Analysis # 1828 Sample: fax_ _ exe (4ba43f0b82f86efed437c8523f7a4dee) Analysis # /25/ :05 am

Similar documents
Analysis # Sample: Important_WellsFargo_Doc.exe (70e604777a66980bcc751dcb00eafee5) Analysis # /10/ :12 pm

Analysis # 2956 Sample: document_73128_91898_pdf.exe (5b94fb32ed60cb839ca4284f80ae3b16) Analysis # /10/ :34 am

Analysis # Sample: ss32.exe ( a6e6d b453e73d) Analysis # /08/ :33 pm

Analysis # Sample: Scan_ _29911.exe (8fcba93b00dba3d182b1228b529d3c9e) Analysis # /12/ :41 pm

Analysis # Sample: google_born_help.exe (584fe856bb348e0089f7b59ec31881a5) Analysis # /05/ :34 pm

PCSL. PCSL IT Consulting Institute. Windows Virus Cleaning Test Report 感染型病毒清除测试报告. Celebrating Technology Innovation

RTTL Certification Test - March Language: English. March Last Revision: 8 th April

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

Malware Initial Findings Report (MIFR)

Language English. Server load. Suspicious file(s) to scan:

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway

Evaluation Guide. The purpose of this document is to help evaluating users install and configure GFI EventsManager.

Lab 1: UPX Program Packer. From what we see here Netcat s MD5 is (AB41B1E2DB77CEBD9E EE3915D)

GFI product comparison: GFI MailEssentials vs. LogicNow - Control

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

Evaluation guide. Online Demo Evaluation Guide

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

Android Malware Detection Test 手机安全软件病毒检测率测试 Mar. Celebrating Technology Innovation

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

Android Malware Detection Test 手机安全软件病毒检测率测试 Jun. Celebrating Technology Innovation

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

China Region Malware Test 2010 May

Android Malware Detection Test 手机安全软件病毒检测率测试 Dec. Celebrating Technology Innovation

AhnLab-V AntiVir Antiy-AVL Avast

AV-Comparatives. Support-Test (Germany) Test of German-Language Telephone Support Services for Windows Consumer Security Software 2016

Android Malware Detection Test 手机安全软件病毒检测率测试 Mar. Celebrating Technology Innovation

A Study of the Relationship Between Antivirus Regressions and Label Changes

Why one virus engine is not enough

MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.*

Security Industry Market Share Analysis

SKD Labs Test Report. A Comparative Test on Anti-Malware Products in the China Region

Acer LANScope Agent Acer LANScope Agent x64 Adaptive Security Analyzer 2.0 AEC TrustPort Antivirus

Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best

Technical factsheet Cloud Backup

FAX DEVICE INSTALLATION MANUAL

PC SECURITY LABS COMPARATIVE TEST. Microsoft Office. Flash. August Remote code execution exploit. mitigations for popular applications

GFI Product comparison. vs. Archiver

GFI Product comparison. vs. Archiver

GFI Product comparison. vs. Archiver

Anti-Virus Comparative No.1

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October

Norton Antivirus 2008 Manual Update File Xp

GFI Product Comparison. GFI EventsManager 2013 vs. WhatsUp EventLog Management Suite

Norton Internet Security 2008 Manual Uninstall Tools

FILE :42: :44: Maldun. win7-sp1-x64 win7-sp1-x64 KVM :42: :44:39 10.

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Intel Unite. Intel Unite Firewall Help Guide

Anti Virus Comparative Performance Test (Suite Products) May 2012

UC Davis UC Davis Previously Published Works

JUNE Covering the global threat landscape VB100 CERTIFICATION REPORT JUNE 2018 INTRODUCTION DIVERSITY TEST THE VB100 SET-UP PRODUCTS & RESULTS

City, University of London Institutional Repository

Security Industry Market Share Analysis

Anti-Virus Comparative No.7

Anti-Virus Comparative Summary Report 2008

Anti-Virus Comparative

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Manually Remove Of Xp Internet Security Protect

GFI Product Manual. Deployment Guide

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

A glance into the Eye Pyramid

Common Framework for Artifact Analysis Activities

Norton 360 Manual Scanning Not Working Windows 8

PassMark S O F T W A R E

Norton Antivirus 2010 Manual Removal Tool Windows 7

Avg Antivirus For Windows Xp Full Version 2013 With Key

Manually Remove Of Xp Internet Security Protect Virus Manually

Anti-Virus Testing and AMTSO

Anti-Virus Comparative No.8

Anti-Virus Comparative

Norton Internet Security 2011 Removal Tool Windows 7

Installation & Upgrade Guide

Compatibility Matrixes for VMware vcenter Site Recovery Manager 4.0 and Later

FEBRUARY Covering the global threat landscape. VB100 COMPARATIVE REVIEW FEBRUARY 2018 Martijn Grooten INTRODUCTION RESULTS

