**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =1ddf00dcc6828378acab1a31fb31a2ea **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |1ddf00dcc6828378acab1a31fb31a2ea|b88a8f8393829346dd28429852db78f150dcccba|607f109c9809ae9b16aad3a7cf6181f36b312b1769a9bf1fe107f346be841534|768:5ZLJfaE5A6CO3O1pJiX9iMDwTWGTOcP26PeJLCAnAMiyH39Y3wYo3cfWGwKYf0oe:/JfkE3spGnn|70867____| **** File_Results **** ______________________________________ |File_Name_____________________________| |statistics.php.exe____________________| |l.php.exe_____________________________| |kozqox.php%3Fspl%3Dmdac%26fh%3B%3D.exe| |installer.0042.exe____________________| |index.php%3FID%3D105636.exe___________| |flash%5Fplayer.exe____________________| |fdsafdsa.dixiachen.net.exe____________| |exe.exe_______________________________| |%3Fc%3D11.exe_________________________| **** SNORT_Results **** ____________________________________________________________________ |Snort_Class|Snort_Alert_______________________________________|Count| |Misc_Attack|ET_RBN_Known_Russian_Business_Network_IP_TCP_(284)|2____| **** AV_Results **** ________________________ |AV_Alert______|AV_Vendor| |N/A___________|Symantec_| |Downloader-CKA|McAfee___| |N/A___________|Kaspersky| |Trojan________|Symantec_| **** Folders_(Added)_-_ICC_Results **** ___________________________________________________________________________________________ |Path__________________________________________________|Folder_Name_________________________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp|ebeb7feb-e5e8-43ce-99e5-0b5a670047b1| **** Files_(Added)_-_ICC_Results **** _______________________________________________________________________________________________________________________________________ |Path_______________________________________________________________________________________|File_Name__________________________________| |c:/Documents_and_Settings/dmc73144/Application_Data________________________________________|8fbc0ebc-15d7-4dae-818a-50f3473ae912_46.avi| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp/ebeb7feb-e5e8-43ce-99e5-0b5a670047b1|wrk1.tmp_46________________________________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp/ebeb7feb-e5e8-43ce-99e5-0b5a670047b1|wrk2.tmp___________________________________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp/ebeb7feb-e5e8-43ce-99e5-0b5a670047b1|wrk2.tmp_46________________________________| |c:/WINDOWS/Prefetch________________________________________________________________________|RUNDLL32.EXE-1ED7D88D.pf___________________| |c:/WINDOWS/Prefetch________________________________________________________________________|RUNDLL32.EXE-225A71B3.pf___________________| |c:/WINDOWS/Prefetch________________________________________________________________________|SANDNET.EXE-2012C478.pf____________________| |c:_________________________________________________________________________________________|netstat_post.txt___________________________| |c:_________________________________________________________________________________________|taskv_post.txt_____________________________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** _______________________________________________________________________________________________________________________ |Action__|Path__________________________________________________________________________________|File_Name______________| |modified|c:/Documents_and_Settings/dmc73144/Cookies____________________________________________|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5_________________|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144____________________________________________________|ntuser.dat.LOG_________| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|CMD.EXE-087B4001.pf____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|HSTART.EXE-221D72BF.pf_| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|NETSTAT.EXE-2B2B4428.pf| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SH.EXE-00254D2B.pf_____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SLEEP.EXE-094A3D2A.pf__| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SSHD.EXE-298CA236.pf___| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SWITCH.EXE-0496EC21.pf_| |modified|c:/WINDOWS/system32/drivers/etc_______________________________________________________|hosts__________________| |modified|c:/WINDOWS/system32/wbem/Logs_________________________________________________________|wmiprov.log____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|INDEX.MAP______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|MAPPING.VER____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|MAPPING2.MAP___________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|OBJECTS.MAP____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________________________________________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG________________________________________________________________________________|Seed_______________|74_C5_06_5B_38_84_25_5B_F5_91_B2_23_EF_F5_29_A8_98_66_A6_9F_96_76_74_D3_1B_AE_77|85_CC_24_DF_2D_2A_72_99_F7_B2_C9_8B_AC_91_BE_F0_D2_6A_EC_0F_DD_CA_EE_D0_10_40_7| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet_Settings/Connections|SavedLegacySettings|3C_00_00_00_15_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_00|3C_00_00_00_16_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_0| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformation_____________________________________________________|ProgramCount_______|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** __________________________________________________________________________________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI____________________________________________________________________|HTTP_USER_AGENT|PROTOCOL| |91.188.60.5____|91.188.60.5_________|/hit.php?v=46&app_type_id=1&wm_id=acc0042&u=ebeb7feb-e5e8-43ce-99e5-0b5a670047b1&t=2|_______________|0x06____| |91.188.60.5____|91.188.60.5_________|/hit.php?v=46&app_type_id=1&wm_id=acc0042&u=ebeb7feb-e5e8-43ce-99e5-0b5a670047b1&t=5|_______________|0x06____| |91.188.60.5____|91.188.60.5_________|/t.php?app_type_id=1&wm_id=acc0042&u=ebeb7feb-e5e8-43ce-99e5-0b5a670047b1&v=46______|_______________|0x06____| |239.255.255.250|239.255.255.250:1900|*___________________________________________________________________________________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|15______|12______|1317_____|1545_____| |17______|5_______|0_______|875______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |80___|6_______|15______|12______|1317_____|1545_____| |1900_|17______|5_______|0_______|875______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |10:36:26|2010-07-29|6_______|10.10.10.7|91.188.60.5____|->_|e____|160__|80___|9___|956__| |10:37:26|2010-07-29|6_______|10.10.10.7|91.188.60.5____|->_|e____|260__|80___|9___|956__| |10:39:54|2010-07-29|17______|10.10.10.7|239.255.255.250|->_|e____|4002_|1900_|2___|350__| |10:40:00|2010-07-29|17______|10.10.10.7|239.255.255.250|->_|e____|4002_|1900_|1___|175__| |10:40:03|2010-07-29|17______|10.10.10.7|239.255.255.250|->_|e____|413__|1900_|2___|350__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|