Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Classes\scrfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Classes\lnkfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\IExplorer.exe'
- [<HKLM>\SOFTWARE\Classes\exefile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Classes\comfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SecurityCenter' = '<LS_APPDATA>\WINDOWS\CSRSS.EXE'
- [<HKLM>\SOFTWARE\Classes\piffile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Classes\batfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Office Startup' = '<LS_APPDATA>\WINDOWS\Microsoft Office Startup.bat'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MSMSGS' = '<LS_APPDATA>\WINDOWS\WINLOGON.EXE'
- [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '<SYSTEM32>\ash.SCR'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ash' = '%WINDIR%\SVCHOST.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'System Monitoring' = '<LS_APPDATA>\WINDOWS\LSASS.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe "<SYSTEM32>\IExplorer.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Service%USERNAME%' = '<LS_APPDATA>\WINDOWS\SERVICES.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Logon%USERNAME%' = '<LS_APPDATA>\WINDOWS\CSRSS.EXE'
Creates or modifies the following files:
- %ALLUSERSPROFILE%\Start Menu\Programs\Startup\Empty.pif
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\wscsvc] 'ImagePath' = '<LS_APPDATA>\WINDOWS\CSRSS.EXE'
- [<HKLM>\SYSTEM\ControlSet002\Services\srservice] 'ImagePath' = '<LS_APPDATA>\WINDOWS\SMSS.EXE'
- [<HKLM>\SYSTEM\ControlSet002\Services\wscsvc] 'ImagePath' = '<LS_APPDATA>\WINDOWS\CSRSS.EXE'
- [<HKLM>\SYSTEM\ControlSet001\Services\srservice] 'ImagePath' = '<LS_APPDATA>\WINDOWS\SMSS.EXE'
Creates the following files on removable media:
- <Drive name for removable media>:\msvbvm60.dll
- <Drive name for removable media>:\ash\msvbvm60.dll
- <Drive name for removable media>:\ANSAV.exe
- <Drive name for removable media>:\Data %USERNAME%.exe
- <Drive name for removable media>:\ash\Winzip.exe
- <Drive name for removable media>:\desktop.ini
- <Drive name for removable media>:\ash\Folder.htt
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\autoexec.bat
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
blocks the following features:
- System Restore (SR)
Creates and executes the following:
- <LS_APPDATA>\WINDOWS\SERVICES.EXE
- <LS_APPDATA>\WINDOWS\LSASS.EXE
- <LS_APPDATA>\WINDOWS\SMSS.EXE
- <SYSTEM32>\IExplorer.exe
- <LS_APPDATA>\WINDOWS\WINLOGON.EXE
- <LS_APPDATA>\WINDOWS\CSRSS.EXE
Executes the following:
- <SYSTEM32>\svchost.exe
Modifies settings of Windows Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoSetFolders' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRun' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFolderOptions' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRecentDocsMenu' = '00000001'
Modifies file system :
Creates the following files:
- C:\desktop.ini
- <LS_APPDATA>\WINDOWS\Microsoft Office Startup.bat
- C:\ash\Folder.htt
- C:\ash2.txt
- %WINDIR%\msvbvm60.dll
- C:\autorun.inf
- C:\Data %USERNAME%.exe
- C:\ANSAV.exe
- C:\msvbvm60.dll
- C:\ash\Winzip.exe
- C:\ash\msvbvm60.dll
- C:\ash1.txt
- <SYSTEM32>\shell.exe
- <SYSTEM32>\ash.scr
- C:\SVCHOST.exe
- %WINDIR%\SVCHOST.exe
- <SYSTEM32>\IExplorer.exe
- <LS_APPDATA>\WINDOWS\LSASS.EXE
- <LS_APPDATA>\WINDOWS\SMSS.EXE
- <LS_APPDATA>\WINDOWS\SERVICES.EXE
- <LS_APPDATA>\WINDOWS\WINLOGON.EXE
- <LS_APPDATA>\WINDOWS\CSRSS.EXE
Sets the 'hidden' attribute to the following files:
- C:\ash\msvbvm60.dll
- C:\msvbvm60.dll
- C:\ash\Folder.htt
- C:\desktop.ini
- <Drive name for removable media>:\ash\Folder.htt
- <Drive name for removable media>:\ash\msvbvm60.dll
- <Drive name for removable media>:\msvbvm60.dll
- <Drive name for removable media>:\desktop.ini
- <Drive name for removable media>:\autoexec.bat
- %WINDIR%\msvbvm60.dll
- <LS_APPDATA>\WINDOWS\CSRSS.EXE
- <LS_APPDATA>\WINDOWS\SERVICES.EXE
- <LS_APPDATA>\WINDOWS\WINLOGON.EXE
- <LS_APPDATA>\WINDOWS\LSASS.EXE
- <LS_APPDATA>\WINDOWS\SMSS.EXE
- C:\ash1.txt
- C:\ash2.txt
- %WINDIR%\SVCHOST.exe
- C:\SVCHOST.exe
Deletes the following files:
- %TEMP%\~DFF1BC.tmp
- %TEMP%\~DF9B06.tmp
- %TEMP%\~DF62DD.tmp
- %TEMP%\~DF96FA.tmp
- %TEMP%\~DFF9C0.tmp
- %TEMP%\~DF6C5E.tmp
- %TEMP%\~DF9EFC.tmp
Miscellaneous:
Searches for the following windows:
- ClassName: 'ComboBoxEx32' WindowName: ''
- ClassName: 'RebarWindow32' WindowName: ''
- ClassName: 'CabinetWClass' WindowName: ''
- ClassName: '#32770' WindowName: ''
- ClassName: 'Edit' WindowName: ''
- ClassName: 'ComboBox' WindowName: ''
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: 'RegEdit_RegEdit' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'ExploreWClass' WindowName: ''
- ClassName: '' WindowName: 'Local Settings'
- ClassName: '' WindowName: 'Folder Options'