Malware Report - Results

This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection.

Malware Search Criteria:
  • MD5 =4a59b5cfd099f9a7d4c0b8ee76b989ae

  • Malware Report - Results

    File MD5SumSHA1SUMSHA256SUMFUZZY HASHFile Size
    4a59b5cfd099f9a7d4c0b8ee76b989ae8d213a20ec04a39b35cc5286f49d40558be883fe3abd219013f4f6948aec139babebff2bba7ee0e1d485cdf52b72dd51015f2c59384:wCbCEXMMADQIrUeNFwx9E5xtT6fkCMst8AdxIiv4dK8y8KG8szTO4Am7UnwtzwGb:wm1NAUsbxtT23552

    File Results

    File Name
    button.exe

    SNORT Results

    Snort ClassSnort AlertCount
    N/ANo snort alerts generated0

    AV Results

    AV AlertAV Vendor
    N/ASymantec
    Artemis!4A59B5CFD099McAfee
    N/AKaspersky

    Folders (Added) - ICC Results

    PathFolder Name
    c:/WINDOWS/system32/driversets

    Files (Added) - ICC Results

    PathFile Name
    c:/WINDOWS/PrefetchAUTOIT3.EXE-32361418.pf
    c:/WINDOWS/PrefetchCHCP.COM-18156052.pf
    c:/WINDOWS/PrefetchDIEP.EXE-0B3E1DC8.pf
    c:/WINDOWS/PrefetchHSTART.EXE-221D72BF.pf
    c:/WINDOWS/PrefetchREG.EXE-0D2A95F7.pf
    c:/WINDOWS/PrefetchREGSHOT.EXE-010A5EE6.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/SoftwareDistribution/DataStore/Logstmp.edb
    c:/WINDOWS/system32/drivers/etshosts
    c:/WINDOWS/system32/drivers/etslmhosts.sam
    c:/WINDOWS/system32/drivers/etsnetworks
    c:/WINDOWS/system32/drivers/etsprotocol
    c:/WINDOWS/system32/drivers/etsservices
    c:/WINDOWS/system32button.exe

    Files (Deleted) - ICC Results

    ActionPathFile Name

    Files (Changed) - ICC Results

    ActionPathFile Name
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/WINDOWS/PrefetchATTRIB.EXE-39EAFB02.pf
    modifiedc:/WINDOWS/PrefetchCMD.EXE-087B4001.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchNTOSBOOT-B00DFAAD.pf
    modifiedc:/WINDOWS/PrefetchSENDIT.EXE-34C997E3.pf
    modifiedc:/WINDOWS/PrefetchSH.EXE-00254D2B.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/PrefetchWMIPRVSE.EXE-28F301A9.pf
    modifiedc:/WINDOWS/PrefetchWUAUCLT.EXE-399A8E72.pf
    modifiedc:/WINDOWSSchedLgU.Txt
    modifiedc:/WINDOWS/SoftwareDistribution/DataStoreDataStore.edb
    modifiedc:/WINDOWS/SoftwareDistribution/DataStore/Logsedb.chk
    modifiedc:/WINDOWS/SoftwareDistribution/DataStore/Logsedb.log
    modifiedc:/WINDOWS/system32/configsoftware.LOG
    modifiedc:/WINDOWS/system32/wbem/Repository/FSINDEX.MAP
    modifiedc:/WINDOWS/system32/wbem/Repository/FSMAPPING.VER
    modifiedc:/WINDOWS/system32/wbem/Repository/FSMAPPING2.MAP
    modifiedc:/WINDOWS/system32/wbem/Repository/FSOBJECTS.MAP
    modifiedc:/WINDOWSWindowsUpdate.log

    Registry Keys (Added) - ICC Results

    ActionPath
    addedHKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/WindowsUpdate/Reporting/RebootWatch

    Registry Values (Added) - ICC Results

    ActionPathVal_NameVal_Data
    addedHKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Runbutton.exe "C:/WINDOWS/system32/button.exe"
    addedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/ShellNoRoam/MUICacheC://windows//system32//sandnet.exe "sandnet"

    Registry Values (Deleted) - ICC Results

    ActionPathVal_NameVal_TypeMod_Val_TypeVal_DataMod_Val_Data

    Registry Values (Changed) - ICC Results

    ActionPathVal_NameVal_DataMod_Val_Data
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeedEB 36 47 29 BB 32 C1 57 15 8E E3 D3 3E CB 53 5F 20 54 63 40 48 10 54 E8 0D 28 52A6 00 9D 98 27 5D 01 7C B1 7F E8 C5 C3 27 8B FD E0 F7 DE 41 60 90 56 19 65 57 FF
    modifiedHKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENTEventMessageFile"c"C:WINDOWSsystem32ESENT.dll"
    modifiedHKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENTCategoryMessageFile"c"C:WINDOWSsystem32ESENT.dll"
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENTEventMessageFile"c"C:WINDOWSsystem32ESENT.dll"
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENTCategoryMessageFile"c"C:WINDOWSsystem32ESENT.dll"

    DNS Results

    DNSDNS Response

    URL Results

    DstIPHTTP_HOSTHTTP_REQUEST_URIHTTP_USER_AGENTPROTOCOL
    239.255.255.250239.255.255.250:1900*--blank--0x11

    ARGUS PROTOCOL Results

    PROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    17203500

    ARGUS DPORT Results

    DPORTPROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    190017203500

    ARGUS DATA Results

    TimeDateProtocolSrcIPDstIPDirFlagsSportDportPktsBytes
    21:22:342011-10-101710.10.10.7239.255.255.250-> e 367719002350

    Packer Results

    Packer Name

    HoneyTrap Results

    Honey Trap Log File Location

    PTFB Results

    PTFB Log File Location