Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\csrsss] 'Start' = '00000002'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%CommonProgramFiles%\System\csrsss.exe' = '%CommonProgramFiles%\System\csrsss.exe:*:Enabled:CSR System Services'
Creates and executes the following:
- '%CommonProgramFiles%\System\csrsss.exe'
Searches for windows to
detect analytical utilities:
- ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
Modifies file system :
Creates the following files:
- %CommonProgramFiles%\System\csrsss.exe
Sets the 'hidden' attribute to the following files:
- %CommonProgramFiles%\System\csrsss.exe
Network activity:
Connects to:
- '<Private IP address>':0
- 'se##er2.com':6667
- 'se##er.com':6667
UDP:
- DNS ASK se##er2.com
- DNS ASK se##er.com
Miscellaneous:
Searches for the following windows:
- ClassName: '(null)' WindowName: 'Security Task Manager - Alexander Neuber'
- ClassName: '(null)' WindowName: 'CurrProcess'
- ClassName: '(null)' WindowName: 'SwitchSniffer v1.3.2.0 UnRegistered'
- ClassName: '(null)' WindowName: 'Auto Start and Process Viewer : www.konradp.com'
- ClassName: '(null)' WindowName: 'Soft191 Process Viewer'
- ClassName: '(null)' WindowName: 'Process Heap Viewer - www.SecurityXploded.com'
- ClassName: '(null)' WindowName: 'Remote Process Viewer for Windows Networks'
- ClassName: '(null)' WindowName: 'SwitchSniffer v1.3.2.0 Registered'
- ClassName: '(null)' WindowName: 'Project 1 - Packet Analyzer - Colasoft Capsa'
- ClassName: '(null)' WindowName: 'The Wireshark Network Analyzer'
- ClassName: '(null)' WindowName: 'Ether Detect'
- ClassName: '(null)' WindowName: 'TCPView - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'PIAFCTM - Stopped'
- ClassName: '(null)' WindowName: 'PIAFCTM - Waiting'
- ClassName: '(null)' WindowName: 'Process Explorer - Sysinternals: www.sysinternals.com'