Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Run' = '%WINDIR%\services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Windows Update Client' = '%WINDIR%\services.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\pukka.scr
- <Drive name for removable media>:\URL List.txt.scr
Malicious functions:
Executes the following:
- '<SYSTEM32>\cmd.exe' /c "%HOMEPATH%\Cookies\bin.bat"
- '<SYSTEM32>\tskill.exe' wscript
- '<SYSTEM32>\tskill.exe' services
Modifies file system :
Creates the following files:
- C:\URL List.txt.scr
- C:\pukka.scr
- C:\autorun.inf
- %WINDIR%\services.exe
- %HOMEPATH%\Cookies\bin.bat
Sets the 'hidden' attribute to the following files:
- C:\pukka.scr
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\pukka.scr
- <Full path to virus>
- %WINDIR%\services.exe
- C:\autorun.inf
Deletes the following files:
- %HOMEPATH%\Cookies\bin.bat
Modifies the HOSTS file.
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''