The above sample SHA1 : ddedb2cb0a67421a70bcf71deaaec304d79b1c7f - whatever it is.
Start:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"fheydbueyj.exe"="C:\\fheydbueyj.exe\\fheydbueyj.exe"
Files:
C:\fheydbueyj.exe\fheydbueyj.exe
C:\fheydbueyj.exe\config.bin
c:\documents and settings\NetworkService\Local Settings\Application Data\DBControl
c:\documents and settings\LocalService\Local Settings\Application Data\DBControl
C:\DBControl
C:\documents and settings\CurrentUser\Local Settings\Application Data\DBControl
Hooks every process that it can:
ntdll.dll-->NtEnumerateValueKey, Type: Inline - RelativeJump 0x7C90D2EE-->00000000 [unknown_code_page]
ntdll.dll-->NtQueryDirectoryFile, Type: Inline - RelativeJump 0x7C90D76E-->00000000 [unknown_code_page]
ntdll.dll-->NtResumeThread, Type: Inline - RelativeJump 0x7C90DB3E-->00000000 [unknown_code_page]
ntdll.dll-->NtVdmControl, Type: Inline - RelativeJump 0x7C90DF1E-->00000000 [unknown_code_page]
ntdll.dll-->LdrLoadDll, Type: Inline - RelativeJump 0x7C9163C3-->00000000 [unknown_code_page]
advapi32.dll-->CryptEncrypt, Type: Inline - RelativeJump 0x77DEE360-->00000000 [unknown_code_page]
user32.dll-->TranslateMessage, Type: Inline - RelativeJump 0x7E418BF6-->00000000 [unknown_code_page]
wininet.dll-->InternetReadFile, Type: Inline - RelativeJump 0x3D94654B-->00000000 [unknown_code_page]
wininet.dll-->HttpQueryInfoA, Type: Inline - RelativeJump 0x3D94878D-->00000000 [unknown_code_page]
wininet.dll-->InternetCloseHandle, Type: Inline - RelativeJump 0x3D949088-->00000000 [unknown_code_page]
wininet.dll-->InternetQueryDataAvailable, Type: Inline - RelativeJump 0x3D94BF7F-->00000000 [unknown_code_page]
wininet.dll-->HttpAddRequestHeadersA, Type: Inline - RelativeJump 0x3D94CF46-->00000000 [unknown_code_page]
wininet.dll-->HttpOpenRequestA, Type: Inline - RelativeJump 0x3D94D508-->00000000 [unknown_code_page]
wininet.dll-->HttpSendRequestW, Type: Inline - RelativeJump 0x3D94FABE-->00000000 [unknown_code_page]
wininet.dll-->HttpSendRequestA, Type: Inline - RelativeJump 0x3D95EE89-->00000000 [unknown_code_page]
wininet.dll-->InternetReadFileExA, Type: Inline - RelativeJump 0x3D963381-->00000000 [unknown_code_page]
wininet.dll-->InternetWriteFile, Type: Inline - RelativeJump 0x3D9A60F6-->00000000 [unknown_code_page]
ws2_32.dll-->send, Type: Inline - RelativeJump 0x71AB4C27-->00000000 [unknown_code_page]