BehavesLike.A_652 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.
Mutexes created
Directory level activity- create - dir - C:\WINDOWS
File level activity- delete - file - __tmp_rar_sfx_access_check_11323472
- delete - file - eee.exe
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\WinRAR SFXC%%WINDOWS
Library level activity- load - library - KERNEL32.DLL
- load - library - KERNEL32
- load - library - kernel32
- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - riched32.dll
- load - library - riched20.dll
- load - library - OLE32.DLL
- load - library - ole32.dll
- load - library - UxTheme.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\beb8a27fc024962e045c32aa58d07d0e.bin
- load - library - CLBCATQ.DLL
- load - library - C:\WINDOWS\system32\browseui.dll
- load - library - UxTheme.dll
Process API calls used
- ZwMapViewOfSection
- NtFreeVirtualMemory
- NtOpenSection
- NtFreeVirtualMemory
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- NtQueryKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegCreateKeyExW
- RegSetValueExW
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrGetProcedureAddress
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtSetInformationFile
- NtReadFile
- NtOpenFile
- CreateDirectoryW
- DeleteFileW
- FindFirstFileExW
- FindFirstFileExW
Network
UDP source >> destination - 192.168.30.3 >> 192.168.30.255
TCP source >> destination
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 10
- COMCTL32.dll
- SHLWAPI.dll
- KERNEL32.dll
- USER32.dll
- GDI32.dll
- COMDLG32.dll
- ADVAPI32.dll
- SHELL32.dll
- ole32.dll
- OLEAUT32.dll
|