Friday, June 22, 2012

Kuluoz.B

Bot Communication Details: Server DNS Name: google.com Server DNS Name: bing.com Server DNS Name: twitter.com Server DNS Name: fb.com Server DNS Name: coocislands2012.ru    OS Change Detail   (version: 4.652)     | Items: 75  | OS Info: Microsoft WindowsXP Professional 5.1 base   Top
TypeMode/ClassDetails (Path/Message/Protocol/Hostname/Qtype/ListenPort etc.)Process IDParent IDFile Size
Analysis
Malware
   
Os
Name:  windows    Version:  5.1.2600    Service Pack:  0   
   
Os  Monitor
Build:  69105    Date:  Jan 24 2012    Time:  14:44:55   
   
Process
Started
C:\Print_label.exe
  Parentname:  C:\WINDOWS\system32\cmd.exe
  Command Line:  "c:\Print_label.exe"
  MD5:  ab5a9f8c735487bf15b98a8c10cb582a
  SHA1: f64682ba5d65b4b08ae7c4fe9b910b853e5ffe31
1292126453248
Malicious  Alert
Anomaly  Tag
Message:   Startup behavior anomalies observed    Detail:   A new process has been launched   
   
Mutex
  Imagepath:  C:\Print_label.exe
1292  
Process
Started
C:\WINDOWS\system32\svchost.exe
  Parentname:  C:\Print_label.exe
  Command Line:  svchost.exe
6401292 
Malicious  Alert
Misc  Anomaly
Message:   New service host started    Detail:   Malware starting new instance of svchost.exe   
   
API Call
  API Name:  Sleep   Address:  0x00405fcf
  Params:  [500]
  Imagepath:  C:\Print_label.exe   DLL Name:  kernel32
1292  
Malicious  Alert
Misc  Anomaly
Message:   Tracking Sleep/SleepEx API Call    Detail:   Malware Sleep   
   
Codeinjection
Create process suspended section mapped code injection
Source:   C:\Print_label.exe   
Target:   C:\WINDOWS\system32\svchost.exe   
1292
640
  
Malicious  Alert
Misc  Anomaly
Message:   Code injection detected   
   
Mutex
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Process
Terminated
C:\Print_label.exe
  Parentname:  C:\WINDOWS\system32\cmd.exe
  Command Line:  N/A
12921264 
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\"Directory
   " = C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\"Paths" =
   0x00000004
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1\"Cac
   hePath" = C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\Cac
   he1
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2\"Cac
   hePath" = C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\Cac
   he2
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3\"Cac
   hePath" = C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\Cac
   he3
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4\"Cac
   hePath" = C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\Cac
   he4
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1\"Cac
   heLimit" = 0x000fffac
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2\"Cac
   heLimit" = 0x000fffac
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3\"Cac
   heLimit" = 0x000fffac
640  
Regkey
Setval
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4\"Cac
   heLimit" = 0x000fffac
640  
File
Open
C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\index.dat
  MD5:  8507f2e0f5dcc75be3f84412a5c4ce79
  SHA1: ab960305a3fe8610fb420be033b022891f352abe
640 65536
File
Close
C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.IE5\index.dat
  MD5:  f5a5270f78fbba9605b0211736506452
  SHA1: 605fc4af8b9a9ff0d0a2694fc9ffedd228ffa25f
640 65536
Folder
Open
C:\Documents and Settings\admin\Cookies
640  
File
Open
C:\Documents and Settings\admin\Cookies\index.dat
  MD5:  5b8619de7a4b3491feab3fd6e3b507d7
  SHA1: 02b14f6cdc1592b070cd192fdaaa008cfaa74fcd
640 32768
Malicious  Alert
Data  Theft
Message:   Internet Explorer cookie index read    Detail:   Malware reading IE cookie index   
   
File
Close
C:\Documents and Settings\admin\Cookies\index.dat
  MD5:  5b8619de7a4b3491feab3fd6e3b507d7
  SHA1: 02b14f6cdc1592b070cd192fdaaa008cfaa74fcd
640 32768
File
Open
C:\Documents and Settings\admin\Local Settings\History\History.IE5\index.dat
  MD5:  f5b5fdbc8d8acfda71a6a428206d5ff3
  SHA1: fb14e5c0b024fae6e5860205cce8b7c4b69379d8
640 32768
Malicious  Alert
Data  Theft
Message:   Internet Explorer history index read    Detail:   Malware reading IE history index   
   
File
Close
C:\Documents and Settings\admin\Local Settings\History\History.IE5\index.dat
  MD5:  f5b5fdbc8d8acfda71a6a428206d5ff3
  SHA1: fb14e5c0b024fae6e5860205cce8b7c4b69379d8
640 32768
Mutex
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Regkey
Setval
\REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
   n\Internet Settings\"ProxyEnable" = 0x00000000
640  
Malicious  Alert
Misc  Anomaly
Message:   Browser settings tampered    Detail:   Malware modifying browser proxy settings   
   
Regkey
Setval
\REGISTRY\MACHINE\SYSTEM\ControlSet001\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVers
   ion\Internet Settings\"ProxyEnable" = 0x00000000
640  
Regkey
Setval
\REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
   n\Internet Settings\Connections\"SavedLegacySettings" = 3c 00 00 00 0a 00 00 00 01 00 00 00 0d 00
    00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 c0
   7e dd d3 73 dc cc 01 01 00 00 00 0a 00 02 0f 00 00 00 00 00 00 00 00
640  
Malicious  Alert
Misc  Anomaly
Message:   Network settings tampered    Detail:   Browser network configuration modified   
   
Regkey
Setval
\REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
   n\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001
640  
Regkey
Setval
\REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
   n\Internet Settings\ZoneMap\"IntranetName" = 0x00000001
640  
Regkey
Setval
\REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
   n\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001
640  
Mutex
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  bing.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  twitter.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  coocislands2012.ru
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  google.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Uac
Privilege use
SeTcbPrivilege
   
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  google.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  fb.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  bing.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Regkey
Setval
\REGISTRY\USER\S-1-5-21-1409082233-688789844-725345543-1003\Software\Microsoft\Windows\CurrentVersio
   n\Run\"lpxdhxwv" = "C:\Documents and Settings\admin\Local Settings\Application Data\jtjqhohe.exe"
640  
Malicious  Alert
Misc  Anomaly
Message:   Startup services added    Detail:   Malware adding itself (non-DLL) to windows startup areas   
   
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  twitter.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  coocislands2012.ru
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  google.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  fb.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  bing.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  twitter.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  coocislands2012.ru
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  google.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  fb.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  bing.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  twitter.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  coocislands2012.ru
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  google.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  fb.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  bing.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  twitter.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  coocislands2012.ru
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  google.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  fb.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  bing.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe
640  
Network
Dns  Query
  Protocol  Type:  udp   Qtype:  Host Address   Hostname:  twitter.com
  Imagepath:  C:\WINDOWS\system32\svchost.exe

No comments:

Post a Comment