Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MicroUpdate' = '%HOMEPATH%\Documents\MSDCSC\msdcsc.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'UserInit' = '<SYSTEM32>\userinit.exe,%TEMP%\taskmgr\taskmgr.exe,%HOMEPATH%\Documents\MSDCSC\msdcsc.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'taskmgr.exe' = '%TEMP%\taskmgr\taskmgr.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'UserInit' = '<SYSTEM32>\userinit.exe,%TEMP%\taskmgr\taskmgr.exe'
Malicious functions:
Creates and executes the following:
- '%HOMEPATH%\Documents\MSDCSC\msdcsc.exe'
- '%TEMP%\taskmgr\taskmgr.exe'
- '%TEMP%\ADOBE.READER.EXE'
Executes the following:
- '<SYSTEM32>\attrib.exe' "%TEMP%\ADOBE.READER.EXE" +s +h
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\notepad.exe'
- '<SYSTEM32>\attrib.exe' "<LS_APPDATA>\Temp" +s +h
Injects code into
the following system processes:
- <SYSTEM32>\notepad.exe
Modifies file system :
Creates the following files:
- %HOMEPATH%\Documents\MSDCSC\msdcsc.exe
- %TEMP%\ADOBE.READER.EXE
- %TEMP%\taskmgr\taskmgr.exe
Sets the 'hidden' attribute to the following files:
- %HOMEPATH%\Documents\MSDCSC\msdcsc.exe
Deletes the following files:
- %TEMP%\ADOBE.READER.EXE
Network activity:
Connects to:
- 'ap#####.serveftp.com':6565
- '10#.#36.89.42':1605
UDP:
- DNS ASK dn#.##ftncsi.com
- DNS ASK ap#####.serveftp.com
Miscellaneous:
Searches for the following windows:
- ClassName: '#32770' WindowName: '(null)'
- ClassName: 'SysListView32' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: '#32770' WindowName: '<Auxiliary name> - build Mar 22 2011'