MalAgent.H_18009 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity
File level activity- write - file - C:\Documents and Settings\TestMachine\hebav.exe
- write - file - PIPE\lsarpc
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\7cf8_appcompat.txt
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\7cf8_appcompat.txt
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\hebav
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - C:\WINDOWS\system32\kernel32.dll
- load - library - kernel32.dll
- load - library - C:\WINDOWS\system32\MSVBVM60.DLL
- load - library - kernel32
- load - library - shell32
- load - library - USERENV.dll
- load - library - advapi32
- load - library - Secur32.dll
- load - library - user32
- load - library - wsock32
- load - library - C:\WINDOWS\system32\faultrep.dll
- load - library - C:\Documents and Settings\TestMachine\Local Settings\Temp\c41c9c8b2c880201ea877a3a88d9f05c.bin
- load - library - ddraw.dll
- load - library - d3d8.dll
- load - library - d3d9.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\c41c9c8b2c880201ea877a3a88d9f05c.bin
- load - library - C:\WINDOWS\system32\apphelp.dll
- load - library - USER32.dll
- load - library - SHLWAPI.dll
- load - library - VERSION.dll
- load - library - C:\WINDOWS\system32\msvbvm60.dll
- load - library - advapi32
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- NtFreeVirtualMemory
- NtCreateSection
- ShellExecuteExW
- CreateProcessInternalW
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegCreateKeyExW
- RegDeleteKeyW
- RegQueryValueExW
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- NtDelayExecution
- LdrLoadDll
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtSetInformationFile
- NtReadFile
- NtWriteFile
- NtOpenFile
- FindFirstFileExW
- NtOpenDirectoryObject
- NtQueryDirectoryFile
- NtWriteFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 192.168.30.255
- 192.168.30.6 >> 8.8.8.8
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains:- ns2.thepicturehut.net with IP -
DNS Request: HTTP Request: DLL related data Number of DLL's imported = 1
|