Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Magicfile' = '%APPDATA%\Cybtest.exe'
Malicious functions
Injects code into
the following system processes:
- %WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe
Modifies file system
Creates the following files
- %APPDATA%\cybtest.exe
- %WINDIR%\syswow64\windir\svchost.exe
- %TEMP%\user2.txt
- %TEMP%\user7
- %TEMP%\user8
Deletes the following files
- %TEMP%\user2.txt
- %TEMP%\user8
- %TEMP%\user7
Substitutes the following files
- %TEMP%\user8
- %TEMP%\user7
Network activity
UDP
- DNS ASK ji#.#apto.org
Miscellaneous
Creates and executes the following
- '%WINDIR%\syswow64\windir\svchost.exe'
Executes the following
- '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe'
- '%ProgramFiles(x86)%\internet explorer\iexplore.exe'