SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  MalAgent.J_60279
MalAgent.J_60279 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

Mutexes created
  • Nothing to report


Directory level activity
    • Nothing to report


    File level activity
      • Nothing to report


      Registry level activity
        • Nothing to report


        Library level activity
        • load - library - C:\WINDOWS\system32\rpcss.dll
        • load - library - C:\WINDOWS\system32\uxtheme.dll
        • load - library - uxtheme.dll
        • load - library - OLEAUT32.DLL
        • load - library - oleaut32.dll
        • load - library - ole32.dll
        • load - library - SXS.DLL
        • load - library - USER32
        • load - library - user32
        • load - library - SHELL32.DLL
        • load - library - kernel32
        • load - library - ntdll
        • load - library - IPHlpApi
        • load - library - shell32
        • load - library - C:\WINDOWS\system32\faultrep.dll
        • load - library - C:\Documents and Settings\TestMachine\Local Settings\Temp\9a4a016675a9c710ec07f060e28b7e11.bin
        • load - library - C:\WINDOWS\system32\kernel32.dll
        • load - library - ddraw.dll
        • load - library - d3d8.dll
        • load - library - d3d9.dll
        • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\9a4a016675a9c710ec07f060e28b7e11.bin
        • load - library - C:\WINDOWS\system32\apphelp.dll
        • load - library - USER32.dll
        • load - library - SHLWAPI.dll
        • load - library - VERSION.dll
        • load - library - C:\WINDOWS\system32\kernel32.dll


        Process API calls used
        • ZwMapViewOfSection
        • VirtualProtectEx
        • NtFreeVirtualMemory
        • NtProtectVirtualMemory
        • CreateProcessInternalW


        Registry API calls used
        • NtOpenKey
        • NtQueryValueKey
        • RegOpenKeyExA
        • RegQueryValueExW
        • RegQueryValueExA
        • RegCloseKey
        • RegOpenKeyExW
        • RegCreateKeyExW
        • RegDeleteKeyW
        • RegQueryValueExW


        System API calls used
        • LdrGetDllHandle
        • LdrLoadDll
        • IsDebuggerPresent
        • LdrGetProcedureAddress
        • SetWindowsHookExA
        • LdrGetProcedureAddress


        Filesystem API calls used
        • FindFirstFileExW
        • FindFirstFileExW

        Network

        UDP source >> destination
        • 192.168.30.4 >> 192.168.30.255


        TCP source >> destination



          Domains:
          • NA

          DNS Request:
          • NA

          HTTP Request:
          • NA

          DLL related data
          Number of DLL's imported = 1
          • MSVBVM60.DLL


          Relevant Information