**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =53bd5e27267a06f6bf4b0ead73992634 **** Malware_Report_-_Results **** ___________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH____________________________________________|File_Size| |53bd5e27267a06f6bf4b0ead73992634|57839b1d143ee9bb30cb3dae33a5d924abdf1109|31574f094ac3a2e541062924fb6efa8e8538845652d95e6fcf5fc48d34509927|1536:bmyMgsJiP6LbrjJKipyo1UhjhELKW3DLc0Z:XsuGPxgoWkKOX|62464____| **** File_Results **** _________ |File_Name| |kp.exe___| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** __________________ |AV_Alert|AV_Vendor| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ____________________________________________________________________________ |Path_______________________________________________|File_Name_______________| |c:/Documents_and_Settings/dmc73144/Application_Data|ljpbc.log_______________| |c:/Documents_and_Settings/dmc73144/Application_Data|MouseDriver.bat_________| |c:/Documents_and_Settings/dmc73144/Application_Data|piwpjszon.bat___________| |c:/Documents_and_Settings/dmc73144/Application_Data|t1tvgqb.exe_____________| |c:/WINDOWS/Prefetch________________________________|GRPCONV.EXE-111CD845.pf_| |c:/WINDOWS/Prefetch________________________________|NET.EXE-01A53C2F.pf_____| |c:/WINDOWS/Prefetch________________________________|NET1.EXE-029B9DB4.pf____| |c:/WINDOWS/Prefetch________________________________|RUNDLL32.EXE-253557CF.pf| |c:/WINDOWS/Prefetch________________________________|RUNONCE.EXE-2803F297.pf_| |c:/WINDOWS/Prefetch________________________________|SANDNET.EXE-2012C478.pf_| |c:/WINDOWS/Prefetch________________________________|SC.EXE-012262AF.pf______| |c:/WINDOWS/Prefetch________________________________|T1TVGQB.EXE-2AD0BCA2.pf_| |c:_________________________________________________|netstat_post.txt________| |c:_________________________________________________|tasksvc_post.txt________| |c:_________________________________________________|taskv_post.txt__________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________________________________________________________ |Action__|Path__________________________________________________________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144/Cookies____________________________________________|index.dat_______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5_________________|index.dat_______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|index.dat_______________| |modified|c:/Documents_and_Settings/dmc73144____________________________________________________|ntuser.dat.LOG__________| |modified|c:/Documents_and_Settings/LocalService________________________________________________|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/system32/config____________________________________________________________|software.LOG____________| |modified|c:/WINDOWS/system32/config____________________________________________________________|system.LOG______________| |modified|c:/WINDOWS/system32/drivers/etc_______________________________________________________|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Logs_________________________________________________________|wbemess.log_____________| |modified|c:/WINDOWS/system32/wbem/Logs_________________________________________________________|wmiprov.log_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________________________________________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG________________________________________________________________________________|Seed_______________|C0_8D_FF_67_4F_67_6C_12_46_9D_20_D0_B7_21_D2_D6_F0_15_33_EC_70_82_0C_8E_51_B6_46|9E_B4_7A_1F_1B_99_34_06_5A_E5_62_F4_17_36_F0_7B_30_6D_1D_C2_89_A7_09_D1_E2_AB_F| |modified|HKLM/SOFTWARE/Microsoft/Windows_NT/CurrentVersion/ProfileList/S-1-5-19__________________________________________________|RefCount___________|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENT___________________________________________________________|EventMessageFile___|c:windowssystem32ESENT.dll______________________________________________________|"C_____________________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENT___________________________________________________________|CategoryMessageFile|c:windowssystem32ESENT.dll______________________________________________________|"C_____________________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/SharedAccess_________________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/SharedAccess/Epoch___________________________________________________________________|Epoch______________|0x00000104______________________________________________________________________|0x00000105_____________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/wscsvc_______________________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENT_______________________________________________________|EventMessageFile___|c:windowssystem32ESENT.dll______________________________________________________|"C_____________________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENT_______________________________________________________|CategoryMessageFile|c:windowssystem32ESENT.dll______________________________________________________|"C_____________________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/SharedAccess_____________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/Epoch_______________________________________________________________|Epoch______________|0x00000104______________________________________________________________________|0x00000105_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/wscsvc___________________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet_Settings/Connections|SavedLegacySettings|3C_00_00_00_15_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_00|3C_00_00_00_17_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_0| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformation_____________________________________________________|ProgramCount_______|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| **** DNS_Results **** _____________________________________________________________ |DNS__________________|DNS_Response___________________________| |w.nucleardiscover.com|Standard_query_response_A_60.190.223.75| **** URL_Results **** ______________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|60______|56______|4872_____|3368_____| |17______|2_______|0_______|350______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |888__|6_______|60______|56______|4872_____|3368_____| |1900_|17______|2_______|0_______|350______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |11:14:55|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|412__|888__|13__|1100_| |11:15:00|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|412__|888__|10__|600__| |11:15:05|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|412__|888__|6___|360__| |11:16:08|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|129__|888__|13__|1100_| |11:16:13|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|129__|888__|11__|660__| |11:16:18|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|129__|888__|5___|300__| |11:17:21|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|23___|888__|14__|1160_| |11:17:26|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|23___|888__|11__|660__| |11:17:32|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|23___|888__|4___|240__| |11:18:33|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|817__|888__|13__|1100_| |11:18:38|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|817__|888__|10__|600__| |11:18:43|2011-06-26|6_______|10.10.10.7|60.190.223.75__|->_|e____|817__|888__|6___|360__| |11:20:23|2011-06-26|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|2___|350__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|