SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  SoftPulse.AHPO_19
SoftPulse.AHPO_19 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

      Process Related Changes
      It creates the following mutex(es):
      • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • ZonesLockedCacheCounterMutex"
      • DDrawWindowListMutex"
      • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • DDrawDriverObjectListMutex"
      • !PrivacIE!SharedMemory!Mutex"
      • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • c:!documents and settings!admin!cookies!"
      • c:!documents and settings!admin!local settings!history!history.ie5!"
      • __DDrawCheckExclMode__"
      • WininetConnectionMutex"
      • c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
      • DBWinMutex"
      • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • ZonesCounterMutex"
      • c:!documents and settings!admin!ietldcache!"
      • MSCTF.Shared.MUTEX.ACD"
      • ZoneAttributeCacheCounterMutex"
      • ZonesCacheCounterMutex"
      • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • __DDrawExclMode__"

      It creates the following process(es):
      • C:\WINDOWS\Temp\3bbd9bcda5938595bf92933f2ebe2df8.exe [ \c:\windows\temp\3bbd9bcda5938595bf92933f2ebe2df8.exe ]

      Network Activity
      We observed the following DNS query/queries:
      • g.symcb.com
      • pki.google.com
      • api.promagno.com
      • crl.geotrust.com
      • ssl.google-analytics.com

      It attempts to connect to the following remote servers:
      • 127.xxxxxx:1042

      Registry Related Changes
      It makes the following registry modifications to ensure infection after system reboot:
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= C:\WINDOWS\system32\ESENT.dll
      • HKLM\software\microsoft\internetexplorer\services\= _Special_Characters_
      • HKU\s-1-5-21-1078081533-842925246-854245398-1003\software\microsoft\internetexplorer\services\= _Special_Characters_
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= _Special_Characters_
      • HKLM\software\microsoft\internetexplorer\services\= C:\WINDOWS\system32\ESENT.dll
      • HKU\s-1-5-21-1078081533-842925246-854245398-1003\software\microsoft\internetexplorer\services\= C:\WINDOWS\system32\ESENT.dll


      Relevant Information