Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "C:\explorer.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'gspgguweh.exe' = '%HOMEPATH%\Local Settings\gspgguweh.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, C:\explorer.exe'
- [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = 'MR_COO~1.SCR'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'wtgelx' = 'rubwva.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\winlogon.exe
Infects the following executable system files:
- <SYSTEM32>\msvbvm60.dll
Creates the following files on removable media:
- <Drive name for removable media>:\Mr_CF\Folder.htt
- <Drive name for removable media>:\Desktop.ini
- <Drive name for removable media>:\Mr_CF\Mr_CF.exe
- <Drive name for removable media>:\Mr_CoolFace.scr
- <Drive name for removable media>:\Autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks the following features:
- System Restore (SR)
Creates and executes the following:
- %HOMEPATH%\Local Settings\gspgguweh.exe
- %TEMP%\inf4D2.tmp
Executes the following:
- %WINDIR%\explorer.exe
Terminates or attempts to terminate
the following system processes:
- %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
- %APPDATA%\Mutant.exe
- %APPDATA%\Sahang.exe
- %APPDATA%\Timah.exe
- %APPDATA%\explorer.exe
- %APPDATA%\Mr_CoolFace.exe
- %APPDATA%\SMA Negeri 1 Pangkalpinang.exe
- <LS_APPDATA>\Polymorph1.exe
- %HOMEPATH%\Local Settings\DNALSI_AKGNAB.exe.mutant
- %HOMEPATH%\Local Settings\Mr_CF_Mutation.Excalibur
- %HOMEPATH%\Local Settings\gspgguweh.exe
- <LS_APPDATA>\Polymorph2.exe
- <SYSTEM32>\Mr_CoolFace.scr
- C:\explorer.exe
- %WINDIR%\Negeri Serumpun Sebalai .pif .bat .com .scr .exe
- %APPDATA%\Autorun.inf
- %APPDATA%\Mr_CF\Folder.htt
- %APPDATA%\Mr_CF\Desktop.ini
- %TEMP%\inf4D2.tmp
- %HOMEPATH%\Desktop\Message For My Princess.txt
- %HOMEPATH%\Desktop\Message For My Princess.scr
- C:\Mr_CoolFace.scr
- C:\Desktop.ini
- %HOMEPATH%\Local Settings\DNALSI_AKGNAB.exe
- <SYSTEM32>\rubwva.exe
- C:\Autorun.inf
- C:\Mr_CF\Mr_CF.exe
- C:\Mr_CF\Folder.htt
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\Mr_CF\Folder.htt
- <Drive name for removable media>:\Desktop.ini
- <SYSTEM32>\rubwva.exe
- C:\explorer.exe
- <SYSTEM32>\Mr_CoolFace.scr
- <Drive name for removable media>:\Mr_CoolFace.scr
- C:\Mr_CoolFace.scr
- C:\Autorun.inf
- C:\Desktop.ini
- <Drive name for removable media>:\Autorun.inf
- C:\Mr_CF\Folder.htt
Miscellaneous:
Searches for the following windows:
- ClassName: 'BaseBar' WindowName: 'ChanApp'
- ClassName: 'SysListView32' WindowName: ''
- ClassName: '' WindowName: 'Zanda'
- ClassName: 'Proxy Desktop' WindowName: ''
- ClassName: 'CSCHiddenWindow' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'OleMainThreadWndClass' WindowName: ''
- ClassName: 'SystemTray_Main' WindowName: ''
- ClassName: '' WindowName: 'Process Explorer'
- ClassName: '' WindowName: 'Multikiller'
- ClassName: '' WindowName: 'Multikiller2'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: '` `'
- ClassName: '' WindowName: 'System Restore'
- ClassName: '' WindowName: 'Process Viewer'
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: '' WindowName: 'System Configuration Utility'