SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  MalAgent.J_89699
MalAgent.J_89699 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive

Mutexes created
  • Nothing to report


Directory level activity
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\
  • create - dir - C:\DOCUME~1
  • create - dir - C:\DOCUME~1\TestMachine
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp
  • create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsy2.tmp
  • delete - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsy2.tmp\


File level activity
  • delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsu1.tmp
  • delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsy2.tmp
  • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\p1ffswd5lpzgc
  • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\aoxpzbw
  • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\cawjejsub.exe


Registry level activity
  • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c062-299c-11e2-afd8-806d6172696f}\BaseClass
  • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c060-299c-11e2-afd8-806d6172696f}\BaseClass


Library level activity
  • load - library - C:\WINDOWS\system32\rpcss.dll
  • load - library - C:\WINDOWS\system32\uxtheme.dll
  • load - library - uxtheme.dll
  • load - library - SHFOLDER
  • load - library - ole32.dll
  • load - library - OLE32.DLL
  • load - library - C:\WINDOWS\system32\SHELL32.dll
  • load - library - SETUPAPI.dll
  • load - library - SHELL32.dll
  • load - library - KERNEL32
  • load - library - RichEd20
  • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\a0c722ccc11972ef4038e79133dc7c9b.bin
  • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\a0c722ccc11972ef4038e79133dc7c9b.bin


Process API calls used
  • ZwMapViewOfSection
  • CreateProcessInternalW
  • ExitProcess


Registry API calls used
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegCloseKey
  • RegOpenKeyExA
  • RegCreateKeyExW
  • RegSetValueExW
  • RegEnumKeyW
  • RegCloseKey


System API calls used
  • LdrGetDllHandle
  • LdrLoadDll
  • IsDebuggerPresent
  • LdrGetProcedureAddress
  • LookupPrivilegeValueW
  • LdrGetDllHandle


Filesystem API calls used
  • NtOpenFile
  • NtQueryInformationFile
  • NtCreateFile
  • FindFirstFileExW
  • CreateDirectoryW
  • DeleteFileA
  • NtReadFile
  • NtSetInformationFile
  • NtWriteFile
  • NtQueryDirectoryFile
  • RemoveDirectoryA

Network

UDP source >> destination


    TCP source >> destination



      Domains:
      • NA

      DNS Request:
      • NA

      HTTP Request:
      • NA

      DLL related data
      Number of DLL's imported = 8
      • KERNEL32.dll
      • USER32.dll
      • GDI32.dll
      • SHELL32.dll
      • ADVAPI32.dll
      • COMCTL32.dll
      • ole32.dll
      • VERSION.dll


      Relevant Information