Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\software\Microsoft\Windows\CurrentVersion\Run] '4cd071c8714b30ad2e17828cfd4364c9' = '"%TEMP%\server.exe" ..'
- [<HKLM>\software\Microsoft\Windows\CurrentVersion\Run] '4cd071c8714b30ad2e17828cfd4364c9' = '"%TEMP%\server.exe" ..'
Creates or modifies the following files
- %APPDATA%\microsoft\windows\start menu\programs\startup\4cd071c8714b30ad2e17828cfd4364c9.exe
Creates the following files on removable media
- <Drive name for removable media>:\4cd071c8714b30ad2e17828cfd4364c9.exe
- <Drive name for removable media>:\autorun.inf
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Executes the following
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\server.exe" "server.exe" ENABLE
Modifies file system
Creates the following files
- %TEMP%\server.exe
Sets the 'hidden' attribute to the following files
- <Drive name for removable media>:\4cd071c8714b30ad2e17828cfd4364c9.exe
- <Drive name for removable media>:\autorun.inf
- %TEMP%\server.exe
- %APPDATA%\microsoft\windows\start menu\programs\startup\4cd071c8714b30ad2e17828cfd4364c9.exe
Miscellaneous
Creates and executes the following
- '%TEMP%\server.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\server.exe" "server.exe" ENABLE' (with hidden window)