Malware Report - Results

This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection.

Malware Search Criteria:
  • MD5 =328417c3fa176bb3e903c428fc2473c2

  • Malware Report - Results

    File MD5SumSHA1SUMSHA256SUMFUZZY HASHFile Size
    328417c3fa176bb3e903c428fc2473c247080cb2c39ecfc61cd2d5121185224d3253cb474665c2ad0896faede89ac5d7817b7cba62d78134a2257210ec31d9956c341e0c12288:qhFB9qb41B+ayzCZJKBmQDz002cAieiIc488Pm7p3oY14EU:AB95ySK532cedm7CY1o449852

    File Results

    File Name
    exrev.exe

    SNORT Results

    Snort ClassSnort AlertCount
    N/ANo snort alerts generated0

    AV Results

    AV AlertAV Vendor
    Trojan.GenSymantec
    Downloader-CEW.bMcAfee
    Trojan-Dropper.Win32.VB.badkKaspersky

    Folders (Added) - ICC Results

    PathFolder Name
    c:/Documents and Settings/dmc73144/Local Settings/Tempnso3.tmp
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE587IMY4XV
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5ITB2CJ0C
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5MILJGV5B
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5WO4JPI86

    Files (Added) - ICC Results

    PathFile Name
    c:/Documents and Settings/dmc73144/Application Data69jyz5.log
    c:/Documents and Settings/dmc73144/Application Datajpposh.exe
    c:/Documents and Settings/dmc73144/Application DataMouseDriver.bat
    c:/Documents and Settings/dmc73144/Local Settings/Temp7.tmp
    c:/Documents and Settings/dmc73144/Local Settings/Temp/nso3.tmp6tbp.exe
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/87IMY4XVdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/87IMY4XVdnnrvriqm[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0CCANI033X.htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Cdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Cnnbrswmqa[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/MILJGV5Bdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/MILJGV5Bhdqhyyz[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/WO4JPI86desktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/WO4JPI86erfjjje[1].htm
    c:/WINDOWS/Prefetch1EUROP.EXE-278BC7C9.pf
    c:/WINDOWS/Prefetch2IC.EXE-22BE55F8.pf
    c:/WINDOWS/Prefetch3E4U - BUCKS.EXE-17B3376A.pf
    c:/WINDOWS/Prefetch6TBP.EXE-3B7A57DA.pf
    c:/WINDOWS/PrefetchEXREV.EXE-0A888083.pf
    c:/WINDOWS/PrefetchGRPCONV.EXE-111CD845.pf
    c:/WINDOWS/PrefetchIR.EXE-311F6C2B.pf
    c:/WINDOWS/PrefetchJPPOSH.EXE-12ADE272.pf
    c:/WINDOWS/PrefetchNET.EXE-01A53C2F.pf
    c:/WINDOWS/PrefetchNET1.EXE-029B9DB4.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-2054EE46.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-253557CF.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-4B4D0C19.pf
    c:/WINDOWS/PrefetchRUNONCE.EXE-2803F297.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/PrefetchSC.EXE-012262AF.pf
    c:/WINDOWS/PrefetchSVCHOST.EXE-3530F672.pf
    c:/WINDOWSadodafawinaqafo.dll
    c:/WINDOWSkbdetacl.dll
    c:netstat_post.txt
    c:tasksvc_post.txt
    c:taskv_post.txt

    Files (Deleted) - ICC Results

    ActionPathFile Name

    Files (Changed) - ICC Results

    ActionPathFile Name
    modifiedc:/Documents and Settings/dmc73144/Cookiesindex.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/History/History.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/Documents and Settings/LocalServicentuser.dat.LOG
    modifiedc:/Program Files/OpenSSH/var/logOpenSSHd.log
    modifiedc:/WINDOWS/PrefetchHSTART.EXE-221D72BF.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/system32/configdefault.LOG
    modifiedc:/WINDOWS/system32/configsoftware.LOG
    modifiedc:/WINDOWS/system32/configSYSTEM
    modifiedc:/WINDOWS/system32/configsystem.LOG
    modifiedc:/WINDOWS/system32/drivers/etchosts
    modifiedc:/WINDOWS/system32/wbem/Logswbemess.log
    modifiedc:/WINDOWS/system32/wbem/Logswmiprov.log

    Registry Keys (Added) - ICC Results

    ActionPath

    Registry Values (Added) - ICC Results

    ActionPathVal_NameVal_Data

    Registry Values (Deleted) - ICC Results

    ActionPathVal_NameVal_TypeMod_Val_TypeVal_DataMod_Val_Data

    Registry Values (Changed) - ICC Results

    ActionPathVal_NameVal_DataMod_Val_Data
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeed57 F1 A4 D1 2B C8 69 79 B3 33 93 45 BA 91 4E BF 7F DA 78 04 31 45 E8 BC 3E 71 53 DE B3 DA 39 6F AC 5F 32 64 60 8B A2 F9 42 0F 49 42 07 8C FD 3C 6D 58 E8 D7 84 3
    modifiedHKLM/SOFTWARE/Microsoft/DirectDraw/MostRecentApplicationName"msoobe.exe" "svchost.exe"
    modifiedHKLM/SOFTWARE/Microsoft/DirectDraw/MostRecentApplicationID0x3B7D853E 0x41107ED6
    modifiedHKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProfileList/S-1-5-19RefCount0x00000002 0x00000001
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccess/EpochEpoch0x00000104 0x00000105
    modifiedHKLM/SYSTEM/ControlSet001/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/EpochEpoch0x00000104 0x00000105
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/3CurrentLevel0x00011000 0x00000000
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/316010x00000001 0x00000000
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/31A100x00000001 0x00000000
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet Settings/ConnectionsSavedLegacySettings3C 00 00 00 15 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 3C 00 00 00 19 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformationProgramCount0x00000002 0x00000001
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/3CurrentLevel0x00011000 0x00000000
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/316010x00000001 0x00000000
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/31A100x00000001 0x00000000

