MalAgent.J_72975 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.
Mutexes created
Directory level activity
File level activity
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\VB and VBA Program Settings\MbHQC5Zkf6tv5M7MVwgp2nmqs3R164\WADqm7Toyu7QYavBe7MNXgDyQjyR1KCIy7Pun235Xkn58u211
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - C:\WINDOWS\system32\kernel32.dll
- load - library - kernel32.dll
- load - library - VERSION.DLL
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\c397065e107a81085ae48173f6205e53.bin
- load - library - kernel32
- load - library - user32
- load - library - ntdll
- load - library - ntdll
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- VirtualProtectEx
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegCreateKeyExW
- RegSetValueExW
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- LdrLoadDll
Filesystem API calls used
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.8
- 192.168.30.8 >> 192.168.30.255
TCP source >> destination - 192.168.30.8 >> 192.168.30.254
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 1
|