Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\Internet.exe
Malicious functions:
Creates and executes the following:
- '%TEMP%\ProgDVB7.06.1Pro.exe'
- '%TEMP%\Internet.exe'
Executes the following:
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\qiusdw7o.cmdline"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RESA.tmp" "%TEMP%\CSC9.tmp"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\_acjceq4.cmdline"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES8.tmp" "%TEMP%\CSC7.tmp"
Modifies file system :
Creates the following files:
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gT1MgQml0bmVzczogMzI=.bin
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gQ3VsdHVyZSBOYW1lOiBlbi1VUw==.bin
- %TEMP%\_acjceq4.cmdline
- %TEMP%\_acjceq4.0.cs
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gQ1BVIENvcmVzOiAy.bin
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\Usages.bin
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\info.dat
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm06IFdpbmRvd3MgWFA=.bin
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm06IC5ORVQgNC4wIGluc3RhbGxlZA==.bin
- %TEMP%\_acjceq4.out
- %TEMP%\CSC9.tmp
- %TEMP%\qiusdw7o.out
- %TEMP%\qiusdw7o.dll
- %TEMP%\RESA.tmp
- %TEMP%\qiusdw7o.cmdline
- %TEMP%\RES8.tmp
- %TEMP%\CSC7.tmp
- %TEMP%\qiusdw7o.0.cs
- %TEMP%\_acjceq4.dll
- <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\identity.dat
- %TEMP%\nsc5.tmp
- %WINDIR%\Internet.exe
- %TEMP%\nsc6.tmp\MultiUserConfig.ini
- %TEMP%\nsc6.tmp\QuickModePage.ini
- %TEMP%\aut3.tmp
- %TEMP%\Internet.exe
- %TEMP%\aut1.tmp
- %TEMP%\ProgDVB7.06.1Pro.exe
- %TEMP%\aut2.tmp
- %TEMP%\nsc6.tmp\SourceTypeConfig.ini
- %TEMP%\nsc6.tmp\nsSCM.dll
- %TEMP%\nsc6.tmp\Processes.dll
- %TEMP%\nsc6.tmp\InstallOptions.dll
- %TEMP%\nsc6.tmp\System.dll
- %TEMP%\nsc6.tmp\modern-wizard.bmp
- %TEMP%\nsc6.tmp\Configuration.ini
- %TEMP%\nsc6.tmp\InterfaceConfiguration.ini
- %TEMP%\nsc6.tmp\ioSpecial.ini
- %TEMP%\nsc6.tmp\components.ini
Deletes the following files:
- %TEMP%\_acjceq4.dll
- %TEMP%\_acjceq4.0.cs
- %TEMP%\_acjceq4.out
- %TEMP%\CSC9.tmp
- %TEMP%\RESA.tmp
- %TEMP%\_acjceq4.cmdline
- %TEMP%\aut2.tmp
- %TEMP%\aut1.tmp
- %TEMP%\aut3.tmp
- %TEMP%\CSC7.tmp
- %TEMP%\RES8.tmp
Network activity:
Connects to:
- 'sa######vice.red-gate.com':80
- 'is.gd':80
- 'wp#d':80
TCP:
HTTP GET requests:
- is.gd/M0Jbvl
- wp#d/wpad.dat
UDP:
- DNS ASK sa######vice.red-gate.com
- DNS ASK is.gd
- DNS ASK wp#d
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'