Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'b4e5f2eaf641d30d8c9aaad7703133d7' = '"%TEMP%\dll.exe" ..'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'b4e5f2eaf641d30d8c9aaad7703133d7' = '"%TEMP%\dll.exe" ..'
Creates the following files on removable media
- <Drive name for removable media>:\svchost.exe
- <Drive name for removable media>:\autorun.inf
Malicious functions
Executes the following
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%TEMP%\dll.exe" "dll.exe" ENABLE
Modifies file system
Creates the following files
- %TEMP%\dll.exe
- C:\svchost.exe
- C:\autorun.inf
- D:\svchost.exe
- D:\autorun.inf
Sets the 'hidden' attribute to the following files
- %TEMP%\dll.exe
- C:\svchost.exe
- C:\autorun.inf
- D:\svchost.exe
- D:\autorun.inf
- <Drive name for removable media>:\svchost.exe
- <Drive name for removable media>:\autorun.inf
Network activity
Connects to
- 'ch###.ddns.net':1177
UDP
- DNS ASK ch###.ddns.net
Miscellaneous
Creates and executes the following
- '%TEMP%\dll.exe'
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%TEMP%\dll.exe" "dll.exe" ENABLE' (with hidden window)