MalAgent.J_58357 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.
Mutexes created
- _!MSFTHISTORY!_
- c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
- c:!documents and settings!soumy!cookies!
- c:!documents and settings!soumy!local settings!history!history.ie5!
- WininetStartupMutex
- WininetConnectionMutex
- WininetProxyRegistryMutex
Directory level activity
File level activity- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\177.tmp
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\178.tmp
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\179.tmp
- write - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\RCX17B.tmp
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\db12c72bdc9f6a93fa30e8c5498bcf14.bin{EF4A65CB-A71B-4fa9-A487-A40464FB1DEA}
- delete - file - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\db12c72bdc9f6a93fa30e8c5498bcf14.bin{EF4A65CB-A71B-4fa9-A487-A40464FB1DEA}
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Super-EC\\xef\xfe\xbd\xef\xff\xbb\xef\xff\x96\xef\xfe\xb9\xef\xff\x96\xef\xff\x98\xef\xfe\xb8\xef\xfe\xb4\xef\xff\x94\xef\xff\x8b\xef\xff\x90\xef\xff\x90
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
- write - registry - Software\Microsoft\windows\CurrentVersion\Internet Settings\ConnectionsDefaultConnectionSettings
Library level activity- load - library - KERNEL32
- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - Kernel32.dll
- load - library - Gdi32.dll
- load - library - User32.dll
- load - library - Advapi32.dll
- load - library - rsaenh.dll
- load - library - Secur32.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\kernel32.dll
- load - library - kernel32.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\ntdll.dll
- load - library - ntdll.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\Kernel32.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\Shlwapi.dll
- load - library - Shlwapi.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\db12c72bdc9f6a93fa30e8c5498bcf14.bin
- load - library - UxTheme.dll
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\ole32
- load - library - ole32
- load - library - C:\DOCUME~1\TestMachine\LOCALS~1\Temp\db12c72bdc9f6a93fa30e8c5498bcf14.bin{EF4A65CB-A71B-4fa9-A487-A40464FB1DEA}
- load - library - shell32.dll
- load - library - rnaapp.exe
- load - library - C:\WINDOWS\System32\mswsock.dll
- load - library - rasadhlp.dll
- load - library - NTDLL.DLL
- load - library - IPHLPAPI.DLL
- load - library - USER32
Process API calls used
- NtCreateSection
- ZwMapViewOfSection
- NtFreeVirtualMemory
- NtOpenSection
- NtFreeVirtualMemory
Registry API calls used
- NtOpenKey
- RegOpenKeyExA
- RegQueryValueExA
- RegCloseKey
- NtQueryValueKey
- RegCreateKeyExA
- RegSetValueExA
- RegOpenKeyExW
- RegCreateKeyExW
- RegQueryValueExW
- RegSetValueExW
- RegEnumKeyExA
- RegQueryInfoKeyA
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrGetProcedureAddress
- SetWindowsHookExA
- LdrLoadDll
- IsDebuggerPresent
- NtDelayExecution
- LdrGetProcedureAddress
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtReadFile
- NtSetInformationFile
- CopyFileA
- NtOpenFile
- DeleteFileA
- NtOpenDirectoryObject
- MoveFileWithProgressW
- NtWriteFile
- DeleteFileW
- NtDeviceIoControlFile
- NtQueryInformationFile
Network
UDP source >> destination - 192.168.30.1 >> 192.168.30.255
- 192.168.30.1 >> 8.8.8.8
TCP source >> destination - 192.168.30.1 >> 125.77.27.2
Domains:- cfyuanji.blog.163.com with IP - 125.77.27.2
DNS Request: HTTP Request:- GET URI - http://cfyuanji.blog.163.com/blog/static/21795512620156505533625/
DLL related data Number of DLL's imported = 16
- MSVFW32.dll
- AVIFIL32.dll
- WINMM.dll
- WS2_32.dll
- RASAPI32.dll
- KERNEL32.dll
- USER32.dll
- GDI32.dll
- WINSPOOL.DRV
- comdlg32.dll
- ADVAPI32.dll
- SHELL32.dll
- ole32.dll
- OLEAUT32.dll
- COMCTL32.dll
- WININET.dll
|