Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'WinUpdate Security' = '%WINDIR%\Winupdt.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\msrdmsn.exe
Malicious functions:
Executes the following:
- '<SYSTEM32>\attrib.exe' +h c:\winbckp.txt
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\Icons[1].css
- %WINDIR%\Icons.css
- <SYSTEM32>\comdlg32.ocx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\comdlg32[1].css
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\msrdmsn.exe
- <Drive name for removable media>:\autorun.inf
Moves the following files:
- from %WINDIR%\Icons.css to %WINDIR%\Icons.rar
Network activity:
Connects to:
- 'ta######destr0.sytes.net':51500
- 'ht#####nce.bounceme.net':6666
- 'localhost':1035
- 'up#####inall.sytes.net':80
TCP:
HTTP GET requests:
- up#####inall.sytes.net/updt/Icons.css
- up#####inall.sytes.net/updt/comdlg32.css
UDP:
- DNS ASK ht#####nce.bounceme.net
- DNS ASK ta######destr0.sytes.net
- DNS ASK up#####inall.sytes.net
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''