type: A
DNSwhichtear.net
Type: A
DNSuponthank.net
Type: A
DNSwhichthank.net
Type: A
DNSuponcity.net
Type: A
DNSwhichcity.net
Type: A
DNSspotgrow.net
Type: A
DNSsaltgrow.net
Type: A
DNSspottear.net
Type: A
DNSsalttear.net
Type: A
DNSspotthank.net
Type: A
DNSsaltthank.net
Type: A
DNSgladgrow.net
Type: A
DNStakengrow.net
Type: A
DNSgladtear.net
Type: A
DNStakentear.net
Type: A
DNSgladthank.net
Type: A
DNStakenthank.net
Type: A
DNStakencity.net
Type: A
DNSequalgrow.net
Type: A
DNSgroupgrow.net
Type: A
DNSequaltear.net
Type: A
DNSgrouptear.net
Type: A
DNSequalthank.net
Type: A
DNSgroupthank.net
Type: A
DNSequalcity.net
Type: A
DNSgroupcity.net
Type: A
DNSspokegrow.net
Type: A
DNSvisitgrow.net
Type: A
DNSspoketear.net
Type: A
DNSvisittear.net
Type: A
DNSspokethank.net
Type: A
DNSvisitthank.net
Type: A
DNSspokecity.net
Type: A
DNSwatchgrow.net
Type: A
DNSfairgrow.net
Type: A
DNSwatchtear.net
Type: A
DNSfairtear.net
Type: A
DNSwatchthank.net
Type: A
DNSfairthank.net
Type: A
DNSthisgrow.net
Type: A
DNSdreamtear.net
Type: A
DNSthistear.net
Type: A
DNSdreamthank.net
Type: A
DNSthisthank.net
Type: A
DNSarivepure.net
Type: A
DNSsouthpure.net
Type: A
DNSarivemarch.net
Type: A
HTTP GEThttp://saltsecond.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://wishfish.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://deadwing.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://deadlady.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://rocklady.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://deadfish.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://rockfish.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://wronglady.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://southcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://spotcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://saltcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://gladcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://visitcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://watchcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://faircity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://dreamgrow.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://dreamcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://thiscity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://saltsecond.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://wishfish.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://deadwing.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://deadlady.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://rocklady.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://deadfish.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://rockfish.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://wronglady.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://southcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://spotcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://saltcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://gladcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://visitcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://watchcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://faircity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://dreamgrow.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://dreamcity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
HTTP GEThttp://thiscity.net/index.php?method=validate&mode=sox&v=030&sox=3c18da00
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 74.220.199.6:80
Flows TCP192.168.1.1:1037 ➝ 50.63.202.55:80
Flows TCP192.168.1.1:1038 ➝ 85.25.214.16:80
Flows TCP192.168.1.1:1039 ➝ 195.22.26.254:80
Flows TCP192.168.1.1:1040 ➝ 64.61.199.44:80
Flows TCP192.168.1.1:1041 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1042 ➝ 96.45.82.194:80
Flows TCP192.168.1.1:1043 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1044 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1045 ➝ 91.195.240.101:80
Flows TCP192.168.1.1:1046 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1047 ➝ 65.254.248.183:80
Flows TCP192.168.1.1:1049 ➝ 104.193.110.28:80
Flows TCP192.168.1.1:1050 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1051 ➝ 80.77.120.47:80
Flows TCP192.168.1.1:1052 ➝ 213.180.31.141:80
Flows TCP192.168.1.1:1053 ➝ 72.52.4.119:80
Flows TCP192.168.1.1:1054 ➝ 121.42.126.34:80
Flows TCP192.168.1.1:1055 ➝ 74.220.199.6:80
Flows TCP192.168.1.1:1056 ➝ 50.63.202.55:80
Flows TCP192.168.1.1:1057 ➝ 85.25.214.16:80
Flows TCP192.168.1.1:1058 ➝ 195.22.26.254:80
Flows TCP192.168.1.1:1059 ➝ 64.61.199.44:80
Flows TCP192.168.1.1:1060 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1061 ➝ 96.45.82.194:80
Flows TCP192.168.1.1:1062 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1063 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1064 ➝ 91.195.240.101:80
Flows TCP192.168.1.1:1065 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1066 ➝ 65.254.248.183:80
Flows TCP192.168.1.1:1067 ➝ 104.193.110.28:80
Flows TCP192.168.1.1:1068 ➝ 207.148.248.143:80
Flows TCP192.168.1.1:1069 ➝ 80.77.120.47:80
Flows TCP192.168.1.1:1070 ➝ 213.180.31.141:80
Flows TCP192.168.1.1:1071 ➝ 72.52.4.119:80
Flows TCP192.168.1.1:1072 ➝ 121.42.126.34:80

Raw Pcap

Strings