MalAgent.H_18034 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
- _!MSFTHISTORY!_
- c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
- c:!documents and settings!soumy!cookies!
- c:!documents and settings!soumy!local settings!history!history.ie5!
- WininetStartupMutex
- WininetConnectionMutex
- WininetProxyRegistryMutex
Directory level activity
File level activity- write - file - C:\Documents and Settings\TestMachine\Application Data\omsecor.exe
- write - file - PIPE\lsarpc
- write - file - C:\WINDOWS\System32\omsecor.exe
- write - file - PIPE\lsarpc
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsMigrateProxy
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
Library level activity- load - library - Secur32.dll
- load - library - shell32.dll
- load - library - KERNEL32
- load - library - rnaapp.exe
- load - library - RASAPI32.DLL
- load - library - RTUTILS.DLL
- load - library - sensapi.dll
- load - library - ntdll.dll
- load - library - SHELL32.dll
- load - library - USERENV.dll
- load - library - netapi32.dll
- load - library - netapi32.dll
Process API calls used
- CreateProcessInternalW
- ExitProcess
Registry API calls used
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegCloseKey
System API calls used
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtReadFile
- NtWriteFile
- NtSetInformationFile
- NtWriteFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 192.168.30.255
- 192.168.30.6 >> 8.8.8.8
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 193.166.255.171
- 192.168.30.6 >> 35.205.61.67
- 192.168.30.6 >> 64.225.91.73
Domains:- lousta.net with IP - 193.166.255.171
- mkkuei4kdsz.com with IP - 64.225.91.73
- ow5dirasuek.com with IP - 35.205.61.67
DNS Request:- mkkuei4kdsz.com
- lousta.net
- ow5dirasuek.com
HTTP Request:- GET URI - http://lousta.net/166/899.html
- GET URI - http://lousta.net/956/914.html
- GET URI - http://mkkuei4kdsz.com/887/254.html
- GET URI - http://lousta.net/125/372.html
- GET URI - http://lousta.net/502/789.html
- GET URI - http://ow5dirasuek.com/672/295.html
- GET URI - http://lousta.net/780/323.html
- GET URI - http://mkkuei4kdsz.com/408/389.html
- GET URI - http://mkkuei4kdsz.com/880/254.html
- GET URI - http://lousta.net/671/247.html
- GET URI - http://lousta.net/199/382.html
- GET URI - http://ow5dirasuek.com/114/232.html
- GET URI - http://lousta.net/854/146.html
- GET URI - http://mkkuei4kdsz.com/682/596.html
- GET URI - http://ow5dirasuek.com/114/1
- GET URI - http://lousta.net/294/831.html
- GET URI - http://lousta.net/628/883.html
- GET URI - http://ow5dirasuek.com/672/1
DLL related data Number of DLL's imported = 0
|