Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'windowsWord' = '<SYSTEM32>\Kamasutra.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\AutoRun.inf
Malicious functions:
Creates and executes the following:
- '%WINDIR%\..exe'
Executes the following:
- '<SYSTEM32>\attrib.exe' +S +H +R +A <Drive name for removable media>:\Autorun.inf
- '<SYSTEM32>\attrib.exe' +S +H +R +A E:\Autorun.inf
- '<SYSTEM32>\attrib.exe' +S +H +R +A Z:\Autorun.inf
- '<SYSTEM32>\wbem\wmic.exe' logicaldisk get caption
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\1.tmp\Kamasutra.bat" "
- '<SYSTEM32>\reg.exe' DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v windowsWord /f
- '<SYSTEM32>\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v windowsWord /t REG_SZ /d <SYSTEM32>\Kamasutra.exe
Modifies file system :
Creates the following files:
- %TEMP%\tmp2.tmp
- <SYSTEM32>\rd-RD\2387878.005
- <SYSTEM32>\rd-RD\2387878.008
- %TEMP%\tmp3.tmp
- <SYSTEM32>\wbem\AutoRecover\23BDE61F1F4FACE17E9B0C01F2A1FD9B.mof
- %TEMP%\tmp4.tmp
- <SYSTEM32>\wbem\AutoRecover\C8463ECBE33BC240263A0B094E46D510.mof
- <SYSTEM32>\rd-RD\2387878.006
- <SYSTEM32>\rd-RD\2387878.exe
- <Current directory>\..exe
- %TEMP%\1.tmp\Kamasutra.bat
- <SYSTEM32>\rd-RD\AKV.exe
- <SYSTEM32>\rd-RD\2387878.004
- <SYSTEM32>\rd-RD\2387878.002
- <SYSTEM32>\rd-RD\2387878.001
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\AutoRun.inf
Deletes the following files:
- %TEMP%\tmp4.tmp
- %WINDIR%\..exe
- %TEMP%\tmp2.tmp
- %TEMP%\tmp3.tmp
Moves the following files:
- from <Current directory>\..exe to %WINDIR%\..exe
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'EDIT' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'