Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'user1' = '<SYSTEM32>\csrssc.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
Malicious functions:
Executes the following:
- <SYSTEM32>\reg.exe add HKLM\SOFTWARE\microsoft\windows\currentversion\run /v user1 /d <SYSTEM32>\csrssc.exe /F
- <SYSTEM32>\reg.exe delete HKCU\software\microsoft\windows\currentversion\explorer\advanced /v Hidden /f
- <SYSTEM32>\cmd.exe /c Epi.bat
- <SYSTEM32>\cmd.exe /c <SYSTEM32>\microsoft\data.bat
Modifies file system :
Creates the following files:
- <SYSTEM32>\Microsoft\data.bat
- <SYSTEM32>\system.inf
- <Current directory>\Epi.bat
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <SYSTEM32>\system.inf
Miscellaneous:
Searches for the following windows:
- ClassName: '' WindowName: ''