Analysis Date2015-08-26 14:00:22
MD552a53a174277f55e6eb9228082c96737
SHA1e0f6b00c19335e0bb4d3f8f35debe76f1d24042f

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 06f67e7f210b8515802d90cdfdbe3868 sha1: 52e5d69301fc70c8ea82967fa14d7d69c26abc9f size: 804352
Section.rdata md5: 7cbcef4c6544c9e9f964239a9a01819a sha1: 00b1eea0f00e8cd778c389e0b7ff6328b708dad4 size: 58880
Section.data md5: 6bc91b8b3f686cd524a8cc2d39c93bdf sha1: 5e488cf71e1a276f2ea913b36c79b8c65d3a9232 size: 416768
Timestamp2014-11-28 23:13:55
PackerMicrosoft Visual C++ ?.?
PEhash512fc452f5cd189d3cf80bbd4628205c662fd3dc
IMPhashe93a8d6d8fef8ac86b2f7e7ff426e2d6
AVCA (E-Trust Ino)Win32/Tnega.XAXB!suspicious
AVF-SecureGen:Variant.Symmi.22722
AVDr. Webno_virus
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVBullGuardGen:Variant.Symmi.22722
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend MicroTROJ_WONTON.SMJ1
AVKasperskyTrojan.Win32.Generic
AVZillya!Trojan.Kryptik.Win32.777633
AVEmsisoftGen:Variant.Symmi.22722
AVIkarusTrojan.Win32.Crypt
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVMalwareBytesno_virus
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AE
AVK7Riskware ( 0040eff71 )
AVBitDefenderGen:Variant.Symmi.22722
AVFortinetW32/Kryptik.DDQD!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Kryptik.CCLE
AVAlwil (avast)Kryptik-OOC [Trj]
AVAd-AwareGen:Variant.Symmi.22722
AVTwisterno_virus
AVAvira (antivir)TR/Crypt.ZPACK.109820
AVMcafeeno_virus
AVRisingno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\hp7ruzut1lxipgkctjykos.exe
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\hp7ruzut1lxipgkctjykos.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\hp7ruzut1lxipgkctjykos.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Base Biometric Brightness Encrypting ➝
C:\WINDOWS\system32\lqnvvqsjs.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\etc
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\lck
Creates FileC:\WINDOWS\system32\lqnvvqsjs.exe
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\lqnvvqsjs.exe
Creates ServiceDiscovery Studio Procedure DCOM Secure Disk - C:\WINDOWS\system32\lqnvvqsjs.exe

Process
↳ Pid 804

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\WERe714.dir00\svchost.exe.mdmp
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\WERe714.dir00\svchost.exe.hdmp
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log
Creates Filepipe\PCHFaultRepExecPipe
Creates ProcessC:\WINDOWS\system32\dumprep.exe 1016 -dm 7 7 C:\Documents and Settings\Administrator\Local Settings\Temp\WERe714.dir00\svchost.exe.mdmp 16325836412030884

Process
↳ Pid 1108

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1868

Process
↳ Pid 1140

Process
↳ C:\WINDOWS\system32\lqnvvqsjs.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\lck
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\rng
Creates FileC:\WINDOWS\system32\bkikibkwurik.exe
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\cfg
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\run
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\TEMP\hp7ruzut1sjcpgkc.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\oouezwgpnsknm\tst
Creates ProcessWATCHDOGPROC "c:\windows\system32\lqnvvqsjs.exe"
Creates ProcessC:\WINDOWS\TEMP\hp7ruzut1sjcpgkc.exe -r 38207 tcp

Process
↳ C:\WINDOWS\system32\lqnvvqsjs.exe

Creates FileC:\WINDOWS\system32\oouezwgpnsknm\tst

Process
↳ C:\WINDOWS\system32\dumprep.exe 1016 -dm 7 7 C:\Documents and Settings\Administrator\Local Settings\Temp\WERe714.dir00\svchost.exe.mdmp 16325836412030884

Process
↳ WATCHDOGPROC "c:\windows\system32\lqnvvqsjs.exe"

