SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  AsianRaw.BI
AsianRaw.BI is an Adware. Adware, or advertising-supported software, is any software that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. It is usually annoying but harmless, unless it is combined with spyware or trackware.

      Process Related Changes
      It creates the following mutex(es):
      • MutexNPA_UnitVersioning_1524"
      • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
      • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"

      It creates the following process(es):
      • C:\WINDOWS\Temp\c423c4f7c17ac131ea7206f0d4a79a76.exe [ \c:\windows\temp\c423c4f7c17ac131ea7206f0d4a79a76.exe ]
      • C:\WINDOWS\Temp\c423c4f7c17ac131ea7206f0d4a79a76.exe [ \c:\windows\temp\c423c4f7c17ac131ea7206f0d4a79a76.exe ]

      Network Activity
      We observed the following DNS query/queries:
      • cdplajk1zk1bt0j.paseka-soft.ru

      It attempts to connect to the following remote servers:
      • 200.7xxxxxx:80

      Registry Related Changes
      It makes the following registry modifications to ensure infection after system reboot:
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= C:\WINDOWS\system32\ESENT.dll
      • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= C:\WINDOWS\system32\ESENT.dll
      • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= *** Special Characters ***
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= *** Special Characters ***


      Relevant Information