Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\ynnwxgsm] 'ImagePath' = '<SYSTEM32>\ynnwxgsm\xkajuhuo.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\ynnwxgsm] 'ImagePath' = '<SYSTEM32>\ynnwxgsm\xkajuhuo.exe /d"<Full path to file>"'
- [<HKLM>\SYSTEM\ControlSet001\Services\ynnwxgsm] 'Start' = '00000002'
Malicious functions:
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system:
Creates the following files:
- %TEMP%\xkajuhuo.exe
Deletes the following files:
- <Full path to file>
Moves the following files:
- from %TEMP%\xkajuhuo.exe to <SYSTEM32>\ynnwxgsm\xkajuhuo.exe
Network activity:
Connects to:
- 'la##stax.ru':443
- '43.#31.4.7':443
UDP:
- DNS ASK la##stax.ru
Miscellaneous:
Creates and executes the following:
- '<SYSTEM32>\ynnwxgsm\xkajuhuo.exe' /d"<Full path to file>"
Executes the following:
- '<SYSTEM32>\sc.exe' description ynnwxgsm "wifi internet conection"
- '<SYSTEM32>\sc.exe' start ynnwxgsm
- '<SYSTEM32>\svchost.exe'
- '<SYSTEM32>\cmd.exe' /C mkdir <SYSTEM32>\ynnwxgsm\
- '<SYSTEM32>\cmd.exe' /C move /Y "%TEMP%\xkajuhuo.exe" <SYSTEM32>\ynnwxgsm\
- '<SYSTEM32>\sc.exe' create ynnwxgsm binPath= "<SYSTEM32>\ynnwxgsm\xkajuhuo.exe /d\"<Full path to file>\"" type= own start= auto DisplayName= "wifi support"