Technical Information
To ensure autorun and distribution:
Infects the following executable system files:
- %WINDIR%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
Malicious functions:
Executes the following:
- '<SYSTEM32>\rundll32.exe' %TEMP%\ir6zd.dat,XFG04
- '<SYSTEM32>\rundll32.exe' %TEMP%\ir6zd.dat,XFG06
- '<SYSTEM32>\ctfmon.exe'
- '<SYSTEM32>\rundll32.exe' %TEMP%\ir6zd.dat,XFG03
- '<SYSTEM32>\rundll32.exe' %TEMP%\ir6zd.dat,XFG00
- '<SYSTEM32>\wermgr.exe' -queuereporting
- '<SYSTEM32>\rundll32.exe' %TEMP%\ir6zd.dat,XFG01
Modifies settings of Windows Internet Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1609' = '00000000'
Modifies file system :
Creates the following files:
- %TEMP%\dz6ri.js
- %APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\regmonstd.lnk
- %TEMP%\ir6zd.dat
- C:\ProgramData\ir6zd.dat
- %TEMP%\dz6ri.pad
Network activity:
Connects to:
- '64.##1.122.10':80
UDP:
- '23#.#55.255.250':1900
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'