Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\software\Microsoft\Windows\CurrentVersion\Run] '1a584161e4e50ebd4d13ee13b94ef19c' = '"<Full path to file>" ..'
- [<HKLM>\software\Microsoft\Windows\CurrentVersion\Run] '1a584161e4e50ebd4d13ee13b94ef19c' = '"<Full path to file>" ..'
Creates or modifies the following files
- %HOMEPATH%\start menu\programs\startup\1a584161e4e50ebd4d13ee13b94ef19c.exe
Creates the following files on removable media
- <Drive name for removable media>:\1a584161e4e50ebd4d13ee13b94ef19c.exe
- <Drive name for removable media>:\autorun.inf
Malicious functions
To bypass firewall, removes or modifies the following registry keys
- [<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to file>' = '<Full path to file>:*:Enabled:<File name>....
Executes the following
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "<Full path to file>" "<File name>.exe" ENABLE
Modifies file system
Sets the 'hidden' attribute to the following files
- <Drive name for removable media>:\1a584161e4e50ebd4d13ee13b94ef19c.exe
- <Drive name for removable media>:\autorun.inf
Network activity
Connects to
- 'localhost':1000
Miscellaneous
Creates and executes the following
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "<Full path to file>" "<File name>.exe" ENABLE' (with hidden window)