SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Dropper.A_4829
Dropper.A_4829 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

File Related Changes
It drops the following file(s) on the system:
  • "C:\WINDOWS\system32\system32\Server.exe"

Process Related Changes
It creates the following mutex(es):
  • ZonesCacheCounterMutex"
  • SudFkJdEXIT"
  • ZonesLockedCacheCounterMutex"
  • c:!documents and settings!admin!local settings!history!history.ie5!"
  • SudFkJd"
  • SudFkJdPERSIST"
  • XTREMEUPDATE"
  • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
  • ZoneAttributeCacheCounterMutex"
  • SHIMLIB_LOG_MUTEX"
  • WininetConnectionMutex"
  • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • ZonesCounterMutex"
  • MSCTF.Shared.MUTEX.IOH"
  • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • c:!documents and settings!admin!cookies!"

It creates the following process(es):
  • C:\WINDOWS\Temp\9bb39a8878fc203e826d463d343cc973.exe [ \c:\windows\temp\9bb39a8878fc203e826d463d343cc973.EXE ]
  • C:\WINDOWS\system32\svchost.exe [ svchost.exe ]
  • C:\WINDOWS\system32\calc.exe [ calc.exe ]
  • C:\WINDOWS\Temp\9bb39a8878fc203e826d463d343cc973.exe [ \c:\windows\temp\9bb39a8878fc203e826d463d343cc973.exe ]

It injects malicious code into the following process(es):
  • "C:\WINDOWS\system32\calc.exe"
  • "C:\WINDOWS\system32\svchost.exe"

Network Activity
We observed the following DNS query/queries:
  • nuestrolenoav.hopto.org

It attempts to connect to the following remote servers:
  • 127.xxxxxx:1029

Registry Related Changes
It makes the following registry modifications to ensure infection after system reboot:
  • HKU\s-1-5-21-1078081533-842925246-854245398-1003\Software\Microsoft\Windows\CurrentVersion\Run\= C:\WINDOWS\system32\system32\Server.exe
  • HKLM\software\microsoft\activesetup\installedcomponents\50mau1d7-hok6-8qec-2jmj-xao217iogmv3\= C:\WINDOWS\system32\system32\Server.exerestart
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\= C:\WINDOWS\system32\system32\Server.exe
  • HKLM\software\microsoft\activesetup\installedcomponents\50mau1d7-hok6-8qec-2jmj-xao217iogmv3\= C:\WINDOWS\system32\system32\Server.exe


Relevant Information