OCTOBER Covering the global threat landscape VB100 CERTIFICATION REPORT OCTOBER 2018 INTRODUCTION DIVERSITY TEST PRODUCTS & RESULTS

CONSUMER AV / EPP COMPARATIVE ANALYSIS

1. I am a Computer Forensics Researcher with Kyrus Technology. I make this

DECEMBER Covering the global threat landscape. VB100 CERTIFICATION REPORT DECEMBER 2018 Martijn Grooten INTRODUCTION DIVERSITY TEST

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

CMSIS DAP Setup. Document Version History Document Version ngxtechnologies.com 2

IronPort Plug-in for Outlook VERSION 1.5 RELEASE NOTES

Malwarebytes for mac os x

VB100 COMPARATIVE REVIEW ON WINDOWS 7 PRO

User Experience Review

Upgrading BankLink Books

Data Breach Risk Scanning and Reporting

Products supported by ESAP FIREWALL PRODUCTS: Product Name. AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.

Application Note: NTP server access via SiteManag-

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Intel Unite Solution. Plugin Guide for Protected Guest Access

OneBridge Mobile Groupware 5.0

Provider Portal. Direct Deposit User Guide

Anti-Virus Comparative No.4

User Guide. Learn how to archive items with GFI Archiver.

Destructive Malware 12 February 2015

DIGIPASS Authentication for NETASQ

GFI FaxMaker and HIPAA compliance

IT Security Survey 2018

Installation Guide. Copyright 2011 Bitdefender

Transcription:

Analysis # 1828 07252014 10:05 am 114

Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 File Activity... 4 Deleted Files... 4 Stored Modified Files... 5 Created Mutexes... 6 Created Mutexes... 6 Registry Activity... 7 Set Values... 7 Deleted Values... 8 Network Activity... 9 Network Events... 9 Network Traffic... 11 DNS Requests... 12 Virus Total Results... 13 214

Analysis Summary Submitted File: fax_390392029_072514.exe MD5: 4ba43f0b82f86efed437c8523f7a4dee File Size: 283136 File Type: PE32 executable for MS Windows (GUI) Intel 80386 3 Analysis Time: 2014-07-25 10:05:08 Start Reason: AnalysisTarget Termination Reason: TerminatedBySelf Start Time: Fri, 25 Jul 2014 14:08:21 +0000 Termination Time: Fri, 25 Jul 2014 14:09:21 +0000 Analysis Time: 2014-07-25 10:05:08 Sandbox: XP-SP2-00-0C-29-B2-D2-62 Total Processes: 3 Sample Notes: Digital Behavior Traits Alters Windows Firewall Checks For Debugger Copies to Windows Could Not Load Creates DLL in System Creates EXE in System Creates Hidden File Creates Mutex Creates Service Deletes File in System Deletes Original Sample Hooks Keyboard Injected Code Makes Network Connection Modifies File in System Modifies Local DNS More than 5 Processes Opens Physical Memory Starts EXE in Documents Starts EXE in Recycle Starts EXE in System WindowsRun Registry Key Set 314

Deleted Files C:\fax_390392029_072514.exe 414

Stored Modified Files [process 1] C:\Documents and Settings\Charlie\Application Data\cmd.exe C:\Documents and Settings\Charlie\Application Data\userdata.dat C:\Documents and Settings\Charlie\Application Data\userdata.dat 514

Created Mutexes [process 1] [process 1] [process 1] [process 1] [process 1] mutex Name: CTF.LBES.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.Compart.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.Asm.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.Layouts.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.TMD.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.TimListCache.FMPDefaultS-1-5-21-602162358-879983540-1177238915-1003MUTEX.DefaultS-1-5-21-6 02162358-879983540-1177238915-1003 Name: CTF.LBES.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.Compart.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.Asm.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.Layouts.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.TMD.MutexDefaultS-1-5-21-602162358-879983540-1177238915-1003 Name: CTF.TimListCache.FMPDefaultS-1-5-21-602162358-879983540-1177238915-1003MUTEX.DefaultS-1-5-21-6 02162358-879983540-1177238915-1003 Name: Xider78 Name: Local\c:!documents and settings!charlie!local settings!temporary internet files!content.ie5! Name: Local\c:!documents and settings!charlie!cookies! Name: Local\c:!documents and settings!charlie!local settings!history!history.ie5! Name: Local\WininetConnectionMutex 614

