Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SYS32DLL' = 'SYS32DLL'
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\SYS32DLL.exe'
Executes the following:
- '<SYSTEM32>\reg.exe' add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride /d "*.local;<local>" /f
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride /d "*.local;<local>" /f
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 01 /f
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v SYS32DLL /d SYS32DLL /f
- '<SYSTEM32>\reg.exe' add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 01 /f
- '<SYSTEM32>\netsh.exe' firewall add portopening TCP 80 SYS32DLL ENABLE
- '<SYSTEM32>\cmd.exe' /c c:\SYS32DLL.bat
- '<SYSTEM32>\netsh.exe' firewall add portopening TCP 7171 SYS32DLL ENABLE
- '<SYSTEM32>\reg.exe' add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7171" /f
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7171" /f
Modifies settings of Windows Internet Explorer:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyOverride' = '*.local;<local>'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyEnable' = '00000001'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyEnable' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyServer' = 'http=localhost:7171'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyServer' = 'http=localhost:7171'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyOverride' = '*.local;<local>'
Modifies file system :
Creates the following files:
- <SYSTEM32>\tmps.logef
- C:\tman.tmp
- C:\SYS32DLL.bat
- <SYSTEM32>\SYS32DLL.exe
Deletes itself.
Network activity:
Connects to:
- 'ma####052009.com':80
- 'zz##ns.com':80
TCP:
HTTP GET requests:
- zz##ns.com/v50/?v=################################
HTTP POST requests:
- ma####052009.com/tman/?a=######################
UDP:
- DNS ASK ma####052009.com
- DNS ASK zz##ns.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''