SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  IRCBot.CX_3
IRCBot.CX_3 is a Worm. Worms are reproducing malicious programs that run independently and travel across network connections without human action. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities. The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Users\Admin\AppData\Roaming\afd.exe"

Process Related Changes
It creates the following mutex(es):
  • "Tcpip_Perf_Library_Lock_PID_d18"
  • ".NETFramework_Perf_Library_Lock_PID_cc4"
  • "InetInfo_Perf_Library_Lock_PID_d18"
  • "MSSCNTRS_Perf_Library_Lock_PID_d18"
  • "PerfDisk_Perf_Library_Lock_PID_d18"
  • "ISAPISearch_Perf_Library_Lock_PID_d18"
  • ".NETFramework_Perf_Library_Lock_PID_d18"
  • "rdyboost_Perf_Library_Lock_PID_d18"
  • "TapiSrv_Perf_Library_Lock_PID_d18"
  • "MSSCNTRS_Perf_Library_Lock_PID_cc4"
  • "Tcpip_Perf_Library_Lock_PID_cc4"
  • "MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "PerfProc_Perf_Library_Lock_PID_d18"
  • ".NET Data Provider for SqlServer_Perf_Library_Lock_PID_d18"
  • "RemoteAccess_Perf_Library_Lock_PID_cc4"
  • "ESENT_Perf_Library_Lock_PID_d18"
  • "RemoteAccess_Perf_Library_Lock_PID_d18"
  • "PerfProc_Perf_Library_Lock_PID_cc4"
  • "ESENT_Perf_Library_Lock_PID_cc4"
  • "UGTHRSVC_Perf_Library_Lock_PID_cc4"
  • "PerfNet_Perf_Library_Lock_PID_d18"
  • "ISAPISearch_Perf_Library_Lock_PID_cc4"
  • "ContentFilter_Perf_Library_Lock_PID_cc4"
  • "BITS_Perf_Library_Lock_PID_cc4"
  • "SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_d18"
  • "UGatherer_Perf_Library_Lock_PID_cc4"
  • "MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_d18"
  • "TermService_Perf_Library_Lock_PID_d18"
  • "PerfOS_Perf_Library_Lock_PID_d18"
  • "InetInfo_Perf_Library_Lock_PID_cc4"
  • "UGTHRSVC_Perf_Library_Lock_PID_d18"
  • "SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "Spooler_Perf_Library_Lock_PID_d18"
  • ".NET Data Provider for SqlServer_Perf_Library_Lock_PID_cc4"
  • ".NET CLR Networking_Perf_Library_Lock_PID_d18"
  • ".NET Data Provider for Oracle_Perf_Library_Lock_PID_cc4"
  • "ServiceModelService 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "ServiceModelOperation 3.0.0.0_Perf_Library_Lock_PID_d18"
  • "TapiSrv_Perf_Library_Lock_PID_cc4"
  • ".NET CLR Networking_Perf_Library_Lock_PID_cc4"
  • "BITS_Perf_Library_Lock_PID_d18"
  • "TermService_Perf_Library_Lock_PID_cc4"
  • "Lsa_Perf_Library_Lock_PID_cc4"
  • "WmiApRpl_Perf_Library_Lock_PID_d18"
  • "Windows Workflow Foundation 3.0.0.0_Perf_Library_Lock_PID_d18"
  • "PerfNet_Perf_Library_Lock_PID_cc4"
  • "ServiceModelService 3.0.0.0_Perf_Library_Lock_PID_d18"
  • "ServiceModelOperation 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "ServiceModelEndpoint 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "Windows Workflow Foundation 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "MSDTC_Perf_Library_Lock_PID_cc4"
  • "WSearchIdxPi_Perf_Library_Lock_PID_d18"
  • "Lsa_Perf_Library_Lock_PID_d18"
  • "usbhub_Perf_Library_Lock_PID_d18"
  • ".NET Data Provider for Oracle_Perf_Library_Lock_PID_d18"
  • "PerfDisk_Perf_Library_Lock_PID_cc4"
  • "PerfOS_Perf_Library_Lock_PID_cc4"
  • "rdyboost_Perf_Library_Lock_PID_cc4"
  • "WmiApRpl_Perf_Library_Lock_PID_cc4"
  • "WSearchIdxPi_Perf_Library_Lock_PID_cc4"
  • "ServiceModelEndpoint 3.0.0.0_Perf_Library_Lock_PID_d18"
  • "UGatherer_Perf_Library_Lock_PID_d18"
  • "ContentIndex_Perf_Library_Lock_PID_d18"
  • ".NET CLR Data_Perf_Library_Lock_PID_cc4"
  • "usbhub_Perf_Library_Lock_PID_cc4"
  • "stripp"
  • "ContentIndex_Perf_Library_Lock_PID_cc4"
  • "Spooler_Perf_Library_Lock_PID_cc4"
  • "ContentFilter_Perf_Library_Lock_PID_d18"
  • "MSDTC_Perf_Library_Lock_PID_d18"
  • ".NET CLR Data_Perf_Library_Lock_PID_d18"

It creates the following process(es):
  • C:\Users\Admin\AppData\Roaming\afd.exe
  • C:\Windows\system32\netsh.exe [ netsh firewall add allowedprogram 1.exe 1 ENABLE ]

    Network Activity
    We observed the following DNS query/queries:
    • one.afvkebt.com

    Registry Related Changes
    It makes the following registry modifications to ensure infection after system reboot:
    • HKCU\software\microsoft\windowsnt\currentversion\terminalserver\install\Software\Microsoft\Windows\CurrentVersion\Run\cftmon32 = C:\Users\Admin\AppData\Roaming\afd.exe
    • HKCU\Software\Microsoft\Windows\CurrentVersion\Run\cftmon32 = C:\Users\Admin\AppData\Roaming\afd.exe


    Relevant Information