MalAgent.J_90094 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
Directory level activity
File level activity- write - file - C:\Documents and Settings\TestMachine\mmgouv.exe
- write - file - C:\Documents and Settings\TestMachine\mmgouv.exe
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\mmgouv
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden
- write - registry - HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AUNoAutoUpdate
- write - registry - HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AUNoAutoUpdate
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - kernel32
- load - library - user32
- load - library - C:\WINDOWS\system32\kernel32.dll
- load - library - kernel32.dll
- load - library - shell32
- load - library - USERENV.dll
- load - library - advapi32
- load - library - Secur32.dll
- load - library - ws2_32
- load - library - USER32.dll
- load - library - C:\WINDOWS\system32\mswsock.dll
- load - library - user32
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- NtFreeVirtualMemory
- ShellExecuteExW
- NtCreateSection
- WriteProcessMemory
- NtFreeVirtualMemory
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegCreateKeyExW
- RegSetValueExW
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- NtDelayExecution
- LdrGetProcedureAddress
Filesystem API calls used
- FindFirstFileExW
- NtCreateFile
- NtReadFile
- NtSetInformationFile
- NtWriteFile
- NtOpenFile
- NtDeviceIoControlFile
- NtDeviceIoControlFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.254
- 192.168.30.6 >> 192.168.30.255
- 192.168.30.6 >> 8.8.8.8
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains:- ns1.timecheckings.com with IP -
- ns1.timecheckings.net with IP -
- ns1.chopzones.org with IP -
- ns1.chopzones.biz with IP -
- ns1.chopzones.info with IP -
DNS Request:- ns1.chopzones.biz
- ns1.timecheckings.com
- ns1.chopzones.info
- ns1.timecheckings.net
- ns1.chopzones.org
HTTP Request: DLL related data Number of DLL's imported = 1
|