Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\NmcXf6SCuoc.exe
Malicious functions:
Executes the following:
- '<SYSTEM32>\rundll32.exe' fldrclnr.dll,Wizard_RunDLL
- '<SYSTEM32>\svchost.exe' netsvcs
- '%WINDIR%\explorer.exe'
Injects code into
the following system processes:
- %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
- %TEMP%\F.tmp
- %TEMP%\10.tmp
- %TEMP%\E.tmp
- %TEMP%\C.tmp
- %TEMP%\D.tmp
- %TEMP%\14.tmp
- %TEMP%\15.tmp
- %TEMP%\13.tmp
- %TEMP%\11.tmp
- %TEMP%\12.tmp
- %TEMP%\B.tmp
- %TEMP%\~TM4.tmp
- %TEMP%\~TM5.tmp
- %TEMP%\3.tmp
- %TEMP%\1.tmp
- %TEMP%\2.tmp
- %TEMP%\9.tmp
- %TEMP%\A.tmp
- %TEMP%\8.tmp
- %TEMP%\6.tmp
- %TEMP%\7.tmp
Sets the 'hidden' attribute to the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\NmcXf6SCuoc.exe
Deletes the following files:
- %TEMP%\6.tmp
- %TEMP%\10.tmp
- %TEMP%\F.tmp
- %TEMP%\D.tmp
- %TEMP%\E.tmp
- %TEMP%\14.tmp
- %TEMP%\15.tmp
- %TEMP%\13.tmp
- %TEMP%\11.tmp
- %TEMP%\12.tmp
- %TEMP%\C.tmp
- %TEMP%\~TM4.tmp
- %TEMP%\~TM5.tmp
- %TEMP%\3.tmp
- %TEMP%\1.tmp
- %TEMP%\2.tmp
- %TEMP%\A.tmp
- %TEMP%\B.tmp
- %TEMP%\9.tmp
- %TEMP%\7.tmp
- %TEMP%\8.tmp
Deletes itself.
Network activity:
Connects to:
- 'ma####asofrtt.com':80
TCP:
HTTP POST requests:
- http://ma####asofrtt.com/ruutgmxarjnr.inc
- http://ma####asofrtt.com/isuvp.inc
- http://ma####asofrtt.com/kaaaaaakpugsupkke.pl
UDP:
- DNS ASK ma####asofrtt.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'OleMainThreadWndClass' WindowName: ''
- ClassName: 'SystemTray_Main' WindowName: ''
- ClassName: 'CSCHiddenWindow' WindowName: ''
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Proxy Desktop' WindowName: ''
- ClassName: 'BaseBar' WindowName: 'ChanApp'