Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
- [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
- [HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Modifies file system
Creates the following files
- %WINDIR%\syswow64\setup\winlogons.exe
- %WINDIR%\syswow64\setup\desktop.sys
- %WINDIR%\syswow64\setup\explorer.sys
- %WINDIR%\syswow64\setup\user32.dll
- %WINDIR%\syswow64\setup\gdi32.dll
- %WINDIR%\syswow64\setup\win.ini
Sets the 'hidden' attribute to the following files
- %WINDIR%\syswow64\setup\winlogons.exe
Network activity
Connects to
- '255.255.255.255':81
UDP
- DNS ASK cr###r0x.net
Miscellaneous
Searches for the following windows
- ClassName: 'HijackThis' WindowName: ''
- ClassName: 'TAAWCore' WindowName: ''
- ClassName: '' WindowName: 'Microsoft AntiSpyware AutoUpdater'
- ClassName: '' WindowName: 'Microsoft AntiSpyware (Beta 1)'
- ClassName: 'ThunderRT6FormDC' WindowName: 'gcasDtServHolder'
- ClassName: 'Sym_ccWebWindow_Class' WindowName: 'Norton AntiVirus'
- ClassName: '' WindowName: 'AVG Anti-Virus 7.1'
- ClassName: '' WindowName: 'AnalogX PacketMon (www.analogx.com)'
- ClassName: 'IrisWnd' WindowName: ''
- ClassName: '' WindowName: 'CommView'
- ClassName: '' WindowName: 'EtherDetect'
- ClassName: '' WindowName: 'Sniffem'
- ClassName: 'LF-MAIN' WindowName: ''
- ClassName: '' WindowName: 'Sniphere v2.0'
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: 'SandboxieControlWndClass' WindowName: ''
Creates and executes the following
- '%WINDIR%\syswow64\setup\winlogons.exe' /del <Full path to file>
Executes the following
- '%WINDIR%\syswow64\setup\winlogons.exe' /del <Full path to file>' (with hidden window)