Remote Host Port Number
217.23.13.241 45351
NICK {USA}{XP}{00}822528
USER 0038 “” “lol” :0038
JOIN #RogUe#
PONG :SIRC.NeT
Other details
* The following port was open in the system:
Port Protocol Process
1051 TCP svchosts.exe (%AppData%svchosts.exe)
Registry Modifications
* The following Registry Keys were created:
o HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorer
o HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun
* The newly created Registry Values are:
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity Center]
+ UACDisableNotify = 0x00000000
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem]
+ EnableLUA = 0x00000000
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun]
+ Microsoft Corp = “%AppData%svchosts.exe”
so that svchosts.exe runs every time Windows starts
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
+ Microsoft Corp = “%AppData%svchosts.exe”
so that svchosts.exe runs every time Windows starts
o [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun]
+ winlogon = “%AppData%rssms32.exe”
+ Microsoft Corp = “%AppData%svchosts.exe”
so that rssms32.exe runs every time Windows starts
so that svchosts.exe runs every time Windows starts
Memory Modifications
* There was a new process created in the system:
Process Name Process Filename Main Module Size
svchosts.exe %AppData%svchosts.exe 45 056 bytes
File System Modifications
* The following file was created in the system:
# Filename(s) File Size File Hash
1 %AppData%rssms32.exe
%AppData%svchosts.exe
[file and pathname of the sample #1] 65 536 bytes MD5: 0x54A98A6D61C58D85C7F4B0C022224797
SHA-1: 0xE05959824503F6943EB6C409075ECC2AF2A970CF
Anonymous - August 4, 2010 at 3:25 am
Look before you leap.................................................