MalAgent.J_89802 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
- _!MSFTHISTORY!_
- c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
- c:!documents and settings!soumy!cookies!
- c:!documents and settings!soumy!local settings!history!history.ie5!
- WininetStartupMutex
- WininetConnectionMutex
- WininetProxyRegistryMutex
Directory level activity
File level activity
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
Library level activity- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\7c5d94c32094808e13824513ff228833.ENU
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\7c5d94c32094808e13824513ff228833.EN
- load - library - kernel32.dll
- load - library - oleaut32.dll
- load - library - USER32.DLL
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\7c5d94c32094808e13824513ff228833.bin
- load - library - USER32
- load - library - comctl32.dll
- load - library - User32.dll
- load - library - ole32.dll
- load - library - archiveint
- load - library - MpClient
- load - library - advapi32
- load - library - endpointdlp
- load - library - ????
- load - library - ntdll
- load - library - WININET.dll
- load - library - Secur32.dll
- load - library - shell32.dll
- load - library - KERNEL32
- load - library - rnaapp.exe
- load - library - amSi
- load - library - \xe6\xb5\xa1\xe6\xa5\xb3
- load - library - user32.dll
- load - library - advapi32.dll
- load - library - winmm.dll
- load - library - wininet.dll
- load - library - ??L
- load - library - C:\WINDOWS\system32\winmm.dll
Process API calls used
- VirtualProtectEx
- NtOpenSection
- NtCreateSection
- ZwMapViewOfSection
- NtFreeVirtualMemory
- NtFreeVirtualMemory
Registry API calls used
- RegOpenKeyExA
- RegQueryValueExA
- RegCloseKey
- RegOpenKeyExW
- RegCreateKeyExW
- RegQueryValueExW
- RegSetValueExW
- RegSetValueExA
- RegEnumKeyExA
- RegOpenKeyExA
System API calls used
- LdrGetDllHandle
- LdrGetProcedureAddress
- LdrLoadDll
- LdrLoadDll
Filesystem API calls used
- NtOpenFile
- NtSetInformationFile
- NtCreateFile
- NtQueryInformationFile
- NtReadFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 192.168.30.255
- 192.168.30.6 >> 8.8.8.8
TCP source >> destination - 192.168.30.6 >> 13.107.42.13
- 192.168.30.6 >> 192.168.30.254
Domains:- onedrive.live.com with IP - 13.107.42.13
DNS Request: HTTP Request: DLL related data Number of DLL's imported = 20
- oleaut32.dll
- advapi32.dll
- user32.dll
- kernel32.dll
- kernel32.dll
- user32.dll
- gdi32.dll
- version.dll
- kernel32.dll
- advapi32.dll
- oleaut32.dll
- ole32.dll
- kernel32.dll
- oleaut32.dll
- comctl32.dll
- winspool.drv
- comdlg32.dll
- oleacc.dll
- winmm.dll
- URL
|