Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Update' = '%APPDATA%\WindowsUpdate.exe'
Creates the following files on removable media
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\sys.exe
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Modifies file system
Creates the following files
- %APPDATA%\pid.txt
- %APPDATA%\pidloc.txt
- %APPDATA%\windowsupdate.exe
Sets the 'hidden' attribute to the following files
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\sys.exe
Network activity
TCP
HTTP GET requests
- http://wh#####yipaddress.com/
- http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/02FAF3E291435468607857694DF5E45B68851868.crt
UDP
- DNS ASK wh#####yipaddress.com