Malware Report - Results

This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection.

Malware Search Criteria:
  • MD5 =b39c875953386e63cc6c55dcb0fd605d

  • Malware Report - Results

    File MD5SumSHA1SUMSHA256SUMFUZZY HASHFile Size
    b39c875953386e63cc6c55dcb0fd605d8b6a7e16f97449918bc2725d372ae35c137b0938c78573465a2ebd815081c1854a0d8ec4faf25e299f055e8f04cb752daef0906912288:1Ms3z3fz2KcADY1jQILadEN8PCVX55uAmI7PpFx:K6jfz2KxDYZzLp8PCVWA/7Px447691

    File Results

    File Name
    exrev.exe

    SNORT Results

    Snort ClassSnort AlertCount
    N/ANo snort alerts generated0

    AV Results

    AV AlertAV Vendor
    Trojan.GenSymantec
    Generic.bfr!cgMcAfee
    Trojan-Dropper.Win32.VB.badkKaspersky

    Folders (Added) - ICC Results

    PathFolder Name
    c:/Documents and Settings/dmc73144/Local Settings/Tempnsp3.tmp
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE587IMY4XV
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5ITB2CJ0C
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5MILJGV5B
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5WO4JPI86

    Files (Added) - ICC Results

    PathFile Name
    c:/Documents and Settings/dmc73144/Application Data69jyz5.log
    c:/Documents and Settings/dmc73144/Application Datajpposh.exe
    c:/Documents and Settings/dmc73144/Application DataMouseDriver.bat
    c:/Documents and Settings/dmc73144/Local Settings/Temp7.tmp
    c:/Documents and Settings/dmc73144/Local Settings/Temp/nsp3.tmp5tbp.exe
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/87IMY4XVdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/87IMY4XVnnbrswmqa[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0CCAKXUF09.htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Cdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Cdnnrvriqm[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/MILJGV5Bdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/MILJGV5Bhdqhyyz[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/WO4JPI86desktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/WO4JPI86erfjjje[1].htm
    c:/WINDOWS/Prefetch1EUROP.EXE-045F1790.pf
    c:/WINDOWS/Prefetch2IR.EXE-1F2A15E9.pf
    c:/WINDOWS/Prefetch3IC.EXE-0EA1FF3B.pf
    c:/WINDOWS/Prefetch4E4U - BUCKS.EXE-3AFFE7E5.pf
    c:/WINDOWS/Prefetch5TBP.EXE-37E77B32.pf
    c:/WINDOWS/PrefetchEXREV.EXE-124BE97E.pf
    c:/WINDOWS/PrefetchGRPCONV.EXE-111CD845.pf
    c:/WINDOWS/PrefetchJPPOSH.EXE-12ADE272.pf
    c:/WINDOWS/PrefetchNET.EXE-01A53C2F.pf
    c:/WINDOWS/PrefetchNET1.EXE-029B9DB4.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-253557CF.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-317829F9.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-390AF68C.pf
    c:/WINDOWS/PrefetchRUNONCE.EXE-2803F297.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/PrefetchSC.EXE-012262AF.pf
    c:/WINDOWS/PrefetchSVCHOST.EXE-3530F672.pf
    c:/WINDOWSatupeyam.dll
    c:/WINDOWSdbonbc.dll
    c:netstat_post.txt
    c:tasksvc_post.txt
    c:taskv_post.txt

    Files (Deleted) - ICC Results

    ActionPathFile Name

    Files (Changed) - ICC Results

    ActionPathFile Name
    modifiedc:/Documents and Settings/dmc73144/Cookiesindex.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/History/History.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/Documents and Settings/LocalServicentuser.dat.LOG
    modifiedc:/Program Files/OpenSSH/var/logOpenSSHd.log
    modifiedc:/WINDOWS/PrefetchHSTART.EXE-221D72BF.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/system32/configdefault.LOG
    modifiedc:/WINDOWS/system32/configsoftware.LOG
    modifiedc:/WINDOWS/system32/configSYSTEM
    modifiedc:/WINDOWS/system32/configsystem.LOG
    modifiedc:/WINDOWS/system32/drivers/etchosts
    modifiedc:/WINDOWS/system32/wbem/Logswbemess.log
    modifiedc:/WINDOWS/system32/wbem/Logswmiprov.log

    Registry Keys (Added) - ICC Results

    ActionPath

    Registry Values (Added) - ICC Results

    ActionPathVal_NameVal_Data

    Registry Values (Deleted) - ICC Results

    ActionPathVal_NameVal_TypeMod_Val_TypeVal_DataMod_Val_Data

    Registry Values (Changed) - ICC Results

    ActionPathVal_NameVal_DataMod_Val_Data
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeedD1 A9 3F AC 06 11 38 17 27 66 2B 62 F4 51 C8 6A 81 5B DB 1C 18 60 68 28 6C 39 15 07 B9 66 B2 64 4D C4 7A E3 FD B1 EE E8 74 45 4E F4 E6 2B B8 6B 02 AF DB B9 3E 0
    modifiedHKLM/SOFTWARE/Microsoft/DirectDraw/MostRecentApplicationName"msoobe.exe" "svchost.exe"
    modifiedHKLM/SOFTWARE/Microsoft/DirectDraw/MostRecentApplicationID0x3B7D853E 0x41107ED6
    modifiedHKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProfileList/S-1-5-19RefCount0x00000002 0x00000001
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccess/EpochEpoch0x00000104 0x00000105
    modifiedHKLM/SYSTEM/ControlSet001/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/EpochEpoch0x00000104 0x00000105
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/3CurrentLevel0x00011000 0x00000000
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/316010x00000001 0x00000000
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/31A100x00000001 0x00000000
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet Settings/ConnectionsSavedLegacySettings3C 00 00 00 15 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 3C 00 00 00 19 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformationProgramCount0x00000002 0x00000001
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/3CurrentLevel0x00011000 0x00000000
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/316010x00000001 0x00000000
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/31A100x00000001 0x00000000

