Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '23ef55143059436f' = '<LS_APPDATA>\ufngq\ufngq.exe'
Malicious functions:
Injects code into
the following system processes:
- <SYSTEM32>\cscript.exe
- <Auxiliary element>
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\ctfmon.exe
a large number of user processes.
Modifies file system :
Creates the following files:
- <LS_APPDATA>\ufngq\ufngq.exe
Deletes itself.
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''