Threat Database Worms Worm.MSIL.Agent

Worm.MSIL.Agent

By CagedTech in Worms

Analysis Report

General information

Family Name: Worm.MSIL.Agent
Signature status: No Signature

Known Samples

MD5: 35b1d0ff4659405461be8576a22d389c
SHA1: 9a3d50fb48a18cfb7a930777f6c729ebab0596c8
SHA256: E041F9D7569BB7F9857DDE7BCEEA34D654758DDD721ED20D4F6F6871B083949D
File Size: 1.24 MB, 1244160 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description WindowsFormsApplication1
File Version 1.0.0.0
Internal Name WindowsFormsApplication2.exe
Legal Copyright Copyright © 2014
Original Filename WindowsFormsApplication2.exe
Product Name WindowsFormsApplication1
Product Version 1.0.0.0

File Traits

  • .NET
  • big overlay
  • HighEntropy
  • x86

Block Information

Total Blocks: 16
Potentially Malicious Blocks: 5
Whitelisted Blocks: 6
Unknown Blocks: 5

Visual Map

? ? ? x x x x ? ? 0 0 x 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\windows\appcompat\programs\amcache.hve Read Data,Read Control,Write Data
c:\windows\appcompat\programs\amcache.hve Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\software\microsoft\tip\aggregateresults::data 鐄ȴ 鲱螘켜ʚ꺇뺶켜ʚ꺇뺶켜ʚ꺇뺶켜ʚ릵犱洎ʫጉ嵑㔲픋˹耀뫹躧隞̃耀꧌Ѡ­ RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Process Shell Execute
  • CreateProcess
Encryption Used
  • BCryptOpenAlgorithmProvider

Shell Command Execution

C:\Windows\Microsoft.NET\Framework\v2.0.50727\\dw20.exe dw20.exe -x -s 884

Trending

Most Viewed

Loading...