Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'urlspace' = '%APPDATA%\Spiritsoft\urlspirit\jlguaji.exe -h'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%APPDATA%\Spiritsoft\urlspirit\jlguaji.exe' = '%APPDATA%\Spiritsoft\urlspirit\jlguaji.exe:*:Enabled:精灵软件'
Creates and executes the following:
- '%APPDATA%\Spiritsoft\urlspirit\jlguaji.exe'
Executes the following:
- '<SYSTEM32>\taskkill.exe' /f /im Ksafetray.exe
Modifies file system :
Creates the following files:
- %APPDATA%\Spiritsoft\urlspirit\product.dat
- %APPDATA%\Spiritsoft\urlspirit\jlguaji.exe
Network activity:
Connects to:
- 'ur#####it.urlspirit.com':80
- 'ba##.#piritsoft.cn':80
- 'ur#####it.spiritsoft.cn':80
TCP:
HTTP GET requests:
- ba##.#piritsoft.cn/urlcore/olgjcfgs.dat?q=#####
- ur#####it.urlspirit.com/urlcore/olgjcfgs.dat?q=#####
- ba##.#piritsoft.cn/urlcore/olgjcfgs.dat?q=####
- ur#####it.spiritsoft.cn/urlcore/olgjcfgs.dat?q=##
- ur#####it.spiritsoft.cn/urlcore/olgjcfgs.dat?q=#####
UDP:
- DNS ASK ur#####it.urlspirit.com
- DNS ASK ba##.#piritsoft.cn
- DNS ASK ur#####it.spiritsoft.cn
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'Button' WindowName: '????'
- ClassName: 'Edit' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: '(null)' WindowName: '??????? 4.0.1'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: '(null)' WindowName: '(null)'