SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  MalAgent.H_18034
MalAgent.H_18034 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive

Mutexes created
  • _!MSFTHISTORY!_
  • c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
  • c:!documents and settings!soumy!cookies!
  • c:!documents and settings!soumy!local settings!history!history.ie5!
  • WininetStartupMutex
  • WininetConnectionMutex
  • WininetProxyRegistryMutex


Directory level activity
    • Nothing to report


    File level activity
    • write - file - C:\Documents and Settings\TestMachine\Application Data\omsecor.exe
    • write - file - PIPE\lsarpc
    • write - file - C:\WINDOWS\System32\omsecor.exe
    • write - file - PIPE\lsarpc


    Registry level activity
    • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
    • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
    • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppData
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsMigrateProxy
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
    • write - registry - HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings


    Library level activity
    • load - library - Secur32.dll
    • load - library - shell32.dll
    • load - library - KERNEL32
    • load - library - rnaapp.exe
    • load - library - RASAPI32.DLL
    • load - library - RTUTILS.DLL
    • load - library - sensapi.dll
    • load - library - ntdll.dll
    • load - library - SHELL32.dll
    • load - library - USERENV.dll
    • load - library - netapi32.dll
    • load - library - netapi32.dll


    Process API calls used
    • CreateProcessInternalW
    • ExitProcess


    Registry API calls used
    • RegOpenKeyExW
    • RegQueryValueExW
    • RegCloseKey
    • RegCloseKey


    System API calls used
      • Nothing to report


      Filesystem API calls used
      • NtCreateFile
      • NtQueryInformationFile
      • NtReadFile
      • NtWriteFile
      • NtSetInformationFile
      • NtWriteFile

      Network

      UDP source >> destination
      • 192.168.30.254 >> 192.168.30.6
      • 192.168.30.6 >> 192.168.30.254
      • 192.168.30.6 >> 192.168.30.255
      • 192.168.30.6 >> 8.8.8.8


      TCP source >> destination
      • 192.168.30.6 >> 192.168.30.254
      • 192.168.30.6 >> 193.166.255.171
      • 192.168.30.6 >> 35.205.61.67
      • 192.168.30.6 >> 64.225.91.73



      Domains:
      • lousta.net with IP - 193.166.255.171
      • mkkuei4kdsz.com with IP - 64.225.91.73
      • ow5dirasuek.com with IP - 35.205.61.67

      DNS Request:
      • mkkuei4kdsz.com
      • lousta.net
      • ow5dirasuek.com

      HTTP Request:
      • GET URI - http://lousta.net/166/899.html
      • GET URI - http://lousta.net/956/914.html
      • GET URI - http://mkkuei4kdsz.com/887/254.html
      • GET URI - http://lousta.net/125/372.html
      • GET URI - http://lousta.net/502/789.html
      • GET URI - http://ow5dirasuek.com/672/295.html
      • GET URI - http://lousta.net/780/323.html
      • GET URI - http://mkkuei4kdsz.com/408/389.html
      • GET URI - http://mkkuei4kdsz.com/880/254.html
      • GET URI - http://lousta.net/671/247.html
      • GET URI - http://lousta.net/199/382.html
      • GET URI - http://ow5dirasuek.com/114/232.html
      • GET URI - http://lousta.net/854/146.html
      • GET URI - http://mkkuei4kdsz.com/682/596.html
      • GET URI - http://ow5dirasuek.com/114/1
      • GET URI - http://lousta.net/294/831.html
      • GET URI - http://lousta.net/628/883.html
      • GET URI - http://ow5dirasuek.com/672/1

      DLL related data
      Number of DLL's imported = 0
      • Nothing to report


      Relevant Information