Analysis Date2015-08-28 09:54:18
MD562eb4df5314d412f207420fb62dff35f
SHA1f49ac39afd13d828d8cdbbd3648f286e1021dca2

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 0e63b0191896cdc4f4fe6be3d1dc7a3d sha1: ab1f8ef8eb64a3d621c36c9997ad6b023d873455 size: 977408
Section.rdata md5: af867aca6e441cb16598df17efebc481 sha1: 2abfcc6e53cbeb1530653863ddceb1762e665875 size: 31232
Section.data md5: bfc343549a427ccd96efb64e0d211b5a sha1: b2cc33da0dcf9210ed8395864d4f34856e794e74 size: 117248
Timestamp2013-03-07 20:52:01
PackerMicrosoft Visual C++ ?.?
PEhasha084026447820cf84bf4af6cea32a0e2b3b6de86
IMPhashc393346f781d020d38e8a00c6cb88bc1
AVRisingno_virus
AVMcafeeno_virus
AVAvira (antivir)BDS/Zegost.Gen
AVTwisterVirus.CB0000E978FEFFFF50.mg
AVAd-AwareGen:Variant.Kazy.164619
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVEset (nod32)Win32/Bayrob.N.Gen
AVGrisoft (avg)Generic_r.CDN
AVSymantecTrojan.Bayrob!gen4
AVFortinetW32/Bayrob.N!tr
AVBitDefenderGen:Variant.Kazy.164619
AVK7Backdoor ( 04c540d41 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AE
AVMicroWorld (escan)Gen:Variant.Kazy.164619
AVMalwareBytesTrojan.Agent
AVAuthentiumW32/Symmi.G.gen!Eldorado
AVFrisk (f-prot)W32/Symmi.G.gen!Eldorado
AVIkarusTrojan.Win32.Spy
AVEmsisoftGen:Variant.Kazy.164619
AVZillya!Trojan.Bayrob.Win32.1428
AVKasperskyTrojan.Win32.Generic
AVTrend MicroTSPY_NIVDORT.SM
AVCAT (quickheal)no_virus
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Kazy.164619
AVArcabit (arcavir)Gen:Variant.Kazy.164619
AVClamAVno_virus
AVDr. Webno_virus
AVF-SecureGen:Variant.Kazy.164619
AVCA (E-Trust Ino)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\iadkpjp1kahkjhlho8.exe
Creates FileC:\WINDOWS\system32\irybwnpymi\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\iadkpjp1kahkjhlho8.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\iadkpjp1kahkjhlho8.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Sharing Client IP WMI Device Drive ➝
C:\WINDOWS\system32\kogwwgbdd.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\irybwnpymi\etc
Creates FileC:\Documents and Settings\Administrator\Start Menu\Programs\Startup\kogwwgbdd.exe
Creates FileC:\WINDOWS\system32\kogwwgbdd.exe
Creates FileC:\WINDOWS\system32\irybwnpymi\lck
Creates FileC:\WINDOWS\system32\irybwnpymi\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\kogwwgbdd.exe
Creates ServiceImage Service Shell Link-Layer Base SPP - C:\WINDOWS\system32\kogwwgbdd.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1136

Process
↳ C:\WINDOWS\system32\kogwwgbdd.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\TEMP\iadkpjp1pzckk.exe
Creates FileC:\WINDOWS\system32\irybwnpymi\lck
Creates FileC:\WINDOWS\system32\irybwnpymi\run
Creates FileC:\WINDOWS\system32\irybwnpymi\rng
Creates FileC:\WINDOWS\system32\orurulx.exe
Creates Filepipe\net\NtControlPipe10
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\irybwnpymi\cfg
Creates FileC:\WINDOWS\system32\irybwnpymi\tst
Creates ProcessWATCHDOGPROC "c:\windows\system32\kogwwgbdd.exe"
Creates ProcessC:\WINDOWS\TEMP\iadkpjp1pzckk.exe -r 29060 tcp

Process
↳ C:\WINDOWS\system32\kogwwgbdd.exe

Creates FileC:\WINDOWS\system32\irybwnpymi\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\kogwwgbdd.exe"

