**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =19537d4e3bfc329b97f9562e75a74976 **** Malware_Report_-_Results **** ____________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH_____________________________________________________________|File_Size| |19537d4e3bfc329b97f9562e75a74976|b0ac4fa964c7ef636ffb5dbbfbd51d6c2cb7f505|771b57c47837faa41fefcb3739f77453651b169e555dfb28fb968898c6d25f78|384:NXzE3O3MsyyJu0UPP55eubEzAlDkQE51Nh2sEcfKAP:VzE3O3G0Un55eubK0kQe1Njt|18432____| **** File_Results **** __________ |File_Name_| |update.exe| **** SNORT_Results **** _____________________________ |Snort_Class|Snort_Alert|Count| **** AV_Results **** ___________________________________ |AV_Alert_________________|AV_Vendor| |W32.IRCBot.Gen___________|Symantec_| |Artemis!19537D4E3BFC_____|McAfee___| |HEUR:Trojan.Win32.Invader|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ______________________________________________________________________________ |Path_______________________________________________|File_Name_________________| |c:/Documents_and_Settings/dmc73144/Application_Data|sjh4fgl24_M3[J6-3]nk-w.tmp| |c:/Program_Files___________________________________|M3[J6-3]nk-w.dat__________| |c:/Program_Files___________________________________|winlogon.exe______________| |c:/WINDOWS/Prefetch________________________________|SANDNET.EXE-2012C478.pf___| |c:/WINDOWS/Prefetch________________________________|WINLOGON.EXE-008FCD73.pf__| |c:/WINDOWS_________________________________________|ctfmon.exe________________| |c:_________________________________________________|netstat_post.txt__________| |c:_________________________________________________|taskv_post.txt____________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** _______________________________________________________________________ |Action__|Path__________________________________|File_Name______________| |modified|c:/Documents_and_Settings/dmc73144____|ntuser.dat.LOG_________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf_| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf_____| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf__| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf___| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf_| |modified|c:/WINDOWS/system32/config____________|software.LOG___________| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts__________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP___________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path_______________________________________________________________|Val_Name____|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG___________________________|Seed________|4D_04_9C_6D_E7_64_9F_BB_E2_C9_C0_8B_85_04_6D_1B_3C_02_AC_D9_E2_0B_4D_BA_9E_42_03|70_0B_4F_A5_22_27_2F_8B_2A_1C_0A_C1_51_1A_04_78_ED_01_5F_8E_36_15_25_AE_88_AE_D| |modified|HKLM/SYSTEM/ControlSet001/Services/SharedAccess/Epoch______________|Epoch_______|0x00000104______________________________________________________________________|0x00000105_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/Epoch__________|Epoch_______|0x00000104______________________________________________________________________|0x00000105_____________________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformation|ProgramCount|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** _________________________________________________________ |DstIP|HTTP_HOST|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DATA_Results **** _______________________________________________________________ |Time|Date|Protocol|SrcIP|DstIP|Dir|Flags|Sport|Dport|Pkts|Bytes| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|