SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Suspicious#spyeye
Suspicious#spyeye is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious way. Trojans do not replicate or spread to other computers.

File Related Changes
It drops the following file(s) on the system:
  • "c:\cleansweep.exe"
  • "c:\cleansweep.exe\cleansweep.exe"

It modifies the following additional file(s) on the system:
  • "c:\Windows\System32\inetsrv\History\MetaBase_0000000024_0000000000.xml"
  • "c:\Windows\System32\inetsrv\MetaBase.xml.tmp"
  • "c:\Windows\System32\inetsrv\History\MBSchema_0000000024_0000000000.xml"

Process Related Changes
It creates the following mutex(es):
  • "__SPYNET__"
  • "IESQMMUTEX_0_208"
  • "\BaseNamedObjects\__SPYNET_REPALREADYSENDED__"
  • "CB35EF5D-4591-41d9-BBA2-0363342F3783"

It creates the following process(es):
  • C:\cleansweep.exe\cleansweep.exe

It injects malicious code into the following process(es):
  • "C:\Windows\system32\UI0Detect.exe"
  • "C:\Windows\system32\nfsclnt.exe"
  • "C:\Windows\system32\psxss.exe"
  • "C:\Windows\System32\tcpsvcs.exe"
  • "C:\Windows\system32\SearchFilterHost.exe"
  • "c:\windows\system32\tlntsrv.exe"
  • "C:\Windows\system32\wininit.exe"
  • "C:\Windows\system32\SearchProtocolHost.exe"
  • "C:\Windows\System32\spoolsv.exe"
  • "C:\Windows\system32\taskhost.exe"
  • "C:\Windows\system32\lsass.exe"
  • "C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe"
  • "C:\Windows\system32\Dwm.exe"
  • "C:\Windows\system32\SearchIndexer.exe"
  • "C:\Windows\system32\inetsrv\inetinfo.exe"
  • "C:\Windows\system32\lsm.exe"

Network Activity
It attempts to connect to the following remote servers:
  • 62.193xxxxxx:1988
  • lb1.www.ms.akadns.net:80 (64.4.xxxxxx)

We observed the following DNS query/queries:
  • www.microsoft.com
  • www.hackhound.org.uk

Registry Related Changes
It makes the following registry modifications to ensure infection after system reboot:
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run\cleansweep.exe = C:\cleansweep.exe\cleansweep.exe


Relevant Information