Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,%PROGRAM_FILES%\microsoft\watermark.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\RECYCLER\S-3-6-01-5754620102-1334737640-061201044-8252\uJIxeMUp.cpl
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\RECYCLER\S-3-6-01-5754620102-1334737640-061201044-8252\NhTcjZrg.exe
Malicious functions:
Creates and executes the following:
- %PROGRAM_FILES%\Microsoft\WaterMark.exe
Executes the following:
- <SYSTEM32>\svchost.exe
Injects code into
the following system processes:
- <SYSTEM32>\cscript.exe
a large number of user processes.
Modifies file system :
Creates the following files:
- <SYSTEM32>\dmlconf.dat
- %PROGRAM_FILES%\Microsoft\WaterMark.exe
Network activity:
Connects to:
- 'er#####dthetcwerc.com':443
- 'rv####eitwjeitv.com':443
- 'rt######tutnrsbberve.com':443
- '91.##0.62.30':443
- '74.##5.232.51':80
UDP:
- DNS ASK er#####dthetcwerc.com
- DNS ASK rv####eitwjeitv.com
- DNS ASK google.com
- DNS ASK rt######tutnrsbberve.com