Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'UserFaultCheck' = ''
Creates or modifies the following files:
- %WINDIR%\Tasks\SA.DAT
Infects the following executable system files:
- <SYSTEM32>\qmgr.dll
Malicious functions:
Creates and executes the following:
- %TEMP%\Track.exe
Executes the following:
- <SYSTEM32>\dumprep.exe 1140 -dm 7 7 %WINDIR%\PCHealth\ErrorRep\UserDumps\svchost.exe.20121013-063358-00.hdmp 16325836412029616
- <SYSTEM32>\svchost.exe -k netsvcs
- <SYSTEM32>\cmd.exe /c ""%TEMP%\FoxLoad.bat" "
- <SYSTEM32>\dumprep.exe 1140 -dm 7 7 %WINDIR%\PCHealth\ErrorRep\UserDumps\svchost.exe.20121013-063358-00.mdmp 16325836412029616
Terminates or attempts to terminate
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system :
Creates the following files:
- <SYSTEM32>\dllcache\lsasvc.dll
- %WINDIR%\pchealth\ERRORREP\UserDumps\svchost.exe.20121013-063358-00.hdmp
- %TEMP%\Track.exe
- %TEMP%\FoxLoad.bat
Deletes the following files:
- %TEMP%\Track.exe
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''