Analysis Date2015-07-30 13:05:30
MD5975df8bc5630bd9a0f34ab782503a544
SHA1f61edd12e92287befaf9d8720e2eef68f5724087

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: d60b7e283869353c42254fc2a1d86a2a sha1: 4717b2222e48490a9390b5244b5b8329b489b26f size: 155136
Section.rdata md5: 181e66c29bf39d57ba17e524204b1051 sha1: 6b428759a42eca22fd2fa38f43676d572fd27112 size: 38400
Section.data md5: 0b5b49fa4d319626c72af6eb97f435df sha1: de46bb150edf8909f24a3ca4da0e52c1b8f31b08 size: 7168
Timestamp2015-03-13 09:11:43
PackerMicrosoft Visual C++ ?.?
PEhash925c3cae40a36486f9b0832e476a971d41b9bcb2
IMPhashe921a65fc9b7860831fbf9ef211d9384
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVFrisk (f-prot)no_virus
AVBullGuardGen:Variant.Rodecap.1
AVFortinetW32/Rodecap.BJ!tr
AVMalwareBytesTrojan.Agent
AVIkarusTrojan.Win32.Rodecap
AVVirusBlokAda (vba32)Trojan.Scar
AVTrend Microno_virus
AVAd-AwareGen:Variant.Rodecap.1
AVSymantecDownloader.Upatre!g15
AVMcafeeTrojan-FEVX!975DF8BC5630
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Rodecap.BJ
AVDr. WebTrojan.DownLoader13.13228
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVPadvishno_virus
AVF-SecureGen:Variant.Rodecap.1
AVZillya!Trojan.Scar.Win32.88823
AVTwisterTrojan.Scar.iyes.fkks
AVEmsisoftGen:Variant.Rodecap.1
AVAlwil (avast)Kryptik-PDK [Trj]
AVBitDefenderGen:Variant.Rodecap.1
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVAvira (antivir)TR/Spy.ZBot.xbbeoiq
AVClamAVno_virus
AVRisingno_virus
AVK7no_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.Y
AVCAT (quickheal)no_virus
AVCA (E-Trust Ino)no_virus
AVKasperskyTrojan.Win32.Generic

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\woqtczpph\grtsd1lxxrfuhfnntw.exe
Creates FileC:\woqtczpph\q5zorpck
Creates FileC:\WINDOWS\woqtczpph\q5zorpck
Deletes FileC:\WINDOWS\woqtczpph\q5zorpck
Creates ProcessC:\woqtczpph\grtsd1lxxrfuhfnntw.exe

Process
↳ C:\woqtczpph\grtsd1lxxrfuhfnntw.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Level Network Panel Secure Diagnostic Application ➝
C:\woqtczpph\iokahnemqz.exe
Creates FileC:\woqtczpph\iokahnemqz.exe
Creates FileC:\woqtczpph\evkdpf1yv
Creates FileC:\woqtczpph\q5zorpck
Creates FileC:\WINDOWS\woqtczpph\q5zorpck
Deletes FileC:\WINDOWS\woqtczpph\q5zorpck
Creates ProcessC:\woqtczpph\iokahnemqz.exe
Creates ServiceProcedure Profile Color Protocol - C:\woqtczpph\iokahnemqz.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1112

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1872

Process
↳ Pid 1180

Process
↳ C:\woqtczpph\iokahnemqz.exe

Creates FileC:\woqtczpph\wovftpemkdn
Creates Filepipe\net\NtControlPipe10
Creates FileC:\woqtczpph\ancbbvfgumw.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\woqtczpph\evkdpf1yv
Creates FileC:\woqtczpph\q5zorpck
Creates FileC:\WINDOWS\woqtczpph\q5zorpck
Deletes FileC:\WINDOWS\woqtczpph\q5zorpck
Creates Processcfnq28bhh9xf "c:\woqtczpph\iokahnemqz.exe"

Process
↳ C:\woqtczpph\iokahnemqz.exe

Creates FileC:\woqtczpph\q5zorpck
Creates FileC:\WINDOWS\woqtczpph\q5zorpck
Deletes FileC:\WINDOWS\woqtczpph\q5zorpck

Process
↳ cfnq28bhh9xf "c:\woqtczpph\iokahnemqz.exe"

Creates FileC:\woqtczpph\q5zorpck
Creates FileC:\WINDOWS\woqtczpph\q5zorpck
Deletes FileC:\WINDOWS\woqtczpph\q5zorpck

Network Details:

