SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  JScript.BlacoleRef.DD_4
JScript.BlacoleRef.DD_4 is an Exploit. An Exploit is a piece of software or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software. Attackers usually use an exploit to deliver a payload on the victims system.

Mutexes created
  • Nothing to report


Directory level activity
  • create - dir - C:\Documents and Settings\All Users\Application Data\Mozilla\


File level activity
  • write - file - C:\DOCUME~1\ALLUSE~1\APPLIC~1\Mozilla\vdylwrh.exe
  • delete - file - C:\WINDOWS\Tasks\rutluwl.job
  • write - file - C:\WINDOWS\Tasks\rutluwl.job
  • write - file - PIPE\lsarpc
  • write - file - C:\WINDOWS\Tasks\rutluwl.job


Registry level activity
    • Nothing to report


    Library level activity
    • load - library - KERNEL32.DLL
    • load - library - ADVAPI32.dll
    • load - library - msvcrt.dll
    • load - library - USER32.dll
    • load - library - kernel32.dll
    • load - library - KERNEL32.dll
    • load - library - SHELL32.dll
    • load - library - ole32.dll
    • load - library - OLEAUT32.dll
    • load - library - C:\WINDOWS\system32\uxtheme.dll
    • load - library - uxtheme.dll
    • load - library - C:\WINDOWS\system32\rpcss.dll
    • load - library - CLBCATQ.DLL
    • load - library - C:\WINDOWS\system32\mstask.dll
    • load - library - Secur32.dll
    • load - library - OLE32.DLL
    • load - library - C:\WINDOWS\system32\SHELL32.dll
    • load - library - MPR.DLL
    • load - library - mscoree.dll


    Process API calls used
    • VirtualProtectEx
    • ZwMapViewOfSection
    • NtFreeVirtualMemory
    • NtCreateSection
    • ExitProcess


    Registry API calls used
    • RegOpenKeyExW
    • RegQueryValueExW
    • RegCloseKey
    • NtOpenKey
    • RegOpenKeyExA
    • RegEnumKeyW
    • NtQueryValueKey
    • RegCloseKey


    System API calls used
    • LdrLoadDll
    • LdrGetProcedureAddress
    • LdrGetDllHandle
    • IsDebuggerPresent
    • LdrGetDllHandle


    Filesystem API calls used
    • NtCreateFile
    • CreateDirectoryW
    • FindFirstFileExW
    • NtQueryInformationFile
    • NtReadFile
    • NtWriteFile
    • NtSetInformationFile
    • DeleteFileW
    • NtOpenFile
    • NtWriteFile

    Network

    UDP source >> destination


      TCP source >> destination



        Domains:
        • NA

        DNS Request:
        • NA

        HTTP Request:
        • NA

        DLL related data
        Number of DLL's imported = 4
        • ADVAPI32.dll
        • KERNEL32.DLL
        • msvcrt.dll
        • USER32.dll


        Relevant Information