SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Chapak.N
Chapak.N is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

Mutexes created
  • Global\{A2BBD235-8D0F-42CD-81A3-89A4E9EE96E7}


Directory level activity
    • Nothing to report


    File level activity
    • write - file - PIPE\lsarpc


    Registry level activity
      • Nothing to report


      Library level activity
      • load - library - KERNEL32.DLL
      • load - library - kernel32.dll
      • load - library - KERNEL32.dll
      • load - library - USER32.dll
      • load - library - ADVAPI32.dll
      • load - library - SHELL32.dll
      • load - library - ole32.dll
      • load - library - OLEAUT32.dll
      • load - library - MPR.dll
      • load - library - NETAPI32.dll
      • load - library - IPHLPAPI.DLL
      • load - library - WS2_32.dll
      • load - library - RstrtMgr.DLL
      • load - library - CRYPT32.dll
      • load - library - WININET.dll
      • load - library - msvcr100.dll
      • load - library - api-ms-win-core-synch-l1-2-0
      • load - library - kernel32
      • load - library - api-ms-win-core-fibers-l1-1-1
      • load - library - api-ms-win-core-localization-l1-2-1
      • load - library - api-ms-win-core-synch-l1-2-0.dll
      • load - library - api-ms-win-core-string-l1-1-0
      • load - library - api-ms-win-core-datetime-l1-1-1
      • load - library - api-ms-win-core-localization-obsolete-l1-2-0
      • load - library - api-ms-win-core-sysinfo-l1-2-1
      • load - library - C:\WINDOWS\system32\rpcss.dll
      • load - library - C:\WINDOWS\system32\winlogon.exe
      • load - library - xpsp2res.dll


      Process API calls used
      • VirtualProtectEx
      • NtCreateSection
      • ZwMapViewOfSection
      • NtFreeVirtualMemory


      Registry API calls used
      • NtOpenKey
      • NtQueryValueKey
      • RegOpenKeyExW
      • RegQueryValueExW
      • RegCloseKey
      • NtQueryValueKey


      System API calls used
      • LdrGetDllHandle
      • LdrGetProcedureAddress
      • LdrLoadDll
      • IsDebuggerPresent


      Filesystem API calls used
      • NtOpenFile
      • NtQueryInformationFile
      • NtCreateFile
      • NtSetInformationFile
      • NtWriteFile
      • NtReadFile

      Network

      UDP source >> destination
      • 192.168.30.254 >> 192.168.30.3
      • 192.168.30.3 >> 192.168.30.255


      TCP source >> destination
      • 192.168.30.3 >> 192.168.30.254



      Domains:
      • NA

      DNS Request:
      • NA

      HTTP Request:
      • NA

      DLL related data
      Number of DLL's imported = 4
      • KERNEL32.dll
      • USER32.dll
      • ADVAPI32.dll
      • WINHTTP.dll


      Relevant Information