Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'run' = '<SYSTEM32>\lgpvdngrn\csrss.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '<SYSTEM32>\lgpvdngrn\csrss.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'csrss' = ''
- [<HKLM>\SOFTWARE\Classes\regfile\shell\open\command] '' = 'ќњ1j'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'csrss' = ''
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\csrss.lnk
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Creates and executes the following:
- <SYSTEM32>\lgpvdngrn\csrss.exe
Executes the following:
- <SYSTEM32>\cmd.exe /c %TEMP%\del2.bat
Terminates or attempts to terminate
the following user processes:
- zlclient.exe
- smc.exe
- outpost.exe
Searches for registry branches where third party applications store passwords:
- [<HKCU>\Software\Microsoft\MessengerService]
Modifies file system :
Creates the following files:
- <SYSTEM32>\netstat.com
- <SYSTEM32>\taskkill.com
- <SYSTEM32>\lgpvdngrn\csrss.ini
- <SYSTEM32>\lgpvdngrn\csrss.exe
- %TEMP%\del2.bat
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\taskkill.com
- %HOMEPATH%\Start Menu\Programs\Startup\csrss.lnk
- <SYSTEM32>\lgpvdngrn\csrss.exe
- <SYSTEM32>\netstat.com
Deletes the following files:
- <DRIVERS>\etc\hosts
- <SYSTEM32>\lgpvdngrn\csrss.ini
Substitutes the HOSTS file.
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''