SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  AdaCovid.RSM
MalAgent.H_16059 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

Mutexes created
  • ShimCacheMutex


Directory level activity
  • create - dir - C:\DOCUME~1
  • create - dir - C:\DOCUME~1\TestMachine
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0
  • delete - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX1
  • delete - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX1


File level activity
  • delete - file - __tmp_rar_sfx_access_check_30167380
  • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0\fud.bat
  • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0\server.sfx.exe
  • write - file - PIPE\srvsvc
  • delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0\fud.bat
  • delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0\server.sfx.exe
  • delete - file - __tmp_rar_sfx_access_check_30168532
  • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX1\server.exe
  • delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX1\server.exe
  • write - file - PIPE\srvsvc


Registry level activity
  • write - registry - HKEY_CURRENT_USER\Software\WinRAR SFXC%%DOCUME~1%TestMachine%LOCALS~1%Temp
  • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached{67EA19A0-CCEF-11D0-8024-00C04FD75D13} {00000000-0000-0000-C000-000000000046} 0x401
  • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached{ECF03A33-103D-11D2-854D-006008059367} {00000000-0000-0000-C000-000000000046} 0x401
  • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {00000000-0000-0000-C000-000000000046} 0x401


Library level activity
  • load - library - kernel32
  • load - library - C:\WINDOWS\system32\rpcss.dll
  • load - library - C:\WINDOWS\system32\uxtheme.dll
  • load - library - uxtheme.dll
  • load - library - riched32.dll
  • load - library - riched20.dll
  • load - library - OLE32.DLL
  • load - library - ole32.dll
  • load - library - UxTheme.dll
  • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\1101fcfe2845b3189c13f80ce75ff562.bin
  • load - library - CLBCATQ.DLL
  • load - library - KERNEL32.DLL
  • load - library - C:\WINDOWS\system32\browseui.dll
  • load - library - appHelp.dll
  • load - library - shdocvw.dll
  • load - library - C:\WINDOWS\system32\shdocvw.dll
  • load - library - EXPLORER.EXE
  • load - library - shell32.dll
  • load - library - mydocs.dll
  • load - library - C:\WINDOWS\system32\mydocs.dll
  • load - library - ntshrui.dll
  • load - library - USERENV.dll
  • load - library - SHELL32
  • load - library - ADVAPI32.dll
  • load - library - advapi32
  • load - library - mscoree.dll
  • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RarSFX0\server.sfx.exe
  • load - library - Kernel32
  • load - library - mscoree.dll


Process API calls used
  • ZwMapViewOfSection
  • NtFreeVirtualMemory
  • ShellExecuteExW
  • NtOpenSection
  • NtCreateSection
  • ExitProcess


Registry API calls used
  • NtOpenKey
  • NtQueryValueKey
  • NtQueryKey
  • RegOpenKeyExA
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegCloseKey
  • RegCreateKeyExW
  • RegSetValueExW
  • RegEnumKeyW
  • RegCloseKey


System API calls used
  • LdrGetDllHandle
  • LdrGetProcedureAddress
  • LdrLoadDll
  • IsDebuggerPresent
  • NtDelayExecution
  • LdrGetDllHandle


Filesystem API calls used
  • NtCreateFile
  • NtQueryInformationFile
  • NtSetInformationFile
  • NtReadFile
  • NtOpenFile
  • CreateDirectoryW
  • DeleteFileW
  • FindFirstFileExW
  • NtWriteFile
  • NtQueryDirectoryFile
  • RemoveDirectoryW

Network

UDP source >> destination
  • 192.168.30.254 >> 192.168.30.8
  • 192.168.30.8 >> 192.168.30.255


TCP source >> destination
  • 192.168.30.8 >> 192.168.30.254



Domains:
  • NA

DNS Request:
  • NA

HTTP Request:
  • NA

DLL related data
Number of DLL's imported = 10
  • COMCTL32.dll
  • SHLWAPI.dll
  • KERNEL32.dll
  • USER32.dll
  • GDI32.dll
  • COMDLG32.dll
  • ADVAPI32.dll
  • SHELL32.dll
  • ole32.dll
  • OLEAUT32.dll


Relevant Information