Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Privacy Protection' = '%ALLUSERSPROFILE%\Application Data\privacy.exe'
- [<HKLM>\SYSTEM\ControlSet001\Control\Print\Providers\30b57] 'Name' = '%TEMP%\1.tmp'
Malicious functions:
Creates and executes the following:
- '%ALLUSERSPROFILE%\Application Data\privacy.exe'
Executes the following:
- '<SYSTEM32>\spoolsv.exe'
Injects code into
the following system processes:
- <SYSTEM32>\spoolsv.exe
Terminates or attempts to terminate
a large number of user processes.
Modifies file system :
Creates the following files:
- %ALLUSERSPROFILE%\Desktop\Privacy Protection.lnk
- %ALLUSERSPROFILE%\Application Data\privacy
- %TEMP%\1.tmp
Moves the following files:
- from %ALLUSERSPROFILE%\Application Data\privacy to %ALLUSERSPROFILE%\Application Data\privacy.exe
Moves itself:
- from <Full path to virus> to %TEMP%\2.tmp
Network activity:
Connects to:
- 'ge###lfs.com':80
TCP:
HTTP GET requests:
- ge###lfs.com/logo/go.php?id###
UDP:
- DNS ASK ma#####4download.com
- DNS ASK fe####dreams.com
- DNS ASK ge###lfs.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'