Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Update' = '%APPDATA%\Update.exe'
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\] 'Startup' = '%APPDATA%\Microsoft\igfxsrvc.exe'
Creates the following files on removable media
- <Drive name for removable media>:\igfxsrvc.exe
- <Drive name for removable media>:\autorun.inf
Malicious functions
Injects code into
the following system processes:
- %WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe
Modifies file system
Creates the following files
- %LOCALAPPDATA%\microsoft\windows\<INETFILES>\www.freepix4all.com (2).jpg
- %APPDATA%\update.exe
- %APPDATA%\microsoft\igfxsrvc.exe
Sets the 'hidden' attribute to the following files
- %APPDATA%\microsoft\igfxsrvc.exe
- <Drive name for removable media>:\igfxsrvc.exe
- <Drive name for removable media>:\autorun.inf
Network activity
Connects to
- '255.255.255.255':3086
UDP
- DNS ASK ye###.no-ip.info
Miscellaneous
Executes the following
- '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe'
- '%ProgramFiles(x86)%\internet explorer\iexplore.exe'