Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = '%APPDATA%\lssass.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\ReadMe.lnk
- <Drive name for removable media>:\_ReadMe.lnk
- <Drive name for removable media>:\Picrute.jpg
- <Drive name for removable media>:\KeyGen.exe
Malicious functions:
Creates and executes the following:
- '%TEMP%\<Virus name>32_G.exe'
Modifies file system :
Creates the following files:
- %TEMP%\dw.log
- %APPDATA%\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9
- C:\data.x.dat
- %TEMP%\297D1.dmp
- %HOMEPATH%\data.x.dat
- C:\data.rar.dat
- %APPDATA%\lssass.exe
- %TEMP%\<Virus name>32_G.exe
- %APPDATA%\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9
- %TEMP%\BackUp.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\Picrute.jpg
Deletes the following files:
- %TEMP%\<Virus name>32_G.exe
- %APPDATA%\lssass.exe
Network activity:
Connects to:
- '20#.#6.232.182':80
- 'wp#d':80
TCP:
HTTP GET requests:
- 20#.#6.232.182/pki/crl/products/CSPCA.crl
- wp#d/wpad.dat
UDP:
- DNS ASK crl.microsoft.com
- DNS ASK wp#d
- DNS ASK www.google.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'