Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Drive Guard32' = '%HOMEPATH%\DrvGuard32.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\aUtOruN.iNf
- <Drive name for removable media>:\RECYCLER\S-1-6-21-2434476501-1644491937-600003330-1213\DrvGuard32.exe
- <Drive name for removable media>:\RECYCLER\S-1-6-21-2434476501-1644491937-600003330-1213\Desktop.iNi
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKCU>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '' = ':*:Enabled:GFdert32'
Creates and executes the following:
- %HOMEPATH%\DrvGuard32.exe
Modifies file system :
Creates the following files:
- %HOMEPATH%\DrvGuard32.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\RECYCLER\S-1-6-21-2434476501-1644491937-600003330-1213\DrvGuard32.exe
- %HOMEPATH%\DrvGuard32.exe
Deletes the following files:
- <Drive name for removable media>:\RECYCLER\S-1-6-21-2434476501-1644491937-600003330-1213\Desktop.iNi
Network activity:
Connects to:
- 'xh###emon.info':51987
UDP:
- DNS ASK xh###emon.info
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''