Malware Report - Results

This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection.

Malware Search Criteria:
  • MD5 =ab854d27c5a80e4175069d9b8aa0f8de

  • Malware Report - Results

    File MD5SumSHA1SUMSHA256SUMFUZZY HASHFile Size
    ab854d27c5a80e4175069d9b8aa0f8de7b22b184ae42240446be023a3472b2fce402e5a384a778e8480dceae304ce3f7b0398964058c7d213a973b99b0a6ee6a664c51a41536:l1qzHQYmhokHnW6LC+mF0PjeEGwEFQEJ49TDx:EVmukHW09s0PjIV54xDx70144

    File Results

    File Name
    DSC003231.scr.exe

    SNORT Results

    Snort ClassSnort AlertCount
    N/ANo snort alerts generated0

    AV Results

    AV AlertAV Vendor
    N/ASymantec
    N/AMcAfee
    N/AKaspersky
    Trojan.Gen.2Symantec
    Artemis!AB854D27C5A8McAfee
    HEUR:Trojan.Win32.GenericKaspersky
    Generic.dx!yxMcAfee

    Folders (Added) - ICC Results

    PathFolder Name

    Files (Added) - ICC Results

    PathFile Name
    c:/WINDOWS/Prefetch7Z.EXE-1A62CD19.pf
    c:/WINDOWS/PrefetchEXPLORER.EXE-082F38A9.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/system32/drivers/etchîsts
    c:netstat_post.txt
    c:/WINDOWS/PrefetchAUTOIT3.EXE-32361418.pf
    c:/WINDOWS/PrefetchDIEP.EXE-0B3E1DC8.pf
    c:/WINDOWS/PrefetchEXPLORER.EXE-082F38A9.pf
    c:/WINDOWS/PrefetchHSTART.EXE-221D72BF.pf
    c:/WINDOWS/PrefetchREGSHOT.EXE-010A5EE6.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/system32/drivers/etchîsts
    c:netstat_post.txt
    c:tasksvc_post.txt
    c:taskv_post.txt

    Files (Deleted) - ICC Results

    ActionPathFile Name

    Files (Changed) - ICC Results

    ActionPathFile Name
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/WINDOWS/PrefetchCMD.EXE-087B4001.pf
    modifiedc:/WINDOWS/PrefetchHSTART.EXE-221D72BF.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchSH.EXE-00254D2B.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/system32/drivers/etchosts
    modifiedc:/WINDOWS/system32/wbem/Logswbemess.log
    modifiedc:/WINDOWS/system32/wbem/Logswmiprov.log
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/WINDOWS/PrefetchCMD.EXE-087B4001.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchNTOSBOOT-B00DFAAD.pf
    modifiedc:/WINDOWS/PrefetchSCP.EXE-174845DC.pf
    modifiedc:/WINDOWS/PrefetchSENDIT.EXE-34C997E3.pf
    modifiedc:/WINDOWS/PrefetchSH.EXE-00254D2B.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/PrefetchWMIPRVSE.EXE-28F301A9.pf
    modifiedc:/WINDOWS/PrefetchWUAUCLT.EXE-399A8E72.pf
    modifiedc:/WINDOWSSchedLgU.Txt
    modifiedc:/WINDOWS/SoftwareDistribution/DataStore/Logsedb.chk
    modifiedc:/WINDOWS/system32/drivers/etchosts
    modifiedc:/WINDOWS/system32/wbem/Repository/FSINDEX.MAP
    modifiedc:/WINDOWS/system32/wbem/Repository/FSMAPPING.VER
    modifiedc:/WINDOWS/system32/wbem/Repository/FSMAPPING2.MAP
    modifiedc:/WINDOWS/system32/wbem/Repository/FSOBJECTS.MAP

    Registry Keys (Added) - ICC Results

    ActionPath

    Registry Values (Added) - ICC Results

    ActionPathVal_NameVal_Data

    Registry Values (Deleted) - ICC Results

    ActionPathVal_NameVal_TypeMod_Val_TypeVal_DataMod_Val_Data

    Registry Values (Changed) - ICC Results

    ActionPathVal_NameVal_DataMod_Val_Data
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeed48 36 E5 7E 09 49 5D F1 84 F6 6C B2 6A 0B FC 46 09 51 3C F4 5B 7B 8C A1 FA 51 2A 21 89 4F 31 E7 35 F2 D6 AC 86 B2 17 EE 6B F9 59 CB AD AB 1F A2 98 BE 6F B4 1A D
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/Discardable/PostSetup/Component Categories/{00021493-0000-0000-C000-000000000046}/EnumImplementing1C 00 00 00 01 00 00 00 DB 07 04 00 00 00 18 00 16 00 2E 00 34 00 A9 03 06 00 00 1C 00 00 00 01 00 00 00 DB 07 04 00 00 00 18 00 16 00 30 00 25 00 61 03 06 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/Discardable/PostSetup/Component Categories/{00021494-0000-0000-C000-000000000046}/EnumImplementing1C 00 00 00 01 00 00 00 DB 07 04 00 00 00 18 00 16 00 2E 00 37 00 CE 02 01 00 00 1C 00 00 00 01 00 00 00 DB 07 04 00 00 00 18 00 16 00 30 00 27 00 15 00 01 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d12e-6183-11de-9bd7-806d6172696f}Generation0x00000001 0x00000002
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d12f-6183-11de-9bd7-806d6172696f}Generation0x00000001 0x00000002
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d131-6183-11de-9bd7-806d6172696f}Generation0x00000001 0x00000002
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeed09 E8 88 64 49 BE 86 A3 E4 29 66 4E 6B E6 6A A4 74 9E 2F A4 95 93 DF 51 67 35 1E 19 06 91 D9 EA 7D 25 E5 2B E8 B3 A5 4D 35 36 94 D5 9B C0 BC 1F F6 67 98 77 DA C
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/Discardable/PostSetup/Component Categories/{00021493-0000-0000-C000-000000000046}/EnumImplementing1C 00 00 00 01 00 00 00 DB 07 04 00 04 00 1C 00 09 00 34 00 37 00 32 02 06 00 00 1C 00 00 00 01 00 00 00 DB 07 04 00 04 00 1C 00 09 00 36 00 16 00 3E 00 06 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/Discardable/PostSetup/Component Categories/{00021494-0000-0000-C000-000000000046}/EnumImplementing1C 00 00 00 01 00 00 00 DB 07 04 00 04 00 1C 00 09 00 34 00 39 00 4B 03 01 00 00 1C 00 00 00 01 00 00 00 DB 07 04 00 04 00 1C 00 09 00 36 00 16 00 8A 03 01 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d12e-6183-11de-9bd7-806d6172696f}Generation0x00000001 0x00000002
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d12f-6183-11de-9bd7-806d6172696f}Generation0x00000001 0x00000002
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2/CPC/Volume/{0491d131-6183-11de-9bd7-806d6172696f}Generation0x00000001 0x00000002

    DNS Results

    DNSDNS Response

    URL Results

    DstIPHTTP_HOSTHTTP_REQUEST_URIHTTP_USER_AGENTPROTOCOL
    239.255.255.250239.255.255.250:1900*--blank--0x11

    ARGUS PROTOCOL Results

    PROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    17101750

    ARGUS DPORT Results

    DPORTPROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    190017101750

    ARGUS DATA Results

    TimeDateProtocolSrcIPDstIPDirFlagsSportDportPktsBytes
    09:59:562011-04-281710.10.10.7239.255.255.250-> e 819001175

    Packer Results

    Packer Name

    HoneyTrap Results

    Honey Trap Log File Location

    PTFB Results

    PTFB Log File Location