Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'system' = '<SYSTEM32>\system.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
Creates the following files on removable media:
- <Drive name for removable media>:\system.exe
- <Drive name for removable media>:\AutoRun.inf
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\IXP000.TMP\Setup4.exe' = '%TEMP%\IXP000.TMP\Setup4.exe:*:Enabled:QVOD'
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Creates and executes the following:
- '<SYSTEM32>\oueku.exe'
- '<SYSTEM32>\bmkuv.exe'
- '%TEMP%\IXP000.TMP\Setup4.exe'
- '%TEMP%\IXP000.TMP\QVODSE~1.EXE'
- '<SYSTEM32>\acjmp.exe'
- '<SYSTEM32>\ussxq.exe'
Executes the following:
- '<SYSTEM32>\sc.exe' config MpsSvc start= disabled
- '<SYSTEM32>\sc.exe' config WinDefend start= disabled
- '<SYSTEM32>\net.exe' stop MpsSvc
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\net1.exe' stop WinDefend
- '<SYSTEM32>\net1.exe' stop MpsSvc
- '<SYSTEM32>\net.exe' stop WinDefend
- '<SYSTEM32>\sc.exe' stop 360rp
- '<SYSTEM32>\sc.exe' delete ZhuDongFangYu
- '<SYSTEM32>\sc.exe' stop ZhuDongFangYu
- '<SYSTEM32>\sc.exe' delete ekrn
- '<SYSTEM32>\sc.exe' stop ekrn
- '<SYSTEM32>\sc.exe' delete 360rp
Terminates or attempts to terminate
the following user processes:
- MCAGENT.EXE
- ekrn.exe
- 360tray.exe
Modifies file system :
Creates the following files:
- %TEMP%\1.tmp
- <SYSTEM32>\bmkuv.exe
- C:\system.exe
- C:\AutoRun.inf
- <SYSTEM32>\oueku.exe
- <SYSTEM32>\acjmp.exe
- %TEMP%\IXP000.TMP\Setup4.exe
- <SYSTEM32>\ussxq.exe
- %PROGRAM_FILES%\AAV\CDriver.sys
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\system.exe
- C:\system.exe
Deletes the following files:
- <SYSTEM32>\oueku.exe
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- <SYSTEM32>\acjmp.exe
- <SYSTEM32>\ussxq.exe
Moves the following files:
- from %TEMP%\IXP000.TMP\QVODSE~1.EXE to <SYSTEM32>\system.exe
Network activity:
Connects to:
- 'ag###.qvod.com':80
- 'up###e.qvod.com':80
- 'e1#.#shmz.com':8080
TCP:
HTTP GET requests:
- up###e.qvod.com/qd.jpg
UDP:
- DNS ASK st##.qvod.com
- DNS ASK st####.sipphone.com
- DNS ASK ag###.qvod.com
- DNS ASK up###e.qvod.com
- DNS ASK e1#.#shmz.com
- DNS ASK tr###.qvod.com
- 'tr###.qvod.com':80
- '<Private IP address>':1900
- 'st##.qvod.com':3478
- 'st####.sipphone.com':3478
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''