Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ByjJjqlf' = '%TEMP%\byjjjqlf.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'RarExsdb' = '<LS_APPDATA>\jwaroevi\rarexsdb.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,<LS_APPDATA>\jwaroevi\rarexsdb.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
- Windows Update
- Windows Security Center
blocks the following features:
- Windows Security Center
Creates and executes the following:
- '%TEMP%\byjjjqlf.exe'
Executes the following:
- '<SYSTEM32>\svchost.exe'
- '%TEMP%\byjjjqlf.exe'
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system:
Creates the following files:
- <LS_APPDATA>\jwaroevi\rarexsdb.exe
- %TEMP%\ifqydaby.exe
- <LS_APPDATA>\lawhwilb.log
- %TEMP%\byjjjqlf.exe
- %ALLUSERSPROFILE%\Application Data\ybfcuwpc.log
Sets the 'hidden' attribute to the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Network activity:
Connects to:
- 'qa#####urmebijlnd.com':443
- 'en###pax.com':443
- 'bg###orpy.com':443
- 'gw#####secbnejofng.com':443
- 'uu###nsf.com':443
- 'ne###myfjth.com':443
- 'ww####nlhfllneb.com':443
- '91.##7.104.175':443
- '74.##5.232.51':80
- 'jw###tioead.com':443
- 'xq#####tpqbxixjp.com':443
- 'pk#####uudiqrmyyi.com':443
UDP:
- DNS ASK xg####pjxsqknl.com
- DNS ASK qr####bwqxsoh.com
- DNS ASK gw#####secbnejofng.com
- DNS ASK cw###rwkg.com
- DNS ASK pt####pddptyy.com
- DNS ASK ea###jvlfd.com
- DNS ASK ip#####dubxckjmjcuv.com
- DNS ASK wb####jkfkcpn.com
- DNS ASK yy###skalki.com
- DNS ASK uu###nsf.com
- DNS ASK pk#####uudiqrmyyi.com
- DNS ASK xq#####tpqbxixjp.com
- DNS ASK google.com
- DNS ASK ww####nlhfllneb.com
- DNS ASK jw###tioead.com
- DNS ASK qa#####urmebijlnd.com
- DNS ASK ne###myfjth.com
- DNS ASK bg###orpy.com
- DNS ASK en###pax.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''