Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\WindowsDown] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- <SYSTEM32>\gezi0802.exe
- <SYSTEM32>\servet.exe
- <SYSTEM32>\gezi0802.exe (downloaded from the Internet)
Executes the following:
- <SYSTEM32>\cmd.exe /c <SYSTEM32>\Deledomn.bat
Modifies file system :
Creates the following files:
- <SYSTEM32>\gezi0802.exe
- C:\AutoRun.inf
- C:\servet.exe
- <SYSTEM32>\servet.exe
- <SYSTEM32>\Deledomn.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\gezi0802[1].exe
Sets the 'hidden' attribute to the following files:
- C:\servet.exe
- C:\AutoRun.inf
- <SYSTEM32>\servet.exe
Deletes itself.
Network activity:
Connects to:
- 'dj##1521.cn':80
- 'localhost':1036
TCP:
HTTP GET requests:
- dj##1521.cn/gezi0802.exe
UDP:
- DNS ASK dj##1521.cn
Miscellaneous:
Searches for the following windows:
- ClassName: '#32770' WindowName: 'IE????????'
- ClassName: '#32770' WindowName: '???????????????????? - IE??????'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '#32770' WindowName: 'IE ????????'