Analysis Date2015-08-26 13:22:39
MD5723b3962b0a346c7eaa7c2c2a83eb545
SHA1ee9b77ecfda8504ca2adc62de660144ba23f1da4

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 2da90a545307e3156b96610f0f075ee7 sha1: 901c0776dcac6e0381f470c8d9881be65cc31e19 size: 164352
Section.rdata md5: df5b1afa41eddf542348d9f92a7b6cb4 sha1: c354095c6815a58261507aa399bb6625dd95ccf6 size: 37888
Section.data md5: 3cd8264ec764bc23a494e14b22b478d6 sha1: b8f7ae4ea084367b98b6b370efd8f9bbec952a12 size: 6656
Timestamp2015-03-13 09:10:18
PackerMicrosoft Visual C++ ?.?
PEhash5f1b7a02f2854fb54c96db9e2887d1017ba7e559
IMPhash1c85bdb58d2c772ca039799294f3eaf7
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Rodecap.1
AVDr. WebTrojan.DownLoader15.41252
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVBullGuardGen:Variant.Rodecap.1
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend Microno_virus
AVKasperskyTrojan.Win32.Generic
AVZillya!no_virus
AVEmsisoftGen:Variant.Rodecap.1
AVIkarusTrojan.Win32.Rodecap
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVMalwareBytesTrojan.Agent
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AV
AVK7Trojan ( 004bdb0b1 )
AVBitDefenderGen:Variant.Rodecap.1
AVFortinetW32/Rodecap.BJ!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Rodecap.BJ
AVAlwil (avast)Kryptik-PDK [Trj]
AVAd-AwareGen:Variant.Rodecap.1
AVTwisterno_virus
AVAvira (antivir)TR/Crypt.ZPACK.153389
AVMcafeeTrojan-FEVX!723B3962B0A3
AVRising0x58f5ebf1

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\ajnxyrxvrg\sfwcgoeu
Creates FileC:\ajnxyrxvrg\groq11lmnxufmeuxmnp.exe
Creates FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Deletes FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Creates ProcessC:\ajnxyrxvrg\groq11lmnxufmeuxmnp.exe

Process
↳ C:\ajnxyrxvrg\groq11lmnxufmeuxmnp.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Connections Endpoint Thread ➝
C:\ajnxyrxvrg\jmsuxjujlr.exe
Creates FileC:\ajnxyrxvrg\shgkaa41rpn
Creates FileC:\ajnxyrxvrg\sfwcgoeu
Creates FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Creates FileC:\ajnxyrxvrg\jmsuxjujlr.exe
Deletes FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Creates ProcessC:\ajnxyrxvrg\jmsuxjujlr.exe
Creates ServiceHealth Locator Extender SNMP Secure PC - C:\ajnxyrxvrg\jmsuxjujlr.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1872

Process
↳ Pid 1184

Process
↳ C:\ajnxyrxvrg\jmsuxjujlr.exe

Creates FileC:\ajnxyrxvrg\wq5xwzq
Creates Filepipe\net\NtControlPipe10
Creates FileC:\ajnxyrxvrg\shgkaa41rpn
Creates FileC:\ajnxyrxvrg\sfwcgoeu
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Creates FileC:\ajnxyrxvrg\tevdymu.exe
Deletes FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Creates Processmvar7tfbmjei "c:\ajnxyrxvrg\jmsuxjujlr.exe"

Process
↳ C:\ajnxyrxvrg\jmsuxjujlr.exe

Creates FileC:\ajnxyrxvrg\sfwcgoeu
Creates FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Deletes FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu

Process
↳ mvar7tfbmjei "c:\ajnxyrxvrg\jmsuxjujlr.exe"

Creates FileC:\ajnxyrxvrg\sfwcgoeu
Creates FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu
Deletes FileC:\WINDOWS\ajnxyrxvrg\sfwcgoeu

Network Details:

DNSlaughschool.net
Type: A
184.168.221.69
DNSsimpleschool.net
Type: A
216.250.126.173
DNSmotherschool.net
Type: A
184.168.221.19
DNSmountainschool.net
Type: A
184.168.221.15
DNSwindowwhile.net
Type: A
95.211.230.75
DNSwinterschool.net
Type: A
82.98.134.9
DNSfinishschool.net
Type: A
208.73.211.70
DNSmaterialalways.net
Type: A
DNSseveralforest.net
Type: A
DNSmaterialforest.net
Type: A
DNSseveraschool.net
Type: A
DNSseverawhile.net
Type: A
DNSlaughwhile.net
Type: A
DNSseveraquestion.net
Type: A
DNSlaughquestion.net
Type: A
DNSseveratherefore.net
Type: A
DNSlaughtherefore.net
Type: A
DNSsimplewhile.net
Type: A
DNSmotherwhile.net
Type: A
DNSsimplequestion.net
Type: A
DNSmotherquestion.net
Type: A
DNSsimpletherefore.net
Type: A
DNSmothertherefore.net
Type: A
DNSpossibleschool.net
Type: A
DNSmountainwhile.net
Type: A
DNSpossiblewhile.net
Type: A
DNSmountainquestion.net
Type: A
DNSpossiblequestion.net
Type: A
DNSmountaintherefore.net
Type: A
DNSpossibletherefore.net
Type: A
DNSperhapsschool.net
Type: A
DNSwindowschool.net
Type: A
DNSperhapswhile.net
Type: A
DNSperhapsquestion.net
Type: A
DNSwindowquestion.net
Type: A
DNSperhapstherefore.net
Type: A
DNSwindowtherefore.net
Type: A
DNSsubjectschool.net
Type: A
DNSwinterwhile.net
Type: A
DNSsubjectwhile.net
Type: A
DNSwinterquestion.net
Type: A
DNSsubjectquestion.net
Type: A
DNSwintertherefore.net
Type: A
DNSsubjecttherefore.net
Type: A
DNSleaveschool.net
Type: A
DNSfinishwhile.net
Type: A
DNSleavewhile.net
Type: A
DNSfinishquestion.net
Type: A
DNSleavequestion.net
Type: A
DNSfinishtherefore.net
Type: A
DNSleavetherefore.net
Type: A
DNSsweetschool.net
Type: A
DNSprobablyschool.net
Type: A
DNSsweetwhile.net
Type: A
DNSprobablywhile.net
Type: A
DNSsweetquestion.net
Type: A
DNSprobablyquestion.net
Type: A
DNSsweettherefore.net
Type: A
DNSprobablytherefore.net
Type: A
DNSseveralschool.net
Type: A
DNSmaterialschool.net
Type: A
DNSseveralwhile.net
Type: A
DNSmaterialwhile.net
Type: A
DNSseveralquestion.net
Type: A
DNSmaterialquestion.net
Type: A
DNSseveraltherefore.net
Type: A
DNSmaterialtherefore.net
Type: A
DNSseverahunger.net
Type: A
DNSlaughhunger.net
Type: A
DNSseveratraining.net
Type: A
DNSlaughtraining.net
Type: A
DNSseverastorm.net
Type: A
DNSlaughstorm.net
Type: A
DNSseverathrown.net
Type: A
DNSlaughthrown.net
Type: A
DNSsimplehunger.net
Type: A
DNSmotherhunger.net
Type: A
DNSsimpletraining.net
Type: A
DNSmothertraining.net
Type: A
DNSsimplestorm.net
Type: A
DNSmotherstorm.net
Type: A
DNSsimplethrown.net
Type: A
DNSmotherthrown.net
Type: A
DNSmountainhunger.net
Type: A
DNSpossiblehunger.net
Type: A
HTTP GEThttp://laughschool.net/index.php?method&len
User-Agent:
HTTP GEThttp://simpleschool.net/index.php?method&len
User-Agent:
HTTP GEThttp://motherschool.net/index.php?method&len
User-Agent:
HTTP GEThttp://mountainschool.net/index.php?method&len
User-Agent:
HTTP GEThttp://windowwhile.net/index.php?method&len
User-Agent:
HTTP GEThttp://winterschool.net/index.php?method&len
User-Agent:
HTTP GEThttp://finishschool.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.69:80
Flows TCP192.168.1.1:1032 ➝ 216.250.126.173:80
Flows TCP192.168.1.1:1033 ➝ 184.168.221.19:80
Flows TCP192.168.1.1:1034 ➝ 184.168.221.15:80
Flows TCP192.168.1.1:1035 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1036 ➝ 82.98.134.9:80
Flows TCP192.168.1.1:1037 ➝ 208.73.211.70:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206c61 75676873   se..Host: laughs
0x00000050 (00080)   63686f6f 6c2e6e65 740d0a0d 0a         chool.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207369 6d706c65   se..Host: simple
0x00000050 (00080)   7363686f 6f6c2e6e 65740d0a 0d0a       school.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d6f 74686572   se..Host: mother
0x00000050 (00080)   7363686f 6f6c2e6e 65740d0a 0d0a       school.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d6f 756e7461   se..Host: mounta
0x00000050 (00080)   696e7363 686f6f6c 2e6e6574 0d0a0d0a   inschool.net....
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207769 6e646f77   se..Host: window
0x00000050 (00080)   7768696c 652e6e65 740d0a0d 0a0a0d0a   while.net.......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207769 6e746572   se..Host: winter
0x00000050 (00080)   7363686f 6f6c2e6e 65740d0a 0d0a0d0a   school.net......
0x00000060 (00096)                                         

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206669 6e697368   se..Host: finish
0x00000050 (00080)   7363686f 6f6c2e6e 65740d0a 0d0a0d0a   school.net......
0x00000060 (00096)                                         


Strings