Set Values [process 1] [process 1] key Key Name: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG Value: Seed rentversion\explorer\shell Folders Value: AppData Key Name: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG Value: Seed rentversion\explorer\shell Folders Value: AppData rentversion\run Value: GoogleUpdate rentversion\explorer\shell Folders Value: AppData rentversion\explorer\shell Folders Value: History Key Name: \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders Value: Common AppData rentversion\explorer\shell Folders Value: AppData Value: ProxyEnable Key Name: \REGISTRY\USER\S-1-5-21-602162358-879983540-1177238915-1003\Software\Microsoft\windows\Cur \Connections Value: SavedLegacySettings Value: ProxyEnable Key Name: \REGISTRY\USER\S-1-5-21-602162358-879983540-1177238915-1003\Software\Microsoft\windows\Cur \Connections Value: SavedLegacySettings Key Name: \REGISTRY\MACHINE\Software\Microsoft\Rpc Value: UuidSequenceNumber 714

Deleted Values key Value: ProxyServer Value: ProxyOverride Value: AutoConfigURL Value: ProxyServer Value: ProxyOverride Value: AutoConfigURL 814

Network Events Remote IP Local IP HTTP Command 173.194.37.103 10.20.25.250 none 77.72.174.164 10.20.25.250 none 77.72.174.165 10.20.25.250 none 173.194.37.103 10.20.25.250 none 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET F55publickey72.64.146.112 F50Win_XP_32bit101872.64.146.112 F55replace72.64.146.112 F51oXrLlkNDxOipccQNoopqPLqXuxeySeE72.64.146.112 F514NATSymmetric%20NAT072.64.146.112 F51RqJmFMsFYABMxwsknpYjiangYdpUgER72.64.146.112 POST 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET 188.165.214.17 10.20.25.250 GET privatesandbox_status.php F51IkGKynkMBNUTxfeoCgcoPbHIsGoGhVc72.64.146.112 F51PocaHJNdOQCMViLnBBnpEwfQweJGoos72.64.146.112 F51jJalspNrecqvjMIbclhaAXimPiBfMbe72.64.146.112 POST 188.165.214.17 10.20.25.250 GET privatesandbox_status.php F51QEklbUJqfEXQSgldVAfGBTlukDrPpWv72.64.146.112 POST 188.165.214.17 10.20.25.250 GET privatesandbox_status.php F51KRBkcjdudJBCTdYfbKvwKKeAFQEaOnN72.64.146.112 914

188.165.214.17 10.20.25.250 GET F51WbgkAGuxstAgRcKvyKSfxIbcIPUxCGd72.64.146.112 POST privatesandbox_status.php 188.165.214.17 10.20.25.250 GET F51bOEBivIpUaAUabcEOpVdTqGjGJFFTIu72.64.146.112 POST privatesandbox_status.php 188.165.214.17 10.20.25.250 GET F51UdJQMNoLejmGayjbjPfnnHxYvjobEVq72.64.146.112 188.165.214.17 10.20.25.250 GET F51pIHHbYXFAnAVfWlNQDemgVHXgTTLXDa72.64.146.112 POST privatesandbox_status.php 1014

Network Traffic Remote IP Local IP Connection #1 10.20.25.255 10.20.25.250 Connection #2 239.255.255.250 10.20.25.250 Connection #3 77.72.174.164 10.20.25.250 Connection #4 77.72.174.165 10.20.25.250 1114

DNS Requests Request Result google.com 173.194.37.103 173.194.37.101 173.194.37.102 173.194.37.98 173.194.37.105 173.194.37.100 173.194.37.97 173.194.37.99 173.194.37.110 173.194.37.96 173.194.37.104 stun.voipstunt.com 77.72.174.164 77.72.174.160 77.72.174.166 77.72.174.162 1214

Virus Total Results Last Scanned: 2014-07-25 14:05:13 MicroWorld-eScan: nprotect: CMC: McAfee: Malwarebytes: AegisLab: K7AntiVirus: K7GW: Agnitum: Norman: TotalDefense: Avast: Kaspersky: BitDefender: NANO-Antivirus: ViRobot: F-Secure: AntiVir: Emsisoft: Antiy-AVL: Kingsoft: SUPERAntiSpyware: GData: AhnLab-V3: Zoner: Tencent: Ikarus: AVG: Panda: TrjGenetic.gen Qihoo-360: 1314

Powered by TCPDF (www.tcpdf.org) Analysis # 1828 ThreatTrack Security, Inc. 33 North Garden Avenue, Suite 1200, Clearwater, Florida, USA 33755 Telephone: (855) 443-4284 Intl: +1(813)367-9907 Email: Sales@ThreatTrack.com Disclaimer 2013. ThreatTrack Security, Inc. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. ThreatTrack Security, Inc. is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, ThreatTrack Security makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information, or errors. ThreatTrack Security makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical. 1414