SoftPulse.AHPO_19 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers. Process Related Changes It creates the following mutex(es): - CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
- ZonesLockedCacheCounterMutex"
- DDrawWindowListMutex"
- CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- DDrawDriverObjectListMutex"
- !PrivacIE!SharedMemory!Mutex"
- CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- c:!documents and settings!admin!cookies!"
- c:!documents and settings!admin!local settings!history!history.ie5!"
- __DDrawCheckExclMode__"
- WininetConnectionMutex"
- c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
- DBWinMutex"
- CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- ZonesCounterMutex"
- c:!documents and settings!admin!ietldcache!"
- MSCTF.Shared.MUTEX.ACD"
- ZoneAttributeCacheCounterMutex"
- ZonesCacheCounterMutex"
- CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- __DDrawExclMode__"
It creates the following process(es): - C:\WINDOWS\Temp\3bbd9bcda5938595bf92933f2ebe2df8.exe [ \c:\windows\temp\3bbd9bcda5938595bf92933f2ebe2df8.exe ]
Network Activity We observed the following DNS query/queries: - g.symcb.com
- pki.google.com
- api.promagno.com
- crl.geotrust.com
- ssl.google-analytics.com
It attempts to connect to the following remote servers: Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= C:\WINDOWS\system32\ESENT.dll
- HKLM\software\microsoft\internetexplorer\services\= _Special_Characters_
- HKU\s-1-5-21-1078081533-842925246-854245398-1003\software\microsoft\internetexplorer\services\= _Special_Characters_
- HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= _Special_Characters_
- HKLM\software\microsoft\internetexplorer\services\= C:\WINDOWS\system32\ESENT.dll
- HKU\s-1-5-21-1078081533-842925246-854245398-1003\software\microsoft\internetexplorer\services\= C:\WINDOWS\system32\ESENT.dll
|