Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\RpcS] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\RpcS.exe'
Executes the following:
- '<SYSTEM32>\cmd.exe' /c %TEMP%\\delmeexe.bat
Modifies file system :
Creates the following files:
- %TEMP%\delmeexe.bat
- C:\Documents and Settings\LocalService\Favorites\Desktop.ini
- <SYSTEM32>\RpcS.exe
- <SYSTEM32>\RpcS.dll
Sets the 'hidden' attribute to the following files:
- C:\Documents and Settings\LocalService\Favorites\Desktop.ini
Deletes itself.
Network activity:
Connects to:
- 'ho##.3322.org':80
UDP:
- DNS ASK ho##.3322.org
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''