Small.A_356 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.
Mutexes created
Directory level activity
File level activity- write - file - PIPE\lsarpc
- write - file - C:\Python27\Lib\distutils\command\wininst-6.0.exe
- write - file - C:\Python27\Lib\distutils\command\wininst-7.1.exe
- write - file - C:\Python27\Lib\distutils\command\wininst-8.0.exe
- write - file - C:\Python27\Lib\distutils\command\wininst-9.0.exe
- write - file - C:\Python27\Lib\site-packages\pip\_vendor\distlib\t32.exe
- write - file - C:\Python27\Lib\site-packages\pip\_vendor\distlib\w32.exe
- write - file - C:\Python27\Lib\site-packages\setuptools\cli-32.exe
- write - file - C:\Python27\Lib\site-packages\setuptools\cli.exe
- write - file - C:\Python27\Lib\site-packages\setuptools\gui-32.exe
- write - file - C:\Python27\Lib\site-packages\setuptools\gui.exe
- write - file - C:\Python27\python.exe
- write - file - C:\Python27\RemovePIL.exe
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\6CE75118.exe
- write - file - C:\Python27\w9xpopen.exe
- write - file - C:\xaadmjfakm\PIN\ia32\pin.exe
- write - file - C:\xaadmjfakm\PIN\ia32\pindb.exe
- delete - file - C:\WINDOWS\system32\c_31892.nls
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\6fc322e3.exe
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\48836800.exe
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\0D875BE6.exe
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\528B4FCC.exe
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\22153BB8.exe
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\67192f9e.bat
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\56b2c3810dba2e939a8bb9fa36d3cf96.bin
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\67192f9e.bat
Registry level activity- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsMigrateProxy
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsDefaultConnectionSettings
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- write - registry - HKEY_LOCAL_MACHINE\SOFTWARE\GTplusTime
Library level activity- load - library - kernel32.dll
- load - library - MSVCRT.dll
- load - library - SHLWAPI.dll
- load - library - urlmon.dll
- load - library - KERNEL32.dll
- load - library - USER32.dll
- load - library - ADVAPI32.dll
- load - library - SHELL32.dll
- load - library - ntdll.dll
- load - library - RASAPI32.DLL
- load - library - RTUTILS.DLL
- load - library - sensapi.dll
- load - library - USERENV.dll
- load - library - netapi32.dll
- load - library - C:\WINDOWS\System32\mswsock.dll
- load - library - rasadhlp.dll
- load - library - NTDLL.DLL
- load - library - IPHLPAPI.DLL
- load - library - KERNEL32.DLL
- load - library - advapi32
- load - library - mscoree.dll
Process API calls used
- NtFreeVirtualMemory
- VirtualProtectEx
- NtOpenSection
- ZwMapViewOfSection
- NtCreateSection
- ShellExecuteExW
- ExitProcess
Registry API calls used
- RegOpenKeyExA
- RegCreateKeyExA
- RegQueryValueExA
- RegCloseKey
- RegOpenKeyExW
- RegCreateKeyExW
- RegQueryValueExW
- RegQueryInfoKeyW
- RegEnumValueW
- NtOpenKey
- NtQueryValueKey
- RegSetValueExW
- RegSetValueExA
- RegEnumKeyExA
- RegDeleteValueA
- RegQueryInfoKeyA
- RegEnumKeyExW
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrGetProcedureAddress
- LookupPrivilegeValueW
- NtDelayExecution
- LdrLoadDll
- NtDelayExecution
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtReadFile
- FindFirstFileExW
- NtQueryDirectoryFile
- NtOpenFile
- NtSetInformationFile
- NtDeviceIoControlFile
- NtWriteFile
- CopyFileA
- DeleteFileA
- NtWriteFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.3
- 192.168.30.3 >> 192.168.30.254
- 192.168.30.3 >> 192.168.30.255
- 192.168.30.3 >> 8.8.8.8
TCP source >> destination - 192.168.30.3 >> 192.168.30.254
Domains:- ddos.dnsnb8.net with IP -
DNS Request: HTTP Request: DLL related data Number of DLL's imported = 7
- kernel32.dll
- msvcrt.dll
- shlwapi.dll
- urlmon.dll
- user32.dll
- advapi32.dll
- shell32.dll
|