Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'vrw0rm' = '%HOMEPATH%\My Documents\sd.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\sd.exe
Malicious functions:
Terminates or attempts to terminate
the following system processes:
- <SYSTEM32>\schtasks.exe
Modifies file system:
Creates the following files:
- %TEMP%\sd.exe
- %HOMEPATH%\My Documents\sd.exe
Sets the 'hidden' attribute to the following files:
- %TEMP%\sd.exe
Network activity:
Connects to:
- 'localhost':1036
- 'localhost':7794
Miscellaneous:
Creates and executes the following:
- '%TEMP%\sd.exe'
- '%HOMEPATH%\My Documents\sd.exe'
Executes the following:
- '<SYSTEM32>\schtasks.exe' /create /sc minute /mo 1 /tn Skype /tr "%HOMEPATH%\My Documents\sd.exe"