Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'e35b3344e334d42c5b4c' = '<Full path to virus>'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\Winscript.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Executes the following:
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\CSC1.tmp"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\np3ryzgm.cmdline"
Modifies file system :
Creates the following files:
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\Usages.bin
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\info.dat
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm06IFdpbmRvd3MgWFA=.bin
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm06IC5ORVQgNC4wIGluc3RhbGxlZA==.bin
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\identity.dat
- %HOMEPATH%\My Documents\Downloads\Windows NT.exe
- %HOMEPATH%\My Documents\Downloads\Windows Media Player.exe
- %HOMEPATH%\My Documents\Downloads\xerox.exe
- %HOMEPATH%\My Documents\Downloads\WindowsUpdate.exe
- %TEMP%\CSC1.tmp
- %TEMP%\np3ryzgm.out
- %TEMP%\np3ryzgm.dll
- %TEMP%\RES2.tmp
- %TEMP%\np3ryzgm.cmdline
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm0gQ3VsdHVyZSBOYW1lOiBlbi1VUw==.bin
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm0gQ1BVIENvcmVzOiAy.bin
- %TEMP%\np3ryzgm.0.cs
- <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm0gT1MgQml0bmVzczogMzI=.bin
- %HOMEPATH%\My Documents\Downloads\Messenger.exe
- %HOMEPATH%\My Documents\Downloads\Internet Explorer.exe
- %HOMEPATH%\My Documents\Downloads\Microsoft.NET.exe
- %HOMEPATH%\My Documents\Downloads\microsoft frontpage.exe
- %HOMEPATH%\My Documents\Downloads\FireFox.exe
- C:\autorun.inf
- C:\Winscript.exe
- %HOMEPATH%\My Documents\Downloads\ComPlus Applications.exe
- %HOMEPATH%\My Documents\Downloads\Common Files.exe
- %HOMEPATH%\My Documents\Downloads\Outlook Express.exe
- %HOMEPATH%\My Documents\Downloads\Online Services.exe
- %HOMEPATH%\My Documents\Downloads\Uninstall Information.exe
- %HOMEPATH%\My Documents\Downloads\Reference Assemblies.exe
- %HOMEPATH%\My Documents\Downloads\NetMeeting.exe
- %HOMEPATH%\My Documents\Downloads\MSBuild.exe
- %HOMEPATH%\My Documents\Downloads\Movie Maker.exe
- %HOMEPATH%\My Documents\Downloads\MSN Gaming Zone.exe
- %HOMEPATH%\My Documents\Downloads\MSN.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\Winscript.exe
- C:\autorun.inf
- C:\Winscript.exe
Deletes the following files:
- %TEMP%\np3ryzgm.cmdline
- %TEMP%\np3ryzgm.dll
- %TEMP%\np3ryzgm.0.cs
- %TEMP%\RES2.tmp
- %TEMP%\CSC1.tmp
- %TEMP%\np3ryzgm.out
Network activity:
Connects to:
- 'sa######vice.red-gate.com':80
- 'wp#d':80
- 'al#####2014.no-ip.biz':5050
TCP:
HTTP GET requests:
- wp#d/wpad.dat
UDP:
- DNS ASK sa######vice.red-gate.com
- DNS ASK wp#d
- DNS ASK al#####2014.no-ip.biz
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'