**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =17699c04288f78f4fc6eb4879c2e20ee **** Malware_Report_-_Results **** ____________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH_____________________________________________________|File_Size| |17699c04288f78f4fc6eb4879c2e20ee|9d4036e2e9661a21cb33701832fc94a4d2aa25a6|cbe5d2c2d588b7da4462220e49ed7fc268642e57f89095d750cbbcb21ada93cb|3072:d8U2yJN5f661xRZbALxB1Ojdgx8GYC8iJk1B:d8U2qy6rRZb7jxGYC5JmB|104804___| **** File_Results **** _________ |File_Name| |6h.exe___| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ____________________________ |AV_Alert__________|AV_Vendor| |N/A_______________|Symantec_| |Generic___________|McAfee___| |Trojan.RAR.Qhost.c|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ___________________________________________ |Path_______________|File_Name______________| |c:/WINDOWS/Prefetch|AUTOIT3.EXE-32361418.pf| |c:/WINDOWS/Prefetch|DIEP.EXE-0B3E1DC8.pf___| |c:/WINDOWS/Prefetch|HSTART.EXE-221D72BF.pf_| |c:/WINDOWS/Prefetch|REGSHOT.EXE-010A5EE6.pf| |c:/WINDOWS/Prefetch|SANDNET.EXE-2012C478.pf| |c:_________________|netstat_post.txt_______| |c:_________________|tasksvc_post.txt_______| |c:_________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________________ |Action__|Path__________________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144____________|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________________|NTOSBOOT-B00DFAAD.pf____| |modified|c:/WINDOWS/Prefetch___________________________|SCP.EXE-174845DC.pf_____| |modified|c:/WINDOWS/Prefetch___________________________|SENDIT.EXE-34C997E3.pf__| |modified|c:/WINDOWS/Prefetch___________________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/Prefetch___________________________|WMIPRVSE.EXE-28F301A9.pf| |modified|c:/WINDOWS/Prefetch___________________________|WUAUCLT.EXE-399A8E72.pf_| |modified|c:/WINDOWS____________________________________|SchedLgU.Txt____________| |modified|c:/WINDOWS/SoftwareDistribution/DataStore/Logs|edb.chk_________________| |modified|c:/WINDOWS/system32/drivers/etc_______________|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________|INDEX.MAP_______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________|MAPPING.VER_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________|MAPPING2.MAP____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________|OBJECTS.MAP_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ___________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________|Val_Name|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG|Seed____|3B_F1_63_E2_1F_37_F3_67_25_B4_25_34_63_A9_AF_E9_74_7F_5F_D6_E8_5A_FE_C7_F0_F9_CB|21_31_FA_D6_B1_59_A6_39_0F_25_66_1F_9F_ED_38_98_15_E3_55_70_95_0A_58_DE_AB_25_7| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** ______________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |17______|2_______|0_______|350______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |1900_|17______|2_______|0_______|350______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |02:35:00|2011-04-29|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|2___|350__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|