Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'usnscv.exe' = '"<LS_APPDATA>\usnscv.exe" /background'
Malicious functions:
Creates and executes the following:
- '<LS_APPDATA>\charmap.exe'
Executes the following:
- '<SYSTEM32>\cmd.exe' /c ""<Current directory>\winupdate.bat" "
Modifies file system :
Creates the following files:
- <LS_APPDATA>\usnscv.exe
- <LS_APPDATA>\charmap.exe
- <Current directory>\winupdate.bat
Network activity:
Connects to:
- '17#.#38.160.18':80
TCP:
HTTP GET requests:
- 17#.#38.160.18/getme.php?u=#######
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''