Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'MicrosoftВ® Windows Manager' = '%HOMEPATH%\M-1-25-5432-6437-5685\winmgr.exe'
Creates the following files on removable media
- <Drive name for removable media>:\winsvrm.exe
Malicious functions
To bypass firewall, removes or modifies the following registry keys
- [<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%HOMEPATH%\M-1-25-5432-6437-5685\winmgr.exe' = '%HOMEPATH%\M-1-25-...
Injects code into
the following user processes:
- winmgr.exe
Modifies file system
Creates the following files
- %HOMEPATH%\m-1-25-5432-6437-5685\winmgr.exe
Sets the 'hidden' attribute to the following files
- %HOMEPATH%\m-1-25-5432-6437-5685\winmgr.exe
- <Drive name for removable media>:\winsvrm.exe
Network activity
UDP
- DNS ASK ho##2525.ru
- DNS ASK ho##5000.ru
- DNS ASK sr##000.net
Miscellaneous
Creates and executes the following
- '%HOMEPATH%\m-1-25-5432-6437-5685\winmgr.exe'
- '%HOMEPATH%\m-1-25-5432-6437-5685\winmgr.exe' ' (with hidden window)