SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  MalAgent.J_90233
MalAgent.J_90233 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive

Mutexes created
  • Shell.CMruPidlList
  • WininetStartupMutex
  • _!MSFTHISTORY!_
  • c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
  • c:!documents and settings!soumy!cookies!
  • c:!documents and settings!soumy!local settings!history!history.ie5!
  • WininetConnectionMutex
  • WininetProxyRegistryMutex
  • ShimCacheMutex


Directory level activity
    • Nothing to report


    File level activity
      • Nothing to report


      Registry level activity
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersDesktop
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersFavorites
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoamBagMRUNodeSlots
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoamBagMRUMRUListEx
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MainWindow_Placement
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ToolbarLocked
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
      • write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c062-299c-11e2-afd8-806d6172696f}\BaseClass
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c060-299c-11e2-afd8-806d6172696f}\BaseClass
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\LinksOrder
      • write - registry - HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MainShowedCheckBrowser


      Library level activity
      • load - library - C:\WINDOWS\system32\rpcss.dll
      • load - library - C:\WINDOWS\system32\uxtheme.dll
      • load - library - uxtheme.dll
      • load - library - OLEAUT32.DLL
      • load - library - oleaut32.dll
      • load - library - ole32.dll
      • load - library - SXS.DLL
      • load - library - USER32
      • load - library - C:\WINDOWS\system32\vb6chs.dll
      • load - library - C:\WINDOWS\system32\MSVBVM60.DLL
      • load - library - kernel32
      • load - library - CLBCATQ.DLL
      • load - library - KERNEL32.DLL
      • load - library - C:\WINDOWS\system32\wshom.ocx
      • load - library - Kernel32
      • load - library - C:\WINDOWS\system32\scrrun.dll
      • load - library - IEXPLORE.EXE
      • load - library - SHELL32.dll
      • load - library - KERNEL32
      • load - library - SHELL32.DLL
      • load - library - EXPLORER.EXE
      • load - library - BROWSEUI.dll
      • load - library - shdocvw.dll
      • load - library - shell32.dll
      • load - library - C:\WINDOWS\system32\browselc.dll
      • load - library - COMCTL32.dll
      • load - library - C:\WINDOWS\system32\SHDOCVW.dll
      • load - library - appHelp.dll
      • load - library - C:\WINDOWS\system32\shdocvw.dll
      • load - library - SHDOCVW.dll
      • load - library - OLE32.DLL
      • load - library - OLEAUT32.dll
      • load - library - userenv
      • load - library - UxTheme.dll
      • load - library - WININET.dll
      • load - library - Secur32.dll
      • load - library - rnaapp.exe
      • load - library - C:\WINDOWS\system32\SHELL32.dll
      • load - library - GDI32
      • load - library - C:\WINDOWS\system32\browseui.dll
      • load - library - cscui.dll
      • load - library - C:\WINDOWS\System32\cscui.dll
      • load - library - SETUPAPI.dll
      • load - library - urlmon.dll
      • load - library - C:\WINDOWS\system32\shdoclc.dll


      Process API calls used
      • ZwMapViewOfSection
      • VirtualProtectEx
      • CreateProcessInternalW
      • NtCreateSection
      • ZwMapViewOfSection


      Registry API calls used
      • NtOpenKey
      • NtQueryValueKey
      • RegOpenKeyExA
      • RegOpenKeyExW
      • RegQueryValueExW
      • RegCloseKey
      • RegCloseKey


      System API calls used
      • LdrGetDllHandle
      • LdrLoadDll
      • IsDebuggerPresent
      • LdrGetProcedureAddress
      • SetWindowsHookExA
      • NtDelayExecution
      • LdrGetProcedureAddress


      Filesystem API calls used
      • NtCreateFile
      • NtQueryInformationFile
      • NtSetInformationFile
      • NtReadFile
      • FindFirstFileExW
      • NtQueryDirectoryFile
      • NtQueryDirectoryFile

      Network

      UDP source >> destination
      • 192.168.30.254 >> 192.168.30.6
      • 192.168.30.6 >> 192.168.30.255


      TCP source >> destination
      • 192.168.30.6 >> 192.168.30.254



      Domains:
      • NA

      DNS Request:
      • NA

      HTTP Request:
      • NA

      DLL related data
      Number of DLL's imported = 0
      • Nothing to report


      Relevant Information