Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'A335637237' = '%APPDATA%\A335637237.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'A335637237' = '%APPDATA%\A335637237.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'A335637237' = '%APPDATA%\A335637237.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\A335637237.exe
Malicious functions:
Creates and executes the following:
- '%TEMP%\AppServices.exe' 1
Executes the following:
- '<SYSTEM32>\schtasks.exe' /CREATE /SC ONLOGON /TN A335637237 /TR %APPDATA%\A335637237.exe
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\temp335637237.bat" "
Modifies file system :
Creates the following files:
- %APPDATA%\A335637237.exe
- %TEMP%\AppServices.exe
- %TEMP%\temp335637237.bat
Sets the 'hidden' attribute to the following files:
- %APPDATA%\A335637237.exe
- %HOMEPATH%\Start Menu\Programs\Startup\A335637237.exe
- %TEMP%\temp335637237.bat
Network activity:
Connects to:
- 'cm##.whhcd.info':6667
UDP:
- DNS ASK cm##.whhcd.info
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'