Technical Information
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\zx.exe'
- '<SYSTEM32>\zx.exe' (downloaded from the Internet)
Executes the following:
- '<SYSTEM32>\svchost.exe'
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system :
Creates the following files:
- <SYSTEM32>\zx.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\zx[1].exe
Network activity:
Connects to:
- 'www.pk##1.cn':80
- 'localhost':1036
TCP:
HTTP GET requests:
- www.pk##1.cn/di/zx.exe
UDP:
- DNS ASK www.pk##1.cn
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'