MalAgent.J_89730 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity
File level activity- delete - file - C:\Documents and Settings\All Users\Application Data\habeys.exe
- write - file - PIPE\lsarpc
- write - file - C:\Documents and Settings\TestMachine\Cookies\soumy@hoarafushionline[1].txt
- write - file - C:\Documents and Settings\TestMachine\Cookies\soumy@www.hoarafushionline[1].txt
- write - file - C:\Documents and Settings\All Users\Application Data\habeys.exe
Registry level activity- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsMigrateProxy
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsDefaultConnectionSettings
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHideFileExt
- write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHidden
- write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHidden
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - kernel32
- load - library - shell32.dll
- load - library - urlmon
- load - library - RASAPI32.DLL
- load - library - RTUTILS.DLL
- load - library - sensapi.dll
- load - library - ntdll.dll
- load - library - SHELL32.dll
- load - library - USERENV.dll
- load - library - netapi32.dll
- load - library - C:\WINDOWS\System32\mswsock.dll
- load - library - rasadhlp.dll
- load - library - NTDLL.DLL
- load - library - IPHLPAPI.DLL
- load - library - urlmon.dll
- load - library - user32
- load - library - wininet.dll
- load - library - advapi32.dll
- load - library - kernel32
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- NtCreateSection
- NtOpenSection
- NtFreeVirtualMemory
- NtFreeVirtualMemory
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegCreateKeyExW
- RegQueryValueExW
- RegCloseKey
- RegSetValueExW
- RegCreateKeyExA
- RegQueryValueExA
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegEnumValueW
- RegSetValueExA
- RegEnumKeyExA
- RegDeleteValueA
- RegQueryInfoKeyA
- RegEnumKeyExW
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- NtDelayExecution
- LdrGetProcedureAddress
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtSetInformationFile
- DeleteFileA
- NtDeviceIoControlFile
- NtWriteFile
- NtReadFile
- FindFirstFileExW
- CopyFileA
- NtOpenFile
- NtOpenFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 192.168.30.255
- 192.168.30.6 >> 8.8.8.8
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 63.251.106.25
Domains:- www.hoarafushionline.net with IP - 63.251.106.25
DNS Request: HTTP Request:- GET URI - http://www.hoarafushionline.net/habeys.exe
DLL related data Number of DLL's imported = 1
|