Pay2Decrypt.RSM_2 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity- create - dir - C:\Documents and Settings\TestMachine\Local Settings\Temp\1.tmp
- create - dir - C:\Documents and Settings\TestMachine\Local Settings\Temp\1.tmp\2.tmp
File level activity- delete - file - C:\Documents and Settings\TestMachine\Local Settings\Temp\1.tmp
- delete - file - C:\Documents and Settings\TestMachine\Local Settings\Temp\1.tmp\2.tmp
- delete - file - C:\Documents and Settings\TestMachine\Local Settings\Temp\1.tmp\2.tmp\3.tmp
- write - file - C:\Documents and Settings\TestMachine\Local Settings\Temp\1.tmp\2.tmp\3.bat
Registry level activity
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - Kernel32.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\0bb75ac244094b5a97e621b7912fad5d.bin
- load - library - Kernel32.DLL
- load - library - KERNEL32.DLL
- load - library - ADVAPI32.dll
- load - library - advapi32
- load - library - SHELL32.dll
- load - library - mscoree.dll
Process API calls used
- ZwMapViewOfSection
- ShellExecuteExW
Registry API calls used
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- NtDelayExecution
Filesystem API calls used
- FindFirstFileExW
- NtCreateFile
- DeleteFileW
- CreateDirectoryW
- NtOpenFile
- NtQueryInformationFile
- NtSetInformationFile
- NtWriteFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.255
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 9
- MSVCRT.dll
- KERNEL32.dll
- USER32.DLL
- GDI32.DLL
- COMCTL32.DLL
- SHELL32.DLL
- WINMM.DLL
- OLE32.DLL
- SHLWAPI.DLL
|