Creates FileC:\WINDOWS\system32\oouezwgpnsknm\tst

Process
↳ C:\WINDOWS\TEMP\hp7ruzut1sjcpgkc.exe -r 38207 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSsaltsecond.net
Type: A
74.220.199.6
DNSpickgrave.net
Type: A
208.91.197.241
DNSroomstock.net
Type: A
208.91.197.241
DNSwatcheasy.net
Type: A
208.91.197.241
DNSuponmail.net
Type: A
208.91.197.241
DNStakenhand.net
Type: A
208.91.197.241
DNSwatchsince.net
Type: A
208.91.197.241
DNSspotdont.net
Type: A
208.91.197.241
DNSofferaunt.net
Type: A
208.91.197.241
DNSdrinkwide.net
Type: A
208.91.197.241
DNSpickmake.net
Type: A
208.91.197.241
DNSwalkread.net
Type: A
95.211.230.75
DNSdriveking.net
Type: A
27.124.125.18
DNSnailking.net
Type: A
173.193.105.242
DNSfieldtree.net
Type: A
50.63.202.42
DNSfacetree.net
Type: A
103.27.237.210
DNSwalkloud.net
Type: A
50.63.202.40
DNSsouthblood.net
Type: A
DNSableread.net
Type: A
DNSmadethan.net
Type: A
DNSwhomfifth.net
Type: A
DNSgainread.net
Type: A
DNSbothmile.net
Type: A
DNSgainmile.net
Type: A
DNSbothking.net
Type: A
DNSgainking.net
Type: A
DNSleastthan.net
Type: A
DNSfacethan.net
Type: A
DNSleastread.net
Type: A
DNSfaceread.net
Type: A
DNSleastmile.net
Type: A
DNSfacemile.net
Type: A
DNSleastking.net
Type: A
DNSfaceking.net
Type: A
DNSmonththan.net
Type: A
DNSwalkthan.net
Type: A
DNSmonthread.net
Type: A
DNSmonthmile.net
Type: A
DNSwalkmile.net
Type: A
DNSmonthking.net
Type: A
DNSwalkking.net
Type: A
DNSstorythan.net
Type: A
DNSweakthan.net
Type: A
DNSstoryread.net
Type: A
DNSweakread.net
Type: A
DNSstorymile.net
Type: A
DNSweakmile.net
Type: A
DNSstoryking.net
Type: A
DNSweakking.net
Type: A
DNSafterthan.net
Type: A
DNSforcethan.net
Type: A
DNSafterread.net
Type: A
DNSforceread.net
Type: A
DNSaftermile.net
Type: A
DNSforcemile.net
Type: A
DNSafterking.net
Type: A
DNSforceking.net
Type: A
DNSsellthan.net
Type: A
DNSwednesdaythan.net
Type: A
DNSsellread.net
Type: A
DNSwednesdayread.net
Type: A
DNSsellmile.net
Type: A
DNSwednesdaymile.net
Type: A
DNSsellking.net
Type: A
DNSwednesdayking.net
Type: A
DNSdrivethan.net
Type: A
DNSnailthan.net
Type: A
DNSdriveread.net
Type: A
DNSnailread.net
Type: A
DNSdrivemile.net
Type: A
DNSnailmile.net
Type: A
DNSfieldsaturday.net
Type: A
DNSqueensaturday.net
Type: A
DNSfieldthousand.net
Type: A
DNSqueenthousand.net
Type: A
DNSfieldloud.net
Type: A
DNSqueenloud.net
Type: A
DNSqueentree.net
Type: A
DNSbothsaturday.net
Type: A
DNSgainsaturday.net
Type: A
DNSboththousand.net
Type: A
DNSgainthousand.net
Type: A
DNSbothloud.net
Type: A
DNSgainloud.net
Type: A
DNSbothtree.net
Type: A
DNSgaintree.net
Type: A
DNSleastsaturday.net
Type: A
DNSfacesaturday.net
Type: A
DNSleastthousand.net
Type: A
DNSfacethousand.net
Type: A
DNSleastloud.net
Type: A
DNSfaceloud.net
Type: A
DNSleasttree.net
Type: A
DNSmonthsaturday.net
Type: A
DNSwalksaturday.net
Type: A
DNSmonththousand.net
Type: A
DNSwalkthousand.net
Type: A
DNSmonthloud.net
Type: A
DNSmonthtree.net
Type: A
DNSwalktree.net
Type: A
HTTP GEThttp://saltsecond.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://pickgrave.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://roomstock.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://watcheasy.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://uponmail.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://takenhand.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://watchsince.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://spotdont.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://offeraunt.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://drinkwide.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://pickmake.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://walkread.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://driveking.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://nailking.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://fieldtree.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://facetree.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://walkloud.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://saltsecond.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://pickgrave.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://roomstock.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://watcheasy.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://uponmail.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://takenhand.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://watchsince.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://spotdont.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://offeraunt.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://drinkwide.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
HTTP GEThttp://pickmake.net/index.php?method=validate&mode=sox&v=034&sox=48b11601&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 74.220.199.6:80
Flows TCP192.168.1.1:1037 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1043 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1045 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1046 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1048 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1049 ➝ 27.124.125.18:80
Flows TCP192.168.1.1:1050 ➝ 173.193.105.242:80
Flows TCP192.168.1.1:1051 ➝ 50.63.202.42:80
Flows TCP192.168.1.1:1052 ➝ 103.27.237.210:80
Flows TCP192.168.1.1:1053 ➝ 50.63.202.40:80
Flows TCP192.168.1.1:1054 ➝ 74.220.199.6:80
Flows TCP192.168.1.1:1055 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1056 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1057 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1058 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1059 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1060 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1061 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1062 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1064 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1065 ➝ 208.91.197.241:80

Raw Pcap

Strings