SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Virut.A_1115
Virut.A_1115 is a polymorphic file infector virus that target Microsoft Windows operating systems. It is known to infect files with .exe and .scr extensions on local drives, removable media, and network shares.

File Related Changes
It drops the following file(s) on the system:
  • "C:\WINDOWS\Prefetch\NTOSBOOT-B00DFAAD.pf"

Process Related Changes
It creates the following mutex(es):
  • eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • MPSWabDataAccessMutex"
  • c:!documents and settings!admin!local settings!history!history.ie5!"
  • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • MPSWABOlkStoreNotifyMutex"
  • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • MSCTF.Shared.MUTEX.MPC"
  • SHIMLIB_LOG_MUTEX"
  • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
  • shqq"
  • MSIdent Logon"
  • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CONF.EXE"
  • c:!documents and settings!admin!cookies!"

It creates the following process(es):
  • C:\WINDOWS\system32\rundll32.exe
  • C:\PROGRA1\NETMEE1\conf.exe
  • C:\WINDOWS\Temp\aa42e9928cd9964db6d2db8900e3f77a.exe [ \c:\windows\temp\aa42e9928cd9964db6d2db8900e3f77a.exe ]

It injects malicious code into the following process(es):
  • "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"
  • "C:\WINDOWS\system32\svchost.exe"
  • "C:\WINDOWS\system32\tlntsrv.exe"
  • "C:\WINDOWS\system32\winlogon.exe"
  • "C:\WINDOWS\system32\rundll32.exe"
  • "C:\PROGRA1\NETMEE1\conf.exe"
  • "C:\WINDOWS\system32\ctfmon.exe"
  • "C:\WINDOWS\system32\wbem\wmiprvse.exe"
  • "C:\WINDOWS\explorer.exe"
  • "C:\WINDOWS\system32\services.exe"
  • "C:\WINDOWS\system32\alg.exe"
  • "C:\WINDOWS\system32\lsass.exe"
  • "C:\Program Files\Java\jre6\bin\jqs.exe"
  • "C:\WINDOWS\system32\spoolsv.exe"

Network Activity
We observed the following DNS query/queries:
  • sys.zief.pl

It attempts to connect to the following remote servers:
  • 148.81.xxxxxx:65520
  • 127.xxxxxx:1030

Registry Related Changes
It makes the following registry modifications to ensure infection after system reboot:
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Runonce\= g
  • HKLM\system\CurrentControlSet\Services\= g
  • HKLM\system\CurrentControlSet\Services\sharedaccess\epoch\= g
  • HKLM\software\microsoft\windowsnt\currentversion\drivers32\= g
  • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= g


Relevant Information