MalAgent.J_89699 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity- create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\
- create - dir - C:\DOCUME~1
- create - dir - C:\DOCUME~1\TestMachine
- create - dir - C:\DOCUME~1\TestMachine\LOCALS~1
- create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp
- create - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsy2.tmp
- delete - dir - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsy2.tmp\
File level activity- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsu1.tmp
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\nsy2.tmp
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\p1ffswd5lpzgc
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\aoxpzbw
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\cawjejsub.exe
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c062-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c060-299c-11e2-afd8-806d6172696f}\BaseClass
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - SHFOLDER
- load - library - ole32.dll
- load - library - OLE32.DLL
- load - library - C:\WINDOWS\system32\SHELL32.dll
- load - library - SETUPAPI.dll
- load - library - SHELL32.dll
- load - library - KERNEL32
- load - library - RichEd20
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\a0c722ccc11972ef4038e79133dc7c9b.bin
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\a0c722ccc11972ef4038e79133dc7c9b.bin
Process API calls used
- ZwMapViewOfSection
- CreateProcessInternalW
- ExitProcess
Registry API calls used
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegOpenKeyExA
- RegCreateKeyExW
- RegSetValueExW
- RegEnumKeyW
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- LookupPrivilegeValueW
- LdrGetDllHandle
Filesystem API calls used
- NtOpenFile
- NtQueryInformationFile
- NtCreateFile
- FindFirstFileExW
- CreateDirectoryW
- DeleteFileA
- NtReadFile
- NtSetInformationFile
- NtWriteFile
- NtQueryDirectoryFile
- RemoveDirectoryA
Network
UDP source >> destination
TCP source >> destination
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 8
- KERNEL32.dll
- USER32.dll
- GDI32.dll
- SHELL32.dll
- ADVAPI32.dll
- COMCTL32.dll
- ole32.dll
- VERSION.dll
|