modify_registry_to_bypass_firewall(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
|
Example: dr_sandbox.descr_tech.malicious.modify_registry_to_bypass_firewall(/Enabled:taskmg.exe/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\taskmg.exe' = '%TEMP%\taskmg.exe:*:Enabled:taskmg.exe'">
|
modify_registry_to_bypass_firewall_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.modify_registry_to_bypass_firewall_num > 0
|
create_and_exec(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Creates and executes the following:
|
Example: dr_sandbox.descr_tech.malicious.create_and_exec(/Total Commander/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"30\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="'%HOMEPATH%\...\total commander\backup.exe' %HOMEPATH%\...\Total Commander\">
|
create_and_exec_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.create_and_exec_num > 0
|
exec(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Executes the following:
|
Example: dr_sandbox.descr_tech.malicious.exec(/netsh.exe/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"35\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="'<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\system.exe" "system.exe" ENABLE">
|
exec_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.exec_num > 0
|
inject_to_system_proc(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Injects code into
the following system processes:
|
Example: dr_sandbox.descr_tech.malicious.inject_to_system_proc(/RegAsm.exe/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"40\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="%WINDIR%\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe">
|
inject_to_system_proc_num
|
inject_to_system_proc_num
|
Example: dr_sandbox.descr_tech.autorun.inject_to_system_proc_num > 0
|
inject_to_user_proc(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Injects code into
the following user processes:
|
Example: dr_sandbox.descr_tech.malicious.inject_to_user_proc(/^iexplore.exe$/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"40\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="iexplore.exe">
|
inject_to_user_proc_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.inject_to_user_proc_num > 0
|
hook_keyboard_all_processes(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Installs hooks to intercept notifications
on keystrokes:
Handler for all processes: (?LibraryPath)
|
Example: dr_sandbox.descr_tech.malicious.hook_keyboard_all_processes(/OQKWHP\BJX.01/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"45\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem[@ID=\"10\"]
XMLExample: <TSItem ID="10" Type="LI" Text="Handler library for all processes: %ALLUSERSPROFILE%\Application Data\OQKWHP\BJX.01">
|
hook_keyboard_all_processes_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.hook_keyboard_all_processes_num > 0
|
hook_keyboard_concrete_processes(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Installs hooks to intercept notifications
on keystrokes:
Handler for the '(?HookedProcess.Name)' process: (?LibraryPath)
|
Example: dr_sandbox.descr_tech.malicious.hook_keyboard_concrete_processes(/IMDCSC.exe/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"45\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem[@ID=\"20\"]
XMLExample: <TSItem ID="20" Type="LI" Text="Handler library for the 'IMDCSC.exe' processes: %HOMEPATH%\My Documents\DCSCMIN\IMDCSC.exe">
|
hook_keyboard_concrete_processes_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.hook_keyboard_concrete_processes_num > 0
|
try_to_terminate_system_processes(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Terminates or attempts to terminate
the following system processes:
|
Example: dr_sandbox.descr_tech.malicious.try_to_terminate_system_processes(/ctfmon.exe/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"50\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="<SYSTEM32>\cmd.exe">
|
try_to_terminate_system_processes_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.try_to_terminate_system_processes_num > 0
|
try_to_terminate_user_processes(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Terminates or attempts to terminate
the following user processes:
|
Example: dr_sandbox.descr_tech.malicious.try_to_terminate_user_processes(/^AVSYNMGR.EXE$/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"50\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="AVGCTRL.EXE">
|
try_to_terminate_user_processes_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.try_to_terminate_user_processes_num > 0
