Injector.AJAR is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious way. Trojans do not replicate or spread to other computers. File Related Changes It drops the following file(s) on the system: - "c:\Users\Admin\AppData\Roaming\Vldsdn.exe"
It modifies the following additional file(s) on the system: - "c:\Windows\System32\inetsrv\History\MetaBase_0000000024_0000000000.xml"
- "c:\Windows\System32\inetsrv\MetaBase.xml.tmp"
- "c:\Windows\System32\inetsrv\History\MBSchema_0000000024_0000000000.xml"
Process Related Changes It creates the following mutex(es): - "e621ca05-Mutex"
- "IESQMMUTEX_0_208"
- "FvLQ49IlzIyLjj6m"
It injects malicious code into the following process(es): - "C:\Windows\system32\UI0Detect.exe"
- "C:\Windows\system32\nfsclnt.exe"
- "C:\Windows\system32\Dwm.exe"
- "C:\Windows\system32\psxss.exe"
- "C:\Windows\System32\tcpsvcs.exe"
- "C:\Windows\system32\SearchFilterHost.exe"
- "c:\windows\system32\tlntsrv.exe"
- "C:\Windows\system32\wininit.exe"
- "C:\Windows\system32\SearchProtocolHost.exe"
- "C:\Windows\System32\spoolsv.exe"
- "C:\Windows\System32\mobsync.exe"
- "C:\Windows\system32\taskhost.exe"
- "C:\Windows\system32\csrss.exe"
- "C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe"
- "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"
- "C:\Windows\system32\SearchIndexer.exe"
- "C:\Windows\system32\inetsrv\inetinfo.exe"
- "C:\Windows\system32\lsm.exe"
Network Activity We observed the following DNS query/queries: - api.wipmania.com
- wireless-work.su
- gigasbh.org
Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKCU\Software\Microsoft\Windows\CurrentVersion\Run\vldsdn = C:\Users\Admin\AppData\Roaming\Vldsdn.exe
|