MalAgent.J_90054 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity- create - dir - C:\Documents and Settings\TestMachine\Application Data\india gamcaa\
File level activity- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\EDQHU.txt
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\EDQHU.txt
- write - file - PIPE\wkssvc
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\EDQHU.bat
- write - file - C:\Documents and Settings\TestMachine\Application Data\india gamcaa\indiagamcaa.exe
- write - file - C:\Documents and Settings\TestMachine\Application Data\india gamcaa\indiagamcaa.exe
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersPersonal
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c062-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c060-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon Documents
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersDesktop
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon Desktop
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoamMUICacheC:\DOCUME~1\TestMachine\LOCALS~1\Temp\EDQHU.bat
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runindiagamcaaa
- write - registry - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gam
- write - registry - HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session ManagerStubPath
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - kernel32.dll
- load - library - MSVBVM60.DLL
- load - library - User32.dll
- load - library - C:\WINDOWS\system32\kernel32.dll
- load - library - C:\WINDOWS\system32\MSVBVM60.DLL
- load - library - kernel32
- load - library - CLBCATQ.DLL
- load - library - KERNEL32.DLL
- load - library - C:\WINDOWS\system32\wshom.ocx
- load - library - C:\WINDOWS\system32\scrrun.dll
- load - library - shell32.dll
- load - library - netapi32
- load - library - OLE32.DLL
- load - library - C:\WINDOWS\system32\SHELL32.dll
- load - library - SHELL32.dll
- load - library - SETUPAPI.dll
- load - library - C:\WINDOWS\system32\urlmon.dll
- load - library - Secur32.dll
- load - library - userenv
- load - library - KERNEL32
- load - library - VERSION.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\EDQHU.bat
- load - library - browseui.dll
- load - library - shlwapi
- load - library - shell32
- load - library - lz32.dll
- load - library - ADVAPI32.dll
- load - library - advapi32
- load - library - mscoree.dll
- load - library - advapi32.dll
- load - library - ntdll.dll
- load - library - Kernel32
- load - library - ADVAPI32.DLL
- load - library - CRYPT32.DLL
- load - library - GDI32.dll
- load - library - msvcrt.dll
- load - library - SHELL32.DLL
- load - library - USER32.dll
- load - library - WS2_32.dll
- load - library - user32.dll
- load - library - uxtheme.dll
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- WriteProcessMemory
- WriteProcessMemory
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegOpenKeyExA
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- LdrGetProcedureAddress
Filesystem API calls used
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 192.168.30.255
- 192.168.30.6 >> 8.8.8.8
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains:- killerlgg.no-ip.biz with IP -
DNS Request: HTTP Request: DLL related data Number of DLL's imported = 1
|