SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Downloader.A_1986
Downloader.A_1986 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

Mutexes created
  • Nothing to report


Directory level activity
    • Nothing to report


    File level activity
    • write - file - PIPE\lsarpc
    • delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\[109a215689890578442e6c2f7e2c256d]
    • write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\793613c07d9d6cd74491e6b4c940f652.bin


    Registry level activity
      • Nothing to report


      Library level activity
      • load - library - KERNEL32
      • load - library - C:\WINDOWS\system32\rpcss.dll
      • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\793613c07d9d6cd74491e6b4c940f652.bin
      • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\kernel32
      • load - library - kernel32
      • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\ntdll.dll
      • load - library - ntdll.dll
      • load - library - Kernel32.dll
      • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\advapi32.dll
      • load - library - advapi32.dll
      • load - library - rsaenh.dll
      • load - library - Secur32.dll
      • load - library - USERENV.dll
      • load - library - netapi32.dll
      • load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\user32.dll
      • load - library - user32.dll
      • load - library - advapi32
      • load - library - ntdll


      Process API calls used
      • CreateProcessInternalW
      • ReadProcessMemory
      • WriteProcessMemory
      • VirtualProtectEx
      • NtFreeVirtualMemory
      • NtCreateSection
      • ZwMapViewOfSection
      • ExitProcess


      Registry API calls used
      • NtOpenKey
      • RegOpenKeyExA
      • RegQueryValueExA
      • RegCloseKey
      • RegOpenKeyExW
      • RegQueryValueExW
      • RegQueryInfoKeyW
      • RegEnumValueW
      • NtQueryValueKey
      • RegCreateKeyExW
      • RegCloseKey


      System API calls used
      • LdrGetDllHandle
      • LdrGetProcedureAddress
      • SetWindowsHookExA
      • LdrLoadDll
      • NtDelayExecution


      Filesystem API calls used
      • NtOpenFile
      • NtSetInformationFile
      • NtQueryInformationFile
      • NtCreateFile
      • NtReadFile
      • NtWriteFile
      • FindFirstFileExW
      • DeleteFileA
      • MoveFileWithProgressW
      • NtSetInformationFile

      Network

      UDP source >> destination
      • 192.168.30.5 >> 192.168.30.254
      • 192.168.30.5 >> 8.8.8.8


      TCP source >> destination



        Domains:
        • wmi.4i7i.com with IP - 112.173.176.37

        DNS Request:
        • wmi.4i7i.com

        HTTP Request:
        • NA

        DLL related data
        Number of DLL's imported = 12
        • KERNEL32.dll
        • USER32.dll
        • GDI32.dll
        • WINMM.dll
        • WINSPOOL.DRV
        • ADVAPI32.dll
        • SHELL32.dll
        • ole32.dll
        • OLEAUT32.dll
        • COMCTL32.dll
        • WS2_32.dll
        • comdlg32.dll


        Relevant Information