Kryptik.NIG is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers. File Related Changes It drops the following file(s) on the system: - "C:\Documents and Settings\Admin\Application Data\explotersd.exe"
- "C:\Documents and Settings\Admin\Local Settings\Temp\man 217.exeman 217.exe"
Process Related Changes It creates the following mutex(es): - .net clr networking"
- SHIMLIB_LOG_MUTEX"
- c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
- ZonesLockedCacheCounterMutex"
- c:!documents and settings!admin!local settings!history!history.ie5!"
- GXohtanVbiTUKBqhKZKNwjZDREFmJ"
- CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- ZoneAttributeCacheCounterMutex"
- ZonesCacheCounterMutex"
- ZonesCounterMutex"
- CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- c:!documents and settings!admin!cookies!"
It creates the following process(es): - C:\WINDOWS\Temp\6248b43e6620ed4415d4104f41bf26eb.exe [ \c:\windows\temp\6248b43e6620ed4415d4104f41bf26eb.exe ]
- C:\WINDOWS\Temp\6248b43e6620ed4415d4104f41bf26eb.exe [ \c:\windows\temp\6248b43e6620ed4415d4104f41bf26eb.exe ]
- C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- C:\DOCUME1\Admin\LOCALS1\Temp\man 217.exeman 217.exe
- C:\WINDOWS\system32\schtasks.exe
It injects malicious code into the following process(es): - "C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
- "C:\DOCUME1\Admin\LOCALS1\Temp\man 217.exeman 217.exe"
Network Activity We observed the following DNS query/queries: - whatismyipaddress.com
- mail.tonysizzo.com
- checkip.dyndns.org
Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= C:\WINDOWS\system32\ESENT.dll
- HKLM\system\CurrentControlSet\Services\tcpip\parameters\= _Special_Characters_
- HKLM\software\microsoft\windowsnt\currentversion\drivers32\= _Special_Characters_
- HKLM\software\microsoft\windowsnt\currentversion\drivers32\= C:\WINDOWS\system32\ESENT.dll
- HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= _Special_Characters_
- HKLM\system\CurrentControlSet\Services\tcpip\parameters\= C:\WINDOWS\system32\ESENT.dll
|