Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Update' = '%HOMEPATH%\Recent\TGTGT\gbgbgbg.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Update' = '%HOMEPATH%\Recent\TGTGT\gbgbgbg.exe'
Malicious functions:
Executes the following:
- '%HOMEPATH%\Recent\TGTGT\gbgbgbg.exe'
Injects code into
the following user processes:
- gbgbgbg.exe
Modifies file system:
Creates the following files:
- %TEMP%\vmfcgqc
- %TEMP%\aut1.tmp
- %HOMEPATH%\Recent\TGTGT\gbgbgbg.exe
Deletes the following files:
- %TEMP%\vmfcgqc
- %TEMP%\aut1.tmp