**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =7dd64036aef1eb5e60dcf08084dd18b1 **** Malware_Report_-_Results **** ____________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH_____________________________________________________________|File_Size| |7dd64036aef1eb5e60dcf08084dd18b1|1be844405d85d3d40f171b5d053cd0f072060045|b59a33e6905a0cd546680052e8a97a488b78d9fa32b9b59d80b3a2a1ca00b7a2|768:5mOhplcsHvKWzX6HJmFqda7ko+vnbcuyD7UX1VjMjf2:gOhplcsHv1X6n0Enouy8PY+|37888____| **** File_Results **** ____________ |File_Name___| |44683912.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ______________________________ |AV_Alert____________|AV_Vendor| |N/A_________________|Symantec_| |Artemis!7DD64036AEF1|McAfee___| |Trojan.BAT.Qhost.nj_|Kaspersky| **** Folders_(Added)_-_ICC_Results **** _______________________________________________________________________________________________________________ |Path__________________________________________________________________________________|Folder_Name_____________| |c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5_________________|MSHist012011081720110818| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|ITB2CJ0C________________| **** Files_(Added)_-_ICC_Results **** ________________________________________________________________________________________________________________________ |Path___________________________________________________________________________________________|File_Name_______________| |c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5/MSHist012011081720110818_|index.dat_______________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5/ITB2CJ0C|1[1].htm________________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5/ITB2CJ0C|desktop.ini_____________| |c:/WINDOWS/Prefetch____________________________________________________________________________|IEXPLORE.EXE-27122324.pf| |c:/WINDOWS/Prefetch____________________________________________________________________________|PING.EXE-31216D26.pf____| |c:/WINDOWS/Prefetch____________________________________________________________________________|SANDNET.EXE-2012C478.pf_| |c:/WINDOWS/Prefetch____________________________________________________________________________|TASKKILL.EXE-0A8306E3.pf| |c:_____________________________________________________________________________________________|netstat_post.txt________| |c:_____________________________________________________________________________________________|taskv_post.txt__________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** _______________________________________________________________________________________________________________________ |Action__|Path__________________________________________________________________________________|File_Name______________| |modified|c:/Documents_and_Settings/dmc73144/Cookies____________________________________________|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5_________________|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144____________________________________________________|ntuser.dat.LOG_________| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|CMD.EXE-087B4001.pf____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|HSTART.EXE-221D72BF.pf_| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|NETSTAT.EXE-2B2B4428.pf| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SH.EXE-00254D2B.pf_____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SLEEP.EXE-094A3D2A.pf__| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SSHD.EXE-298CA236.pf___| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SWITCH.EXE-0496EC21.pf_| |modified|c:/WINDOWS/system32/drivers/etc_______________________________________________________|hosts__________________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|INDEX.MAP______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|MAPPING.VER____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|MAPPING2.MAP___________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|OBJECTS.MAP____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path_______________________________________________________________________________________________________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG___________________________________________________________________________________________________________________|Seed_______________|ED_64_14_17_B6_55_67_20_E6_D1_91_29_11_AA_C4_91_09_1D_1B_02_4A_D0_6D_14_6A_4A_F9|DE_83_C2_EF_1E_55_8F_FE_D0_4D_DA_93_36_22_59_9D_E4_68_65_11_D0_AC_20_76_74_5C_E| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/UserAssist/{5E6AB780-7743-11CF-A12B-00AA004AE837}/Count|HRZR_PGYFRFFVBA____|89_C3_53_0E_0D_00_00_00_________________________________________________________|FF_E6_62_0E_0E_00_00_00________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Ext/Stats/{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}/iexplore_______|Count______________|0x00000007______________________________________________________________________|0x00000008_____________________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Ext/Stats/{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}/iexplore_______|Time_______________|D9_07_0C_00_03_00_09_00_03_00_0C_00_36_00_51_02_________________________________|DB_07_08_00_03_00_11_00_0D_00_11_00_0E_00_94_03________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet_Settings/Connections___________________________________|SavedLegacySettings|3C_00_00_00_15_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_00|3C_00_00_00_16_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_0| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/ShellNoRoam/BagMRU_____________________________________________________________|MRUListEx__________|01_00_00_00_00_00_00_00_02_00_00_00_04_00_00_00_03_00_00_00_FF_FF_FF_FF_________|00_00_00_00_01_00_00_00_02_00_00_00_04_00_00_00_03_00_00_00_FF_FF_FF_FF________| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** ______________________________________________________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT________________________________________|PROTOCOL| |204.145.89.130_|204.145.89.130______|/1______________|Mozilla/4.0_(compatible;_MSIE_6.0;_Windows_NT_5.1;_SV1)|0x06____| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______________________________________________|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|5_______|4_______|499______|515______| |17______|2_______|0_______|350______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |80___|6_______|5_______|4_______|499______|515______| |1900_|17______|2_______|0_______|350______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |09:17:16|2011-08-17|6_______|10.10.10.7|204.145.89.130_|->_|e____|44___|80___|9___|1014_| |09:22:44|2011-08-17|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|2___|350__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|