Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'W32Time' = '%WINDIR%\Inf\svchost.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'W32Time' = '%WINDIR%\Inf\svchost.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\Recycler\S-1-2-06 87119119468910298974667111109.exe
- <Drive name for removable media>:\AutoRun.inf
Malicious functions:
Executes the following:
- '%WINDIR%\inf\svchost.exe'
- '<SYSTEM32>\cmd.exe' /c %WINDIR%\Inf\svchost.exe
- '%WINDIR%\explorer.exe' <Current directory>\<File name>
Modifies file system:
Creates the following files:
- C:\boot.ima
- C:\mkldr
- %WINDIR%\inf\svchost.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\Recycler\S-1-2-06 87119119468910298974667111109.exe
- <Drive name for removable media>:\AutoRun.inf
- C:\boot.ima
- C:\mkldr
Miscellaneous:
Searches for the following windows:
- ClassName: '' WindowName: ''