SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Virlock.A_757
Virlock.A_757 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources.

      Process Related Changes
      It creates the following mutex(es):
      • c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
      • ZonesLockedCacheCounterMutex"
      • c:!documents and settings!admin!local settings!history!history.ie5!"
      • WininetConnectionMutex"
      • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • ZoneAttributeCacheCounterMutex"
      • AmInst__Runing_1"
      • ZonesCacheCounterMutex"
      • ZonesCounterMutex"
      • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • MSCTF.Shared.MUTEX.EOF"
      • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • !PrivacIE!SharedMemory!Mutex"
      • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • MSCTF.Shared.MUTEX.ELH"
      • c:!documents and settings!admin!cookies!"

      It creates the following process(es):
      • C:\WINDOWS\Temp\41a0dcc4ab4f45616c743187c1204fa1.exe [ \c:\windows\temp\41a0dcc4ab4f45616c743187c1204fa1.exe ]

      Network Activity
      We observed the following DNS query/queries:
      • www.secularistsarakolet.site

      It attempts to connect to the following remote servers:
      • 127.xxxxxx:1029

      Registry Related Changes
      It makes the following registry modifications to ensure infection after system reboot:
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= C:\WINDOWS\system32\ESENT.dll
      • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= _Special_Characters_
      • HKU\s-1-5-21-1078081533-842925246-854245398-1003\software\microsoft\internetexplorer\services\= _Special_Characters_
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= _Special_Characters_
      • HKLM\software\microsoft\internetexplorer\services\= _Special_Characters_
      • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= C:\WINDOWS\system32\ESENT.dll
      • HKU\s-1-5-21-1078081533-842925246-854245398-1003\software\microsoft\internetexplorer\services\= C:\WINDOWS\system32\ESENT.dll
      • HKLM\software\microsoft\internetexplorer\services\= C:\WINDOWS\system32\ESENT.dll


      Relevant Information