Creates FileC:\WINDOWS\system32\irybwnpymi\tst

Process
↳ C:\WINDOWS\TEMP\iadkpjp1pzckk.exe -r 29060 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSmojoguia.com
Type: A
204.11.56.48
DNSvillemojo.com
Type: A
141.8.224.183
DNSwestocean.net
Type: A
188.40.39.214
DNSnoneocean.net
Type: A
95.211.230.75
DNSfearstone.net
Type: A
184.168.221.38
DNSwestocean.net
Type: A
188.40.39.214
DNSdominoclub-grup.com
Type: A
DNSelementarimagine.com
Type: A
DNSjarybuter.com
Type: A
DNSmojositio.com
Type: A
DNSsorryhold.net
Type: A
DNSfiftyhold.net
Type: A
DNSsorrysecond.net
Type: A
DNSfiftysecond.net
Type: A
DNSsorryocean.net
Type: A
DNSfiftyocean.net
Type: A
DNSsorryhave.net
Type: A
DNSfiftyhave.net
Type: A
DNStheirhold.net
Type: A
DNSlikrhold.net
Type: A
DNStheirsecond.net
Type: A
DNSlikrsecond.net
Type: A
DNStheirocean.net
Type: A
DNSlikrocean.net
Type: A
DNStheirhave.net
Type: A
DNSlikrhave.net
Type: A
DNSfearhold.net
Type: A
DNSwesthold.net
Type: A
DNSfearsecond.net
Type: A
DNSwestsecond.net
Type: A
DNSfearocean.net
Type: A
DNSfearhave.net
Type: A
DNSwesthave.net
Type: A
DNStablehold.net
Type: A
DNSleadhold.net
Type: A
DNStablesecond.net
Type: A
DNSleadsecond.net
Type: A
DNStableocean.net
Type: A
DNSleadocean.net
Type: A
DNStablehave.net
Type: A
DNSleadhave.net
Type: A
DNSpointhold.net
Type: A
DNScallhold.net
Type: A
DNSpointsecond.net
Type: A
DNScallsecond.net
Type: A
DNSpointocean.net
Type: A
DNScallocean.net
Type: A
DNSpointhave.net
Type: A
DNScallhave.net
Type: A
DNSnonehold.net
Type: A
DNSliarhold.net
Type: A
DNSnonesecond.net
Type: A
DNSliarsecond.net
Type: A
DNSliarocean.net
Type: A
DNSnonehave.net
Type: A
DNSliarhave.net
Type: A
DNSwellhold.net
Type: A
DNSnosehold.net
Type: A
DNSwellsecond.net
Type: A
DNSnosesecond.net
Type: A
DNSwellocean.net
Type: A
DNSnoseocean.net
Type: A
DNSwellhave.net
Type: A
DNSnosehave.net
Type: A
DNSringhold.net
Type: A
DNSfavorhold.net
Type: A
DNSringsecond.net
Type: A
DNSfavorsecond.net
Type: A
DNSringocean.net
Type: A
DNSfavorocean.net
Type: A
DNSringhave.net
Type: A
DNSfavorhave.net
Type: A
DNSsorrythere.net
Type: A
DNSfiftythere.net
Type: A
DNSsorryarms.net
Type: A
DNSfiftyarms.net
Type: A
DNSsorrystone.net
Type: A
DNSfiftystone.net
Type: A
DNSsorryside.net
Type: A
DNSfiftyside.net
Type: A
DNStheirthere.net
Type: A
DNSlikrthere.net
Type: A
DNStheirarms.net
Type: A
DNSlikrarms.net
Type: A
DNStheirstone.net
Type: A
DNSlikrstone.net
Type: A
DNStheirside.net
Type: A
DNSlikrside.net
Type: A
DNSfearthere.net
Type: A
DNSwestthere.net
Type: A
DNSfeararms.net
Type: A
DNSwestarms.net
Type: A
HTTP GEThttp://mojoguia.com/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://villemojo.com/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://westocean.net/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://noneocean.net/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://fearstone.net/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://mojoguia.com/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://villemojo.com/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://westocean.net/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://noneocean.net/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
HTTP GEThttp://fearstone.net/forum/search.php?method=validate&mode=sox&v=002&sox=2c836802
User-Agent:
Flows TCP192.168.1.1:1037 ➝ 204.11.56.48:80
Flows TCP192.168.1.1:1038 ➝ 141.8.224.183:80
Flows TCP192.168.1.1:1039 ➝ 188.40.39.214:80
Flows TCP192.168.1.1:1040 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1041 ➝ 184.168.221.38:80
Flows TCP192.168.1.1:1042 ➝ 204.11.56.48:80
Flows TCP192.168.1.1:1043 ➝ 141.8.224.183:80
Flows TCP192.168.1.1:1044 ➝ 188.40.39.214:80
Flows TCP192.168.1.1:1045 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1046 ➝ 184.168.221.38:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 6a6f6775 69612e63 6f6d0d0a   : mojoguia.com..
0x00000080 (00128)   0d0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207669 6c6c656d 6f6a6f2e 636f6d0d   : villemojo.com.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207765 73746f63 65616e2e 6e65740d   : westocean.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206e6f 6e656f63 65616e2e 6e65740d   : noneocean.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206665 61727374 6f6e652e 6e65740d   : fearstone.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 6a6f6775 69612e63 6f6d0d0a   : mojoguia.com..
0x00000080 (00128)   0d0a0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207669 6c6c656d 6f6a6f2e 636f6d0d   : villemojo.com.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207765 73746f63 65616e2e 6e65740d   : westocean.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206e6f 6e656f63 65616e2e 6e65740d   : noneocean.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303032 26736f78 3d326338 33363830   =002&sox=2c83680
0x00000040 (00064)   32204854 54502f31 2e300d0a 41636365   2 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206665 61727374 6f6e652e 6e65740d   : fearstone.net.
0x00000080 (00128)   0a0d0a                                ...


Strings