SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Wapomi.O
Wapomi is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Users\Admin\AppData\Local\Temp\623B4581.exe"
  • "c:\Users\Admin\AppData\Local\Temp\5630055E.exe"
  • "c:\Users\Admin\AppData\Local\Temp\03083873.exe"
  • "c:\Users\Admin\AppData\Local\Temp\500950f5.bat"
  • "c:\Windows\System32\svohost.exe"
  • "c:\Users\Admin\AppData\Local\Temp\4CA0193E.exe"
  • "c:\Users\Admin\AppData\Local\Temp\00007E84.exe"
  • "c:\Users\Admin\AppData\Local\Temp\nEYBkyMVsZ.exe"
  • "c:\Users\Admin\AppData\Local\Temp\14D92F37.exe"

It modifies the following additional file(s) on the system:
  • "c:\Windows\System32\svohost.txt"

Process Related Changes
It creates the following mutex(es):
  • "Global\WdsSetupLogInit"
  • "IESQMMUTEX_0_208"

It creates the following process(es):
  • C:\Users\Admin\AppData\Local\Temp\14D92F37.exe
  • C:\Windows\system32\ntvdm.exe
  • C:\Windows\system32\svohost.exe
  • C:\Windows\system32\cmd.exe [ cmd /c \C:\Users\Admin\AppData\Local\Temp\500950f5.bat ]
  • C:\Users\Admin\AppData\Local\Temp\03083873.exe
  • C:\Users\Admin\AppData\Local\Temp\4CA0193E.exe
  • C:\Users\Admin\AppData\Local\Temp\nEYBkyMVsZ.exe

Network Activity
We observed the following DNS query/queries:
  • www.baidu.com
  • ctr20003.aiwooolsf.com
  • 1.dnsnb8.net
  • dl.sftz.net
  • d.dnsnb8.net

It attempts to connect to the following remote servers:
  • 1.dnsnb8.net:799 (61.153.xxxxxx)
  • dl.sftz.net:999 (61.153.xxxxxx)
  • d.dnsnb8.net:799 (61.153.xxxxxx)
  • www.a.shifen.com:80 (180.76xxxxxx)

Registry Related Changes
It makes the following registry modifications to ensure infection after system reboot:
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\4ca0193e = C:\Users\Admin\AppData\Local\Temp\4CA0193E.exe


Relevant Information