Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'msconfiq' = 'E:\Recycler\SMSS.exe '
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'smss' = '<Drive name for removable media>:\Recycler\smss.exe '
Creates or modifies the following files:
- %ALLUSERSPROFILE%\Start Menu\Programs\Startup\smss.exe
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.INF
- <Drive name for removable media>:\Recycler\smss.exe
Malicious functions:
Creates and executes the following:
- <Drive name for removable media>:\Recycler\smss.exe
Executes the following:
- <SYSTEM32>\net1.exe share Love1=%WINDIR% /unlimited
- <SYSTEM32>\net1.exe share Love3=<Drive name for removable media>:\ /unlimited
- <SYSTEM32>\net1.exe share Love2="c:\Documents and Settings" /unlimited
- <SYSTEM32>\reg.exe ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "<Drive name for removable media>:\Recycler\smss.exe " /f
- <SYSTEM32>\reg.exe ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V msconfiq /t REG_SZ /D "E:\Recycler\SMSS.exe " /f
Modifies file system :
Creates the following files:
- C:\autorun.INF
- C:\RECYCLER\smss.exe
Sets the 'hidden' attribute to the following files:
- C:\autorun.INF
- <Drive name for removable media>:\autorun.INF
Miscellaneous:
Searches for the following windows:
- ClassName: 'combobox' WindowName: ''
- ClassName: 'comboboxex32' WindowName: ''
- ClassName: '' WindowName: 'Microsoft_Games'
- ClassName: 'edit' WindowName: ''
- ClassName: 'cabinetwclass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'rebarwindow32' WindowName: ''
- ClassName: 'workerw' WindowName: ''