|
search_password_in_registry(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Searches for registry branches where third party applications store passwords:
|
Example: dr_sandbox.descr_tech.malicious.search_password_in_registry(/MessengerService/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"60\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="[<HKCU>\Software\Microsoft\MessengerService]">
|
search_password_in_registry_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.search_password_in_registry_num > 0
|
search_wnd_to_bypass_av(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Searches for windows to
bypass different anti-viruses:
|
Example: dr_sandbox.descr_tech.malicious.search_wnd_to_bypass_av(/AVP.AlertDialog/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"70\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="ClassName: 'AVP.Product_Notification' WindowName: ''">
|
search_wnd_to_bypass_av_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.search_wnd_to_bypass_av_num > 0
|
search_wnd_to_bypass_wfp(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Searches for windows to
bypass Windows Files Protection (WFP):
|
Example: dr_sandbox.descr_tech.malicious.search_wnd_to_bypass_wfp(/Windows File Protection/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"70\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="ClassName: '' WindowName: 'Windows File Protection'">
|
search_wnd_to_bypass_wfp_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.search_wnd_to_bypass_wfp_num > 0
|
search_wnd_for_analyzing_soft(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Searches for windows to
detect analytical utilities:
|
Example: dr_sandbox.descr_tech.malicious.search_wnd_for_analyzing_soft(/PEiD/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"70\"]/SubItems/TSItem[@ID=\"30\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="ClassName: '' WindowName: 'PEiD v0.95'">
|
search_wnd_for_analyzing_soft_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.search_wnd_for_analyzing_soft_num > 0
|
search_wnd_for_programs_and_games(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Searches for windows to
detect programs and games:
|
Example: dr_sandbox.descr_tech.malicious.search_wnd_for_programs_and_games(/The Wireshark Network Analyzer/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"70\"]/SubItems/TSItem[@ID=\"40\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="ClassName: 'gdkWindowToplevel' WindowName: 'The Wireshark Network Analyzer'">
|
search_wnd_for_programs_and_games_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.search_wnd_for_programs_and_games_num > 0
|
set_ssdt_hooks(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Hooks the following functions in System Service Descriptor Table (SSDT):
|
Example: dr_sandbox.descr_tech.malicious.set_ssdt_hooks(/NtReadVirtualMemory/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"85\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="NtReadVirtualMemory, driver-handler: sys.sys">
|
set_ssdt_hooks_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.set_ssdt_hooks_num > 0
|
modify_explorer_settings(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Modifies settings of Windows Explorer:
|
Example: dr_sandbox.descr_tech.malicious.modify_explorer_settings(/’NoFolderOptions’ = ‘00000001’/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"90\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="[<HKLM>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'">
|
modify_explorer_settings_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.modify_explorer_settings_num > 0
|
modify_ie_settings(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Modifies settings of Windows Internet Explorer:
|
Example: dr_sandbox.descr_tech.malicious.modify_ie_settings(/Zones\1] ‘1206’ = ‘00000000’/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"100\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1206' = '00000000'">
|
modify_ie_settings_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.modify_ie_settings_num > 0
|
hide_processes(regexp)
|
Returns amount of matches.
descr_en:
Technical Information
Malicious functions:
Hides the following processes:
|
Example: dr_sandbox.descr_tech.malicious.hide_processes(/cscript.exe/)
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"105\"]/SubItems/TSItem
XMLExample: <TSItem ID="10" Type="LI" Text="<SYSTEM32>\cscript.exe">
|
hide_processes_num
|
Returns amount of this events.
