Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{D1EA892D-672B-42c0-BD32-D7FE957377A7}] 'StubPath' = '%WINDIR%\WebApp\WinNT.hta'
Malicious functions:
Creates and executes the following:
- '%WINDIR%\WebApp\startgame.exe'
Injects code into
the following system processes:
- %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
- %WINDIR%\WebApp\startgame.exe
- %WINDIR%\WebApp\Server.txt
- %WINDIR%\WebApp\WinNT.hta
- %WINDIR%\WebApp\windowsXp.dll
- %WINDIR%\WebApp\dp1.fne
- %WINDIR%\krnln.fnr
- %WINDIR%\12.txt
- %WINDIR%\WebApp\krnln.fnr
- %WINDIR%\dp1.fne
Sets the 'hidden' attribute to the following files:
- %WINDIR%\WebApp\dp1.fne
- %WINDIR%\WebApp\windowsXp.dll
- %WINDIR%\WebApp\startgame.exe
- %WINDIR%\12.txt
- <Full path to virus>
- %WINDIR%\WebApp\krnln.fnr
Deletes the following files:
- %WINDIR%\12.txt
Deletes itself.
Network activity:
Connects to:
- '<Private IP address>':8880