    DNS Results

    DNSDNS Response
    ikea.comStandard query response A 192.71.68.7
    sitesell.comStandard query response A 66.43.48.39
    google.aeStandard query response A 74.125.93.105 A 74.125.93.106 A 74.125.93.147 A 74.125.93.99 A 74.125.93.103 A 74.125.93.104
    gexque.inStandard query response A 5.5.5.5
    aarocket.comStandard query response A 91.217.162.15
    rooftopjam.inStandard query response A 87.255.51.229
    jumppack.inStandard query response A 87.255.51.229
    w.nucleardiscover.comStandard query response A 60.190.223.75
    221507db0729.quilane.netStandard query response A 202.150.208.68
    klz1mqnspdkod-bq.comStandard query response A 193.218.156.42 A 188.229.90.137

    URL Results

    DstIPHTTP_HOSTHTTP_REQUEST_URIHTTP_USER_AGENTPROTOCOL
    5.5.5.5gexque.in/?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHjzfIiRtufQpKX/O/tove7vkA==Mozilla/5.0 (Windows NT 6.1; wget 3.0; rv:5.0) Gecko/20100101 Firefox/5.00x06
    91.217.162.15aarocket.com/ckkuylpycc/dnnrvriqm.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    91.217.162.15aarocket.com/ckkuylpycc/erfjjje.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    91.217.162.15aarocket.com/ckkuylpycc/nnbrswmqa.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    91.217.162.15aarocket.com/ckkuylpycc/hdqhyyz.php?adv=adv401&code1=KOIE&code2=0224&id=82799957&p=1&b=1&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver760x06
    87.255.51.229rooftopjam.in/?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHjzfIiRtufQpKX/O/tove7vkA==Mozilla/5.0 (Windows NT 6.1; wget 3.0; rv:5.0) Gecko/20100101 Firefox/5.00x06
    87.255.51.229jumppack.in/?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHjzfIiRtufQpKX/O/tove7vkA==Mozilla/5.0 (Windows NT 6.1; wget 3.0; rv:5.0) Gecko/20100101 Firefox/5.00x06
    239.255.255.250239.255.255.250:1900*--blank--0x11

    ARGUS PROTOCOL Results

    PROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    61191121114716299
    17508750

    ARGUS DPORT Results

    DPORTPROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    8067062710713291
    443648314482
    8886454237262526
    190017508750

    ARGUS DATA Results

    TimeDateProtocolSrcIPDstIPDirFlagsSportDportPktsBytes
    18:40:462011-07-15610.10.10.75.5.5.5-> e 31180132413
    18:40:482011-07-15610.10.10.791.217.162.15-> e 127809981
    18:40:492011-07-15610.10.10.791.217.162.15-> e 89809981
    18:40:512011-07-15610.10.10.75.5.5.5-> e 31180101965
    18:40:502011-07-15610.10.10.791.217.162.15-> e 908091009
    18:40:562011-07-15610.10.10.75.5.5.5-> e 311806633
    18:40:572011-07-15610.10.10.787.255.51.229-> e 9180142750
    18:41:032011-07-15610.10.10.787.255.51.229-> e 9180112025
    18:41:092011-07-15610.10.10.787.255.51.229-> e 28680132415
    18:41:092011-07-15610.10.10.787.255.51.229-> e 91804240
    18:41:142011-07-15610.10.10.787.255.51.229-> e 28680112298
    18:41:192011-07-15610.10.10.760.190.223.75-> e 93888131124
    18:41:192011-07-15610.10.10.787.255.51.229-> e 286805300
    18:41:212011-07-15610.10.10.7202.150.208.68-> e 3378091409
    18:41:242011-07-15610.10.10.760.190.223.75-> e 9388811660
    18:41:292011-07-15610.10.10.760.190.223.75-> e 938885300
    18:42:332011-07-15610.10.10.760.190.223.75-> e 523888131124
    18:42:382011-07-15610.10.10.760.190.223.75-> e 52388810600
    18:42:432011-07-15610.10.10.760.190.223.75-> e 5238886360
    18:43:452011-07-15610.10.10.760.190.223.75-> e 359888131124
    18:43:502011-07-15610.10.10.760.190.223.75-> e 35988810600
    18:43:552011-07-15610.10.10.760.190.223.75-> e 3598886360
    18:44:382011-07-15610.10.10.7193.218.156.42-> e d 46444311736
    18:44:452011-07-15610.10.10.7193.218.156.42-> e 464443160
    18:46:042011-07-151710.10.10.7239.255.255.250-> e 400219002350
    18:46:102011-07-151710.10.10.7239.255.255.250-> e 400219001175
    18:46:132011-07-151710.10.10.7239.255.255.250-> e 41319002350

    Packer Results

    Packer Name

    HoneyTrap Results

    Honey Trap Log File Location

    PTFB Results

    PTFB Log File Location