|
Example: dr_sandbox.descr_tech.autorun.hide_processes_num > 0
|
hide_from_view_hidden_files
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
|
Example: dr_sandbox.descr_tech.malicious.hide_from_view_hidden_files
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem[@ID=\"10\"]
XMLExample: <TSItem ID="10" Type="LI" Text="hidden files">
|
hide_from_view_file_extensions
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
file extensions
|
Example: dr_sandbox.descr_tech.malicious.hide_from_view_file_extensions
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"10\"]/SubItems/TSItem[@ID=\"20\"]
XMLExample: <TSItem ID="20" Type="LI" Text="filename extensions">
|
block_cmd
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Command Prompt (CMD)
|
Example: dr_sandbox.descr_tech.malicious.block_cmd
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"10\"]
XMLExample: <TSItem ID="10" Type="LI" Text="Command line interpreter(CMD)">
|
block_taskmgr
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
|
Example: dr_sandbox.descr_tech.malicious.block_taskmgr
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]
XMLExample: <TSItem ID="20" Type="LI" Text="Task manager(Taskmgr)">
|
block_regedit
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Registry Editor (RegEdit)
|
Example: dr_sandbox.descr_tech.malicious.block_regedit
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"30\"]
XMLExample: <TSItem ID="30" Type="LI" Text="Registry editor (RegEdit)">
|
block_sr
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
System Restore (SR)
|
Example: dr_sandbox.descr_tech.malicious.block_sr
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"30\"]/SubItems/TSItem[@ID=\"10\"]
XMLExample: <TSItem ID="10" Type="LI" Text="System Restore Component(SR)">
|
block_uac
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
User Account Control (UAC)
|
Example: dr_sandbox.descr_tech.malicious.block_uac
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"30\"]/SubItems/TSItem[@ID=\"30\"]
XMLExample: <TSItem ID="30" Type="LI" Text="User Account Control(UAC)">
|
block_sfc
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
System File Checker (SFC)
|
Example: dr_sandbox.descr_tech.malicious.block_sfc
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"30\"]/SubItems/TSItem[@ID=\"40\"]
XMLExample: <TSItem ID="40" Type="LI" Text="System File Checker(SFC)">
|
block_windows_security_center
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
Windows Security Center
|
Example: dr_sandbox.descr_tech.malicious.block_windows_security_center
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"30\"]/SubItems/TSItem[@ID=\"50\"]
XMLExample: <TSItem ID="50" Type="LI" Text="Security Center">
|
inject_to_a_lot_of_user_processes
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
Injects code into
a large number of user processes.
|
Example: dr_sandbox.descr_tech.malicious.inject_to_a_lot_of_user_processes
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"40\"]/SubItems/TSItem[@ID=\"30\"]
XMLExample: <TSItem ID="30" Type="PT" Text="a high number of user processes">
|
try_to_terminate_a_lot_of_user_processes
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
Terminates or attempts to terminate
a large number of user processes.
|
Example: dr_sandbox.descr_tech.malicious.try_to_terminate_a_lot_of_user_processes
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"50\"]/SubItems/TSItem[@ID=\"30\"]
XMLExample: <TSItem ID="30" Type="PT" Text="a high number of user processes">
|
remove_ssdt_hooks
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
Restores hooked functions in System Service Descriptor Table (SSDT).
|
Example: dr_sandbox.descr_tech.malicious.remove_ssdt_hooks
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"88\"]
XMLExample: <TSItem ID="88" Type="PT" Text="System Service Descriptor Table">
|
force_autorun_for_removable_media
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
Forces autoplay for removable media.
|
Example: dr_sandbox.descr_tech.malicious.force_autorun_for_removable_media
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"110\"]
XMLExample: <TSItem ID="110" Type="PT" Text="Forces autorun for removable media.">
|
set_homepage_for_ie
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
Sets a new unauthorized home page for Windows Internet Explorer.
|
Example: dr_sandbox.descr_tech.malicious.set_homepage_for_ie
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"120\"]
XMLExample: <TSItem ID="120" Type="PT" Text="Sets a new unauthorized home page for Internet Explorer.">
|
shut_down_windows
|
1 if modifies, 0 otherwise.
descr_en:
Technical Information
Malicious functions:
Attempts to shut down the Windows operating system.
|
Example: dr_sandbox.descr_tech.malicious.shut_down_windows
XpathQuery: ./SubItems/TSItem[@ID=\"20\"]/SubItems/TSItem[@ID=\"130\"]
XMLExample: <TSItem ID="130" Type="PT" Text="Attempts to shut down the Windows operating system.">
|