MalAgent.J_89976 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
- _!MSFTHISTORY!_
- c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
- c:!documents and settings!soumy!cookies!
- c:!documents and settings!soumy!local settings!history!history.ie5!
- WininetStartupMutex
- WininetConnectionMutex
- WininetProxyRegistryMutex
Directory level activity- create - dir - C:\Program Files\AppPath
File level activity- write - file - PIPE\lsarpc
- write - file - PIPE\lsarpc
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsMigrateProxy
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet SettingsProxyEnable
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
- write - registry - HKEY_USERS\S-1-5-21-1454471165-842925246-1957994488-1003Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsDefaultConnectionSettings
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
Library level activity- load - library - KERNEL32.DLL
- load - library - kernel32.dll
- load - library - KERNEL32
- load - library - DBGHELP.dll
- load - library - C:\WINDOWS\system32\DBGHELP.dll
- load - library - urlmon.dll
- load - library - mlang.dll
- load - library - WININET.dll
- load - library - Secur32.dll
- load - library - shell32.dll
- load - library - rnaapp.exe
- load - library - wsock32
- load - library - ws2_32
- load - library - RASAPI32.DLL
- load - library - RTUTILS.DLL
- load - library - sensapi.dll
- load - library - ntdll.dll
- load - library - SHELL32.dll
- load - library - USERENV.dll
- load - library - netapi32.dll
- load - library - C:\WINDOWS\System32\mswsock.dll
- load - library - rasadhlp.dll
- load - library - NTDLL.DLL
- load - library - IPHLPAPI.DLL
- load - library - urlmon.dll
Process API calls used
- NtOpenSection
- NtCreateSection
- ZwMapViewOfSection
- NtFreeVirtualMemory
- ZwMapViewOfSection
Registry API calls used
- RegCreateKeyExA
- RegQueryValueExA
- RegCloseKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegQueryValueExW
- RegCreateKeyExW
- RegSetValueExW
- RegSetValueExA
- RegEnumKeyExA
- RegEnumValueA
- RegQueryInfoKeyW
- NtOpenKey
- NtQueryValueKey
- RegEnumValueW
- RegDeleteValueA
- RegQueryInfoKeyA
- RegEnumKeyExW
- RegQueryValueExA
System API calls used
- LdrGetDllHandle
- LdrGetProcedureAddress
- NtDelayExecution
- LdrLoadDll
- LdrGetProcedureAddress
Filesystem API calls used
- NtCreateFile
- CreateDirectoryW
- NtQueryInformationFile
- NtReadFile
- NtOpenFile
- NtSetInformationFile
- NtDeviceIoControlFile
- NtWriteFile
- FindFirstFileExW
- NtDeviceIoControlFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.255
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 12
- KERNEL32.dll
- USER32.dll
- GDI32.dll
- comdlg32.dll
- WINSPOOL.DRV
- ADVAPI32.dll
- COMCTL32.dll
- SHLWAPI.dll
- oledlg.dll
- ole32.dll
- OLEAUT32.dll
- imagehlp.dll
|