**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =b45bbcf509e3d12e21b96721cc925ee9 **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________|File_Size| |b45bbcf509e3d12e21b96721cc925ee9|63b28610bd3f8f2da947055f5977ca1639d33977|7378d8e91759a85338138887f9f84f7d5b703fee6af970c803749493342f6589|384:Fu5G29hZ831mlPgXssWHl2wacL+yWjIJQ281JoiMQaqLZp:ID9osjTBiHjAE1JoBqLZp|32768____| **** File_Results **** _____________ |File_Name____| |updateset.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ________________________ |AV_Alert______|AV_Vendor| |N/A___________|Symantec_| |Generic.dx!tui|McAfee___| |N/A___________|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ______________________________________________________________________ |Path__________________________________________|File_Name______________| |c:/WINDOWS/Prefetch___________________________|AUTOIT3.EXE-32361418.pf| |c:/WINDOWS/Prefetch___________________________|REGSHOT.EXE-010A5EE6.pf| |c:/WINDOWS/Prefetch___________________________|SANDNET.EXE-2012C478.pf| |c:/WINDOWS/SoftwareDistribution/DataStore/Logs|tmp.edb________________| |c:/WINDOWS/system32/drivers/etc_______________|hosts__________________| **** Files_(Deleted)_-_ICC_Results **** _______________________________________________________ |Action_|Path_________________________________|File_Name| |deleted|c:/WINDOWS/system32/drivers/etc/hosts| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________________ |Action__|Path__________________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144____________|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________________|DIEP.EXE-0B3E1DC8.pf____| |modified|c:/WINDOWS/Prefetch___________________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________________|WMIPRVSE.EXE-28F301A9.pf| |modified|c:/WINDOWS/Prefetch___________________________|WUAUCLT.EXE-399A8E72.pf_| |modified|c:/WINDOWS/SoftwareDistribution/DataStore_____|DataStore.edb___________| |modified|c:/WINDOWS/SoftwareDistribution/DataStore/Logs|edb.chk_________________| |modified|c:/WINDOWS/SoftwareDistribution/DataStore/Logs|edb.log_________________| |modified|c:/WINDOWS/system32/wbem/Logs_________________|wmiprov.log_____________| |modified|c:/WINDOWS____________________________________|WindowsUpdate.log_______| **** Registry_Keys_(Added)_-_ICC_Results **** _________________________________________________________________________________________ |Action|Path______________________________________________________________________________| |added_|HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/WindowsUpdate/Reporting/RebootWatch| **** Registry_Values_(Added)_-_ICC_Results **** ______________________________________________________________________________________________________________________________________________________ |Action|Path____________________________________________________________________________________________|Val_Name__________________________|Val_Data___| |added_|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/ShellNoRoam/MUICache|C://windows//system32//sandnet.exe|"UpdateSet"| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path_____________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data____________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG_________________________|Seed_______________|98_70_18_EF_CB_41_5D_7C_36_64_7B_26_78_2B_6D_23_77_F7_E9_9A_BB_FC_8A_4A_0F_99_14|00_F6_83_10_DA_E1_09_77_11_29_47_6F_D7_E7_B3_DB_C5_B0_7B_87_F0_5D_6C_87_BD_89_FC| |modified|HKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENT____|EventMessageFile___|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/Eventlog/Application/ESENT____|CategoryMessageFile|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENT|EventMessageFile___|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/Eventlog/Application/ESENT|CategoryMessageFile|"c______________________________________________________________________________|"C:WINDOWSsystem32ESENT.dll"____________________________________________________| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** _________________________________________________________ |DstIP|HTTP_HOST|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DATA_Results **** _______________________________________________________________ |Time|Date|Protocol|SrcIP|DstIP|Dir|Flags|Sport|Dport|Pkts|Bytes| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|