**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =19b1d3045ed2c6691c3a0c5b78654090 **** Malware_Report_-_Results **** ____________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH_____________________________________________________|File_Size| |19b1d3045ed2c6691c3a0c5b78654090|fd946a65c810fea75c80515dab5ee98fe7dcd0d6|58cc6c9fd0aecb10a9c3984a895e24b6024701f6e8bf46554edaa5be80618f04|1536:L1qzHQYmhokHnW6LC+mFSPYOEGwEFQEJ49TDx:eVmukHW09sSPY4V54xDx|70656____| **** File_Results **** _________________ |File_Name________| |DSC000095.scr.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ___________________________________ |AV_Alert_________________|AV_Vendor| |N/A______________________|Symantec_| |N/A______________________|McAfee___| |HEUR:Trojan.Win32.Generic|Kaspersky| |WinDefragFrau____________|Symantec_| |Generic__________________|McAfee___| |N/A______________________|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ________________________________________________________ |Path___________________________|File_Name_______________| |c:/WINDOWS/Prefetch____________|EXPLORER.EXE-082F38A9.pf| |c:/WINDOWS/Prefetch____________|SANDNET.EXE-2012C478.pf_| |c:/WINDOWS/system32/drivers/etc|hîsts__________________| |c:_____________________________|netstat_post.txt________| |c:_____________________________|tasksvc_post.txt________| |c:_____________________________|taskv_post.txt__________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________ |Action__|Path__________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144____|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP_______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path______________________________________________________________________________________________________________________________________________________________________________________|Val_Name____|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG__________________________________________________________________________________________________________________________________________________|Seed________|DF_3D_D9_00_84_7F_14_CF_E6_BF_68_CB_9A_80_41_AC_B8_EA_DB_5B_E5_1D_6E_E8_5F_97_65|97_CD_8E_80_E7_B4_21_65_3F_30_06_26_48_34_B3_A1_42_4B_C5_55_C8_52_11_68_47_B7_6| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/Discardable/PostSetup/Component_Categories/{00021493-0000-0000-C000-000000000046}/Enum|Implementing|1C_00_00_00_01_00_00_00_DB_07_05_00_05_00_0D_00_10_00_15_00_1B_00_48_01_06_00_00|1C_00_00_00_01_00_00_00_DB_07_05_00_05_00_0D_00_0C_00_17_00_0C_00_B9_03_06_00_0| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/Discardable/PostSetup/Component_Categories/{00021494-0000-0000-C000-000000000046}/Enum|Implementing|1C_00_00_00_01_00_00_00_DB_07_05_00_05_00_0D_00_10_00_15_00_1B_00_8A_03_01_00_00|1C_00_00_00_01_00_00_00_DB_07_05_00_05_00_0D_00_0C_00_17_00_0D_00_80_02_01_00_0| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d12e-6183-11de-9bd7-806d6172696f}________________________|Generation__|0x00000001______________________________________________________________________|0x00000002_____________________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d12f-6183-11de-9bd7-806d6172696f}________________________|Generation__|0x00000001______________________________________________________________________|0x00000002_____________________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d131-6183-11de-9bd7-806d6172696f}________________________|Generation__|0x00000001______________________________________________________________________|0x00000002_____________________________________________________________________| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** ______________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |17______|1_______|0_______|175______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |1900_|17______|1_______|0_______|175______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |12:28:42|2011-05-13|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|1___|175__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|