Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\NetMan1] 'Start' = '00000002'
Malicious functions:
Executes the following:
- '<SYSTEM32>\svchost.exe' -K NETSVCS
- '<SYSTEM32>\taskkill.exe' /f /t /im RSTray.exe
Modifies file system :
Creates the following files:
- %TEMP%\132828_cc.TEMP
- %TEMP%\129468_cc.TEMP
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\newarea.dll
Deletes the following files:
- %TEMP%\132828_cc.TEMP
Moves the following files:
- from %TEMP%\132828_cc.TEMP to <SYSTEM32>\newarea.dll
- from %TEMP%\129468_cc.TEMP to <SYSTEM32>\newarea.dll
Network activity:
Connects to:
- 'localhost':1100
Miscellaneous:
Searches for the following windows:
- ClassName: '(null)' WindowName: '(null)'