    DNS Results

    DNSDNS Response
    ikea.comStandard query response A 192.71.68.7
    sitesell.comStandard query response A 66.43.48.39
    google.aeStandard query response A 74.125.93.103 A 74.125.93.104 A 74.125.93.105 A 74.125.93.106 A 74.125.93.147 A 74.125.93.99
    aarocket.comStandard query response A 91.217.162.15
    gexque.inStandard query response A 66.197.213.71
    rooftopjam.inStandard query response A 87.255.51.229
    clashjamwallop.inStandard query response A 64.158.56.57 A 63.251.179.57
    211407db0718.skata.netStandard query response A 202.150.208.68
    w.nucleardiscover.comStandard query response A 60.190.223.75

    URL Results

    DstIPHTTP_HOSTHTTP_REQUEST_URIHTTP_USER_AGENTPROTOCOL
    91.217.162.15aarocket.com/ckkuylpycc/nnbrswmqa.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    91.217.162.15aarocket.com/ckkuylpycc/erfjjje.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    66.197.213.71gexque.in/?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHjzfI+RtufQpKX/MPttuu7ulg==Mozilla/5.0 (Windows NT 6.1; wget 3.0; rv:5.0) Gecko/20100101 Firefox/5.00x06
    91.217.162.15aarocket.com/ckkuylpycc/dnnrvriqm.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    91.217.162.15aarocket.com/ckkuylpycc/hdqhyyz.php?adv=adv401&code1=IOLD&code2=3212&id=82799957&p=1&b=1&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    87.255.51.229rooftopjam.in/?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHjzfI+RtufQpKX/MPttuu7ulg==Mozilla/5.0 (Windows NT 6.1; wget 3.0; rv:5.0) Gecko/20100101 Firefox/5.00x06
    64.158.56.57clashjamwallop.in/?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHjzfI+RtufQpKX/MPttuu7ulg==Mozilla/5.0 (Windows NT 6.1; wget 3.0; rv:5.0) Gecko/20100101 Firefox/5.00x06
    239.255.255.250239.255.255.250:1900*--blank--0x11

    ARGUS PROTOCOL Results

    PROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    61161041089615817
    17203500

    ARGUS DPORT Results

    DPORTPROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    8067162717113291
    8886454237252526
    190017203500

    ARGUS DATA Results

    TimeDateProtocolSrcIPDstIPDirFlagsSportDportPktsBytes
    17:23:412011-07-14610.10.10.791.217.162.15-> e 9080101039
    17:23:412011-07-14610.10.10.791.217.162.15-> e 91809981
    17:23:412011-07-14610.10.10.766.197.213.71-> e 50380132413
    17:23:422011-07-14610.10.10.791.217.162.15-> e 417809981
    17:23:432011-07-14610.10.10.791.217.162.15-> e 4188091009
    17:23:472011-07-14610.10.10.766.197.213.71-> e 50380112298
    17:23:522011-07-14610.10.10.766.197.213.71-> e 503805300
    17:23:532011-07-14610.10.10.787.255.51.229-> e 11980132417
    17:23:582011-07-14610.10.10.787.255.51.229-> e 11980112298
    17:24:032011-07-14610.10.10.787.255.51.229-> e 119805300
    17:24:052011-07-14610.10.10.764.158.56.57-> e 34080132421
    17:24:102011-07-14610.10.10.764.158.56.57-> e 34080101965
    17:24:142011-07-14610.10.10.7202.150.208.68-> e 3418091407
    17:24:162011-07-14610.10.10.760.190.223.75-> e 342888131123
    17:24:152011-07-14610.10.10.764.158.56.57-> e 340806633
    17:24:212011-07-14610.10.10.760.190.223.75-> e 34288811660
    17:24:262011-07-14610.10.10.760.190.223.75-> e 3428885300
    17:25:292011-07-14610.10.10.760.190.223.75-> e 590888131124
    17:25:342011-07-14610.10.10.760.190.223.75-> e 59088810600
    17:25:392011-07-14610.10.10.760.190.223.75-> e 5908886360
    17:26:412011-07-14610.10.10.760.190.223.75-> e 702888141184
    17:26:462011-07-14610.10.10.760.190.223.75-> e 70288810600
    17:26:512011-07-14610.10.10.760.190.223.75-> e 7028885300
    17:29:052011-07-141710.10.10.7239.255.255.250-> e 819002350

    Packer Results

    Packer Name

    HoneyTrap Results

    Honey Trap Log File Location

    PTFB Results

    PTFB Log File Location