SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  MalAgent.J_89730
MalAgent.J_89730 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive

Mutexes created
  • Nothing to report


Directory level activity
    • Nothing to report


    File level activity
    • delete - file - C:\Documents and Settings\All Users\Application Data\habeys.exe
    • write - file - PIPE\lsarpc
    • write - file - C:\Documents and Settings\TestMachine\Cookies\soumy@hoarafushionline[1].txt
    • write - file - C:\Documents and Settings\TestMachine\Cookies\soumy@www.hoarafushionline[1].txt
    • write - file - C:\Documents and Settings\All Users\Application Data\habeys.exe


    Registry level activity
    • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppData
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsMigrateProxy
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
    • write - registry - HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
    • write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsDefaultConnectionSettings
    • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
    • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
    • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
    • write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHideFileExt
    • write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHidden
    • write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHidden


    Library level activity
    • load - library - C:\WINDOWS\system32\rpcss.dll
    • load - library - C:\WINDOWS\system32\uxtheme.dll
    • load - library - uxtheme.dll
    • load - library - OLEAUT32.DLL
    • load - library - oleaut32.dll
    • load - library - ole32.dll
    • load - library - SXS.DLL
    • load - library - USER32
    • load - library - kernel32
    • load - library - shell32.dll
    • load - library - urlmon
    • load - library - RASAPI32.DLL
    • load - library - RTUTILS.DLL
    • load - library - sensapi.dll
    • load - library - ntdll.dll
    • load - library - SHELL32.dll
    • load - library - USERENV.dll
    • load - library - netapi32.dll
    • load - library - C:\WINDOWS\System32\mswsock.dll
    • load - library - rasadhlp.dll
    • load - library - NTDLL.DLL
    • load - library - IPHLPAPI.DLL
    • load - library - urlmon.dll
    • load - library - user32
    • load - library - wininet.dll
    • load - library - advapi32.dll
    • load - library - kernel32


    Process API calls used
    • ZwMapViewOfSection
    • VirtualProtectEx
    • NtCreateSection
    • NtOpenSection
    • NtFreeVirtualMemory
    • NtFreeVirtualMemory


    Registry API calls used
    • NtOpenKey
    • NtQueryValueKey
    • RegOpenKeyExA
    • RegCreateKeyExW
    • RegQueryValueExW
    • RegCloseKey
    • RegSetValueExW
    • RegCreateKeyExA
    • RegQueryValueExA
    • RegOpenKeyExW
    • RegQueryInfoKeyW
    • RegEnumValueW
    • RegSetValueExA
    • RegEnumKeyExA
    • RegDeleteValueA
    • RegQueryInfoKeyA
    • RegEnumKeyExW
    • RegCloseKey


    System API calls used
    • LdrGetDllHandle
    • LdrLoadDll
    • IsDebuggerPresent
    • LdrGetProcedureAddress
    • SetWindowsHookExA
    • NtDelayExecution
    • LdrGetProcedureAddress


    Filesystem API calls used
    • NtCreateFile
    • NtQueryInformationFile
    • NtSetInformationFile
    • DeleteFileA
    • NtDeviceIoControlFile
    • NtWriteFile
    • NtReadFile
    • FindFirstFileExW
    • CopyFileA
    • NtOpenFile
    • NtOpenFile

    Network

    UDP source >> destination
    • 192.168.30.254 >> 192.168.30.6
    • 192.168.30.6 >> 192.168.30.254
    • 192.168.30.6 >> 192.168.30.255
    • 192.168.30.6 >> 8.8.8.8


    TCP source >> destination
    • 192.168.30.6 >> 192.168.30.254
    • 192.168.30.6 >> 63.251.106.25



    Domains:
    • www.hoarafushionline.net with IP - 63.251.106.25

    DNS Request:
    • www.hoarafushionline.net

    HTTP Request:
    • GET URI - http://www.hoarafushionline.net/habeys.exe

    DLL related data
    Number of DLL's imported = 1
    • MSVBVM60.DLL


    Relevant Information