Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\winpnp32] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- <SYSTEM32>\winpnp32.exe
Executes the following:
- <SYSTEM32>\dumprep.exe 2876 -dm 7 7 %TEMP%\WERee8b.dir00\explorer.exe.hdmp 16325836412027152
- <SYSTEM32>\rundll32.exe <SYSTEM32>\sysdm.cpl,NoExecuteProcessException %WINDIR%\explorer.exe
- %WINDIR%\explorer.exe
- <SYSTEM32>\dumprep.exe 2876 -dm 7 7 %TEMP%\WERee8b.dir00\explorer.exe.mdmp 16325836412027132
Modifies file system :
Creates the following files:
- %TEMP%\WERee8b.dir00\appcompat.txt
- %TEMP%\WERee8b.dir00\manifest.txt
- %TEMP%\WERee8b.dir00\explorer.exe.hdmp
- <SYSTEM32>\winpnp32.exe
- %TEMP%\WERee8b.dir00\explorer.exe.mdmp
Network activity:
Connects to:
- 'ow###.game2max.net':18067
UDP:
- DNS ASK ow###.game2max.net
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''