**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =4e04a86dbf426823bb6d8ec7f00ce267 **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |4e04a86dbf426823bb6d8ec7f00ce267|0edf39bd2de95018aa395f7bcbdc9084d81923d8|88196e89b314c2c784e6260fa5603ded15708b84c2c192399010f0b7a155f6b0|6144:8NEMveY0vfnK1TgjHQyp23Mb/LbsbeE4aNl7x8XFRRYjjEnZAl4PxEMj:AEMvb0vfnK1o/LoCE4|258048___| **** File_Results **** ________________________ |File_Name_______________| |Amor%2DPara%2DTi.swf.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** _____________________________________ |AV_Alert___________________|AV_Vendor| |Trojan.Gen.2_______________|Symantec_| |BackDoor-CEP!zw____________|McAfee___| |Backdoor.Win32.Bifrose.dqrs|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ______________________________________________________________________________ |Path__________________________________________________|File_Name______________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp|~DF9DC7.tmp____________| |c:/WINDOWS/Prefetch___________________________________|AUTOIT3.EXE-32361418.pf| |c:/WINDOWS/Prefetch___________________________________|REGSHOT.EXE-010A5EE6.pf| |c:/WINDOWS/Prefetch___________________________________|SANDNET.EXE-2012C478.pf| |c:/WINDOWS/SoftwareDistribution/DataStore/Logs________|tmp.edb________________| |c:/WINDOWS____________________________________________|updt32.exe_____________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________________ |Action__|Path__________________________________________|File_Name_______________| |modified|c:/WINDOWS/Prefetch___________________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________________|WMIPRVSE.EXE-28F301A9.pf| |modified|c:/WINDOWS/Prefetch___________________________|WUAUCLT.EXE-399A8E72.pf_| |modified|c:/WINDOWS/SoftwareDistribution/DataStore_____|DataStore.edb___________| |modified|c:/WINDOWS/SoftwareDistribution/DataStore/Logs|edb.chk_________________| |modified|c:/WINDOWS/SoftwareDistribution/DataStore/Logs|edb.log_________________| |modified|c:/WINDOWS/system32/config____________________|software.LOG____________| |modified|c:/WINDOWS/system32/drivers/etc_______________|hosts___________________| |modified|c:/WINDOWS____________________________________|WindowsUpdate.log_______| **** Registry_Keys_(Added)_-_ICC_Results **** _________________________________________________________________________________________ |Action|Path______________________________________________________________________________| |added_|HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/WindowsUpdate/Reporting/RebootWatch| **** Registry_Values_(Added)_-_ICC_Results **** ____________________________________________________________________________________________ |Action|Path______________________________________________|Val_Name__|Val_Data_______________| |added_|HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Run|scssrr.exe|"C:/WINDOWS/updt32.exe"| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path_____________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data____________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG_________________________|Seed_______________|BB_1C_3A_B9_35_1F_FA_4A_48_93_E8_BE_8F_7A_A0_65_CA_EF_DC_52_30_DF_A3_1D_DE_2D_4D|0F_30_33_41_C9_18_F4_C9_6F_5F_7F_93_2E_D2_11_F8_35_3A_12_2F_A2_E6_B3_CA_F7_7C_BF| |modified|HKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENT____|EventMessageFile___|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENT____|CategoryMessageFile|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENT|EventMessageFile___|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENT|CategoryMessageFile|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| **** DNS_Results **** _________________________________________________________ |DNS______________|DNS_Response___________________________| |black189.4irc.com|Standard_query_response_A_92.242.140.35| **** URL_Results **** _________________________________________________________ |DstIP|HTTP_HOST|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DATA_Results **** _______________________________________________________________ |Time|Date|Protocol|SrcIP|DstIP|Dir|Flags|Sport|Dport|Pkts|Bytes| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|