Technical Information
Malicious functions
Injects code into
the following system processes:
- %WINDIR%\explorer.exe
Modifies file system
Creates the following files
- C:\.trash-100\db\version
- C:\.trash-100\db\framework_exe
- C:\.trash-100\activatedesktop.exe
Substitutes the following files
- %ProgramFiles%\UNP\Logs\UpdateNotificationPipeline.001.etl
Network activity
TCP
HTTP GET requests
- http://ap#.vk.com/method/wall.get.xml
UDP
- DNS ASK s1#######29777.pa.infobox.ru
- DNS ASK share.microsoft.com
- DNS ASK go.microsoft.com
- DNS ASK settings-win.data.microsoft.com
- DNS ASK ap#.vk.com
- DNS ASK maps.windows.com
- DNS ASK dl.delivery.mp.microsoft.com
- DNS ASK ar#.msn.com
- DNS ASK im##########-rt-microsoft-com.akamaized.net
Miscellaneous
Creates and executes the following
- 'C:\.trash-100\activatedesktop.exe'
Executes the following
- '<SYSTEM32>\unp\updatenotificationmgr.exe'
- '<SYSTEM32>\apphostregistrationverifier.exe'
- '<SYSTEM32>\devicecensus.exe' UserCxt
- '<SYSTEM32>\svchost.exe' -k netsvcs -p