Downloader.A_2211 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity
File level activity- write - file - C:\WINDOWS\system32\d3d8caps.tmp
- delete - file - C:\WINDOWS\system32\d3d8caps.dat
- delete - file - C:\Users\Owner\AppData\Local\Temp\Temp1_Secure Message.zip\Secure Message.scr
- write - file - C:\WINDOWS\system32\d3d8caps.dat
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\pdfmarks.exe
- write - file - PIPE\wkssvc
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersLocal AppData
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersPersonal
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c062-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c060-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon Documents
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersDesktop
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon Desktop
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoamMUICacheC:\DOCUME~1\TestMachine\LOCALS~1\Temp\pdfmarks.exe
Library level activity- load - library - d3d8.dll
- load - library - kernel32.dll
- load - library - USER32
- load - library - KERNEL32
- load - library - VBoxDisp.dll
- load - library - d3d8thk.dll
- load - library - KERNEL32.dll
- load - library - USER32.dll
- load - library - SHELL32.dll
- load - library - WININET.dll
- load - library - SHELL32.DLL
- load - library - Kernel32
- load - library - ole32.dll
- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - netapi32
- load - library - OLE32.DLL
- load - library - C:\WINDOWS\system32\SHELL32.dll
- load - library - SETUPAPI.dll
- load - library - CLBCATQ.DLL
- load - library - KERNEL32.DLL
- load - library - C:\WINDOWS\system32\urlmon.dll
- load - library - Secur32.dll
- load - library - kernel32
- load - library - shell32.dll
- load - library - userenv
- load - library - VERSION.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\pdfmarks.exe
- load - library - browseui.dll
Process API calls used
- NtCreateSection
- ZwMapViewOfSection
- VirtualProtectEx
- NtFreeVirtualMemory
Registry API calls used
- RegOpenKeyExA
- RegQueryValueExA
- RegCloseKey
- RegCloseKey
System API calls used
- LdrLoadDll
- LdrGetProcedureAddress
- LdrGetDllHandle
- NtDelayExecution
- NtDelayExecution
Filesystem API calls used
- NtCreateFile
- NtReadFile
- NtSetInformationFile
- NtQueryInformationFile
- NtWriteFile
- DeleteFileA
- MoveFileWithProgressW
- DeleteFileW
- DeleteFileW
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.255
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 1
|