Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Taskman' = 'C:\RECYCLER\S-1-5-21-3757460976-2905419206-855666896-3983\nissan.exe'
Malicious functions:
Injects code into
the following system processes:
- <SYSTEM32>\ctfmon.exe
- %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
- C:\RECYCLER\S-1-5-21-3757460976-2905419206-855666896-3983\nissan.exe
- C:\RECYCLER\S-1-5-21-3757460976-2905419206-855666896-3983\Desktop.ini
Sets the 'hidden' attribute to the following files:
- C:\RECYCLER\S-1-5-21-3757460976-2905419206-855666896-3983\nissan.exe
Network activity:
UDP:
- DNS ASK so#####.aljosaborkovic.com
- DNS ASK l3##.##and-clothes.net
- DNS ASK sa####.prichaonica.com
- 'l3##.##and-clothes.net':11000
- 'sa####.prichaonica.com':11000
- 'so#####.aljosaborkovic.com':11000
Miscellaneous:
Searches for the following windows:
- ClassName: 'noclass' WindowName: 'noclass'