SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Scar.DMOF
Scar.DMOF is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious way. Trojans do not replicate or spread to other computers.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Windows\ranga.exe"

Process Related Changes
It creates the following mutex(es):
  • ".NETFramework_Perf_Library_Lock_PID_cc4"
  • "usbhub_Perf_Library_Lock_PID_cc4"
  • ".NET CLR Networking_Perf_Library_Lock_PID_d14"
  • "TapiSrv_Perf_Library_Lock_PID_d14"
  • "Spooler_Perf_Library_Lock_PID_cc4"
  • "PerfOS_Perf_Library_Lock_PID_d14"
  • "MSSCNTRS_Perf_Library_Lock_PID_cc4"
  • "Tcpip_Perf_Library_Lock_PID_cc4"
  • "MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "ContentFilter_Perf_Library_Lock_PID_d14"
  • "RemoteAccess_Perf_Library_Lock_PID_cc4"
  • "MSDTC_Perf_Library_Lock_PID_d14"
  • "SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_d14"
  • "ESENT_Perf_Library_Lock_PID_cc4"
  • "UGatherer_Perf_Library_Lock_PID_d14"
  • "TermService_Perf_Library_Lock_PID_cc4"
  • "RemoteAccess_Perf_Library_Lock_PID_d14"
  • "ISAPISearch_Perf_Library_Lock_PID_cc4"
  • "ISAPISearch_Perf_Library_Lock_PID_d14"
  • "UGTHRSVC_Perf_Library_Lock_PID_cc4"
  • "ContentFilter_Perf_Library_Lock_PID_cc4"
  • "InetInfo_Perf_Library_Lock_PID_d14"
  • "usbhub_Perf_Library_Lock_PID_d14"
  • "UGatherer_Perf_Library_Lock_PID_cc4"
  • "MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_d14"
  • "InetInfo_Perf_Library_Lock_PID_cc4"
  • "BITS_Perf_Library_Lock_PID_d14"
  • "SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • ".NET Data Provider for SqlServer_Perf_Library_Lock_PID_d14"
  • ".NET Data Provider for SqlServer_Perf_Library_Lock_PID_cc4"
  • ".NET Data Provider for Oracle_Perf_Library_Lock_PID_cc4"
  • "ServiceModelService 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "ServiceModelService 3.0.0.0_Perf_Library_Lock_PID_d14"
  • "ServiceModelEndpoint 3.0.0.0_Perf_Library_Lock_PID_d14"
  • "Lsa_Perf_Library_Lock_PID_d14"
  • "TermService_Perf_Library_Lock_PID_d14"
  • "TapiSrv_Perf_Library_Lock_PID_cc4"
  • ".NET CLR Networking_Perf_Library_Lock_PID_cc4"
  • "PerfProc_Perf_Library_Lock_PID_cc4"
  • "PerfNet_Perf_Library_Lock_PID_d14"
  • "Lsa_Perf_Library_Lock_PID_cc4"
  • "PerfProc_Perf_Library_Lock_PID_d14"
  • "PerfNet_Perf_Library_Lock_PID_cc4"
  • "x0vdxd"
  • "ServiceModelOperation 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "ServiceModelEndpoint 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "WmiApRpl_Perf_Library_Lock_PID_cc4"
  • "Windows Workflow Foundation 3.0.0.0_Perf_Library_Lock_PID_cc4"
  • "MSDTC_Perf_Library_Lock_PID_cc4"
  • "PerfOS_Perf_Library_Lock_PID_cc4"
  • ".NET CLR Data_Perf_Library_Lock_PID_d14"
  • "ContentIndex_Perf_Library_Lock_PID_d14"
  • "PerfDisk_Perf_Library_Lock_PID_d14"
  • "PerfDisk_Perf_Library_Lock_PID_cc4"
  • ".NETFramework_Perf_Library_Lock_PID_d14"
  • "rdyboost_Perf_Library_Lock_PID_cc4"
  • "Spooler_Perf_Library_Lock_PID_d14"
  • "WmiApRpl_Perf_Library_Lock_PID_d14"
  • "MSSCNTRS_Perf_Library_Lock_PID_d14"
  • "WSearchIdxPi_Perf_Library_Lock_PID_cc4"
  • "ServiceModelOperation 3.0.0.0_Perf_Library_Lock_PID_d14"
  • "Windows Workflow Foundation 3.0.0.0_Perf_Library_Lock_PID_d14"
  • "BITS_Perf_Library_Lock_PID_cc4"
  • ".NET CLR Data_Perf_Library_Lock_PID_cc4"
  • "rdyboost_Perf_Library_Lock_PID_d14"
  • "WSearchIdxPi_Perf_Library_Lock_PID_d14"
  • "CB35EF5D-4591-41d9-BBA2-0363342F3783"
  • "ContentIndex_Perf_Library_Lock_PID_cc4"
  • "Tcpip_Perf_Library_Lock_PID_d14"
  • ".NET Data Provider for Oracle_Perf_Library_Lock_PID_d14"
  • "UGTHRSVC_Perf_Library_Lock_PID_d14"
  • "ESENT_Perf_Library_Lock_PID_d14"

It creates the following process(es):
  • C:\Windows\ranga.exe
  • C:\Windows\system32\netsh.exe [ netsh firewall add allowedprogram ranga.exe 1 ENABLE ]

Network Activity
It attempts to connect to the following remote servers:
  • nice.niceshot.in:6567 (173.230.xxxxxx)

We observed the following DNS query/queries:
  • nice.niceshot.in

Registry Related Changes
It makes the following registry modifications to ensure infection after system reboot:
  • HKLM\software\microsoft\windowsnt\currentversion\terminalserver\install\Software\Microsoft\Windows\CurrentVersion\Run\servicenoits = ranga.exe
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\servicenoits = ranga.exe


Relevant Information