Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'wsrrrt3' = '%APPDATA%\shddatq\shccvs.exe'
Malicious functions:
Creates and executes the following:
- '%APPDATA%\shddatq\shccvs.exe'
Executes the following:
- '%WINDIR%\regedit.exe' /s "%TEMP%\wsrrrt3._eg"
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\sd_qocy.bat"
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\wsrrrt3.bat"
Modifies file system :
Creates the following files:
- %TEMP%\wsrrrt3._eg
- %APPDATA%\shddatq\shccvs.exe
- %TEMP%\wsrrrt3.bat
- %TEMP%\sd_qocy.bat
Deletes the following files:
- %TEMP%\wsrrrt3._eg
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'RegEdit_RegEdit' WindowName: '(null)'