DNSpartyready.net
Type: A
8.5.1.51
DNSpartypeople.net
Type: A
217.138.13.211
DNSalreadycondition.net
Type: A
95.211.230.75
DNScrowdnation.net
Type: A
107.161.23.204
DNScrowdnation.net
Type: A
107.191.99.114
DNScrowdnation.net
Type: A
142.4.203.239
DNSwaterplease.net
Type: A
182.162.94.49
DNSwatercondition.net
Type: A
204.11.56.25
DNSwomannation.net
Type: A
50.63.202.46
DNSsmokecondition.net
Type: A
208.91.197.241
DNSpartynation.net
Type: A
72.52.4.91
DNSpartyplease.net
Type: A
209.157.71.176
DNSfreshpower.net
Type: A
195.149.84.101
DNSfreshpower.net
Type: A
195.149.84.100
DNSsmokepeople.net
Type: A
DNSwomandaughter.net
Type: A
DNSsmokedaughter.net
Type: A
DNSfightready.net
Type: A
DNSpartybrown.net
Type: A
DNSfightbrown.net
Type: A
DNSfightpeople.net
Type: A
DNSpartydaughter.net
Type: A
DNSfightdaughter.net
Type: A
DNSfreshnation.net
Type: A
DNSexperiencenation.net
Type: A
DNSfreshsoldier.net
Type: A
DNSexperiencesoldier.net
Type: A
DNSfreshplease.net
Type: A
DNSexperienceplease.net
Type: A
DNSfreshcondition.net
Type: A
DNSexperiencecondition.net
Type: A
DNSgentlemannation.net
Type: A
DNSalreadynation.net
Type: A
DNSgentlemansoldier.net
Type: A
DNSalreadysoldier.net
Type: A
DNSgentlemanplease.net
Type: A
DNSalreadyplease.net
Type: A
DNSgentlemancondition.net
Type: A
DNSfollownation.net
Type: A
DNSmembernation.net
Type: A
DNSfollowsoldier.net
Type: A
DNSmembersoldier.net
Type: A
DNSfollowplease.net
Type: A
DNSmemberplease.net
Type: A
DNSfollowcondition.net
Type: A
DNSmembercondition.net
Type: A
DNSbeginnation.net
Type: A
DNSknownnation.net
Type: A
DNSbeginsoldier.net
Type: A
DNSknownsoldier.net
Type: A
DNSbeginplease.net
Type: A
DNSknownplease.net
Type: A
DNSbegincondition.net
Type: A
DNSknowncondition.net
Type: A
DNSsummernation.net
Type: A
DNSsummersoldier.net
Type: A
DNScrowdsoldier.net
Type: A
DNSsummerplease.net
Type: A
DNScrowdplease.net
Type: A
DNSsummercondition.net
Type: A
DNScrowdcondition.net
Type: A
DNSthoughtnation.net
Type: A
DNSwaternation.net
Type: A
DNSthoughtsoldier.net
Type: A
DNSwatersoldier.net
Type: A
DNSthoughtplease.net
Type: A
DNSthoughtcondition.net
Type: A
DNSsmokenation.net
Type: A
DNSwomansoldier.net
Type: A
DNSsmokesoldier.net
Type: A
DNSwomanplease.net
Type: A
DNSsmokeplease.net
Type: A
DNSwomancondition.net
Type: A
DNSfightnation.net
Type: A
DNSpartysoldier.net
Type: A
DNSfightsoldier.net
Type: A
DNSfightplease.net
Type: A
DNSpartycondition.net
Type: A
DNSfightcondition.net
Type: A
DNSfreshcentury.net
Type: A
DNSexperiencecentury.net
Type: A
DNSfreshfamous.net
Type: A
DNSexperiencefamous.net
Type: A
DNSexperiencepower.net
Type: A
DNSfreshcountry.net
Type: A
DNSexperiencecountry.net
Type: A
DNSgentlemancentury.net
Type: A
DNSalreadycentury.net
Type: A
HTTP GEThttp://partyready.net/index.php?method&len
User-Agent:
HTTP GEThttp://partypeople.net/index.php?method&len
User-Agent:
HTTP GEThttp://alreadycondition.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdnation.net/index.php?method&len
User-Agent:
HTTP GEThttp://waterplease.net/index.php?method&len
User-Agent:
HTTP GEThttp://watercondition.net/index.php?method&len
User-Agent:
HTTP GEThttp://womannation.net/index.php?method&len
User-Agent:
HTTP GEThttp://smokecondition.net/index.php?method&len
User-Agent:
HTTP GEThttp://partynation.net/index.php?method&len
User-Agent:
HTTP GEThttp://partyplease.net/index.php?method&len
User-Agent:
HTTP GEThttp://freshpower.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 8.5.1.51:80
Flows TCP192.168.1.1:1032 ➝ 217.138.13.211:80
Flows TCP192.168.1.1:1033 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1034 ➝ 107.161.23.204:80
Flows TCP192.168.1.1:1035 ➝ 182.162.94.49:80
Flows TCP192.168.1.1:1036 ➝ 204.11.56.25:80
Flows TCP192.168.1.1:1037 ➝ 50.63.202.46:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 72.52.4.91:80
Flows TCP192.168.1.1:1040 ➝ 209.157.71.176:80
Flows TCP192.168.1.1:1041 ➝ 195.149.84.101:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747972   se..Host: partyr
0x00000050 (00080)   65616479 2e6e6574 0d0a0d0a            eady.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747970   se..Host: partyp
0x00000050 (00080)   656f706c 652e6e65 740d0a0d 0a         eople.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20616c 72656164   se..Host: alread
0x00000050 (00080)   79636f6e 64697469 6f6e2e6e 65740d0a   ycondition.net..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f77646e   se..Host: crowdn
0x00000050 (00080)   6174696f 6e2e6e65 740d0a0d 0a740d0a   ation.net....t..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657270   se..Host: waterp
0x00000050 (00080)   6c656173 652e6e65 740d0a0d 0a740d0a   lease.net....t..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657263   se..Host: waterc
0x00000050 (00080)   6f6e6469 74696f6e 2e6e6574 0d0a0d0a   ondition.net....
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20776f 6d616e6e   se..Host: womann
0x00000050 (00080)   6174696f 6e2e6e65 740d0a0d 0a0a0d0a   ation.net.......
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20736d 6f6b6563   se..Host: smokec
0x00000050 (00080)   6f6e6469 74696f6e 2e6e6574 0d0a0d0a   ondition.net....
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 7274796e   se..Host: partyn
0x00000050 (00080)   6174696f 6e2e6e65 740d0a0d 0a0a0d0a   ation.net.......
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747970   se..Host: partyp
0x00000050 (00080)   6c656173 652e6e65 740d0a0d 0a0a0d0a   lease.net.......
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206672 65736870   se..Host: freshp
0x00000050 (00080)   6f776572 2e6e6574 0d0a0d0a            ower.net....


Strings