Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Optiinfo' = '%APPDATA%\FlasgMgr\PATHasks.exe'
Creates the following services
- [<HKLM>\System\CurrentControlSet\Services\mobsHost] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\mobsHost] 'ImagePath' = '<SYSTEM32>\mobsHost.exe -s'
Malicious functions
Injects code into
the following system processes:
- %WINDIR%\explorer.exe
the following user processes:
- iexplore.exe
Hooks functions
in browsers
- firefox.exe process, nss3.dll module
- iexplore.exe process, wininet.dll module
Modifies file system
Creates the following files
- %APPDATA%\flasgmgr\pathasks.exe
- %WINDIR%\syswow64\mobshost.exe
- %TEMP%\~16a7.tmp
- %TEMP%\~1715.tmp
- %WINDIR%\temp\~1aae.tmp
- %TEMP%\~3fe9.tmp
- %WINDIR%\temp\~5288.tmp
- %WINDIR%\temp\~6891.tmp
- %TEMP%\~69e8.tmp
- %TEMP%\~69f9.tmp
- %WINDIR%\temp\~7e4d.tmp
- %WINDIR%\temp\~814b.tmp
- %TEMP%\~839b.tmp
- %TEMP%\~84d5.tmp
Deletes the following files
- %TEMP%\~16a7.tmp
- %WINDIR%\temp\~1aae.tmp
- %WINDIR%\temp\~5288.tmp
- %WINDIR%\temp\~6891.tmp
- %TEMP%\~3fe9.tmp
- %TEMP%\~1715.tmp
- %WINDIR%\temp\~7e4d.tmp
- %TEMP%\~69e8.tmp
- %WINDIR%\temp\~814b.tmp
- %TEMP%\~69f9.tmp
- %TEMP%\~839b.tmp
- %TEMP%\~84d5.tmp
Miscellaneous
Creates and executes the following
- '%APPDATA%\flasgmgr\pathasks.exe'
- '%WINDIR%\syswow64\mobshost.exe' -s
- '%TEMP%\~16a7.tmp' 250376 1640 1
- '%TEMP%\~3fe9.tmp' 250376 940 2
- '%WINDIR%\temp\~1aae.tmp' 250376 2100 2
- '%TEMP%\~1715.tmp' 250376 1640 2
- '%WINDIR%\temp\~5288.tmp' 250376 2100 2
- '%WINDIR%\temp\~6891.tmp' 250376 2100 2
- '%TEMP%\~69e8.tmp' 250376 940 2
- '%TEMP%\~69f9.tmp' 250376 1640 2
- '%WINDIR%\temp\~7e4d.tmp' 250376 2100 2
- '%WINDIR%\temp\~814b.tmp' 250376 2100 2
- '%TEMP%\~839b.tmp' 250376 940 2
- '%TEMP%\~84d5.tmp' 250376 1640 2
- '%WINDIR%\syswow64\werfault.exe' -u -p 2612 -s 244' (with hidden window)