Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'iexplore' = '"<SYSTEM32>\GG.exe"'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
Malicious functions:
Creates and executes the following:
- %WINDIR%\csrss.exe
Executes the following:
- <SYSTEM32>\wscript.exe "<SYSTEM32>\eventquery4.vbs"
Terminates or attempts to terminate
the following user processes:
- AVPM.EXE
- AVSYNMGR.EXE
- gw.exe
- AVGCC32.EXE
- AVGCTRL.EXE
- AVP32.EXE
Modifies file system :
Creates the following files:
- <SYSTEM32>\eventquery4.vbs
- C:\autorun.inf
- %WINDIR%\csrss.exe
Deletes the following files:
- %TEMP%\~DFBBC4.tmp
- %WINDIR%\csrss.exe
Miscellaneous:
Searches for the following windows:
- ClassName: 'IEFrame' WindowName: ''
- ClassName: 'Edit' WindowName: ''
- ClassName: 'WorkerW' WindowName: 'Navigation Bar'
- ClassName: 'ExploreWClass' WindowName: ''
- ClassName: 'Address Band Root' WindowName: ''
- ClassName: 'WorkerW' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'ReBarWindow32' WindowName: ''
- ClassName: 'ComboBox' WindowName: ''
- ClassName: 'ComboBoxEx32' WindowName: ''