Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'svchost.exe' = '%APPDATA%\Microsoft\svchost.exe'
Creates the following files on removable media
- <Drive name for removable media>:\svchost.exe
- <Drive name for removable media>:\autorun.inf
Malicious functions
Injects code into
the following user processes:
- svchost.exe
Searches for windows to
detect analytical utilities:
- ClassName: '', WindowName: 'The Wireshark Network Analyzer'
- ClassName: '', WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '', WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '', WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
Modifies file system
Creates the following files
- %APPDATA%\microsoft\svchost.exe
Sets the 'hidden' attribute to the following files
- %APPDATA%\microsoft\svchost.exe
- <Drive name for removable media>:\svchost.exe
- <Drive name for removable media>:\autorun.inf
Network activity
UDP
- DNS ASK im####s.no-ip.info
Miscellaneous
Creates and executes the following
- '%APPDATA%\microsoft\svchost.exe'