Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Yahoo Messengger' = '<SYSTEM32>\winfiles.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe winfiles.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\winfiles.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
blocks the following features:
- System Restore (SR)
Executes the following:
- <SYSTEM32>\ntvdm.exe -f -id
- <SYSTEM32>\ntvdm.exe -f -ie
- <SYSTEM32>\ntvdm.exe -f -ic
- <SYSTEM32>\ntvdm.exe -f -ia
- <SYSTEM32>\ntvdm.exe -f -ib
- <SYSTEM32>\ntvdm.exe -f -i12
- <SYSTEM32>\ntvdm.exe -f -i13
- <SYSTEM32>\ntvdm.exe -f -i11
- <SYSTEM32>\ntvdm.exe -f -if
- <SYSTEM32>\ntvdm.exe -f -i10
- <SYSTEM32>\ntvdm.exe -f -i9
- <SYSTEM32>\ntvdm.exe -f -i2
- <SYSTEM32>\ntvdm.exe -f -i3
- <SYSTEM32>\at.exe 09:00 /interactive /EVERY:m,t,w,th,f,s,su <SYSTEM32>\winfiles.exe
- <SYSTEM32>\ntvdm.exe -f -i1
- <SYSTEM32>\at.exe /delete /yes
- <SYSTEM32>\ntvdm.exe -f -i7
- <SYSTEM32>\ntvdm.exe -f -i8
- <SYSTEM32>\ntvdm.exe -f -i6
- <SYSTEM32>\ntvdm.exe -f -i4
- <SYSTEM32>\ntvdm.exe -f -i5
Forces autoplay for removable media.
Modifies file system :
Creates the following files:
- %WINDIR%\Temp\scs17.tmp
- %WINDIR%\Temp\scs16.tmp
- %WINDIR%\Temp\scs18.tmp
- %WINDIR%\Temp\scs1A.tmp
- %WINDIR%\Temp\scs19.tmp
- %WINDIR%\Temp\scs15.tmp
- %WINDIR%\Temp\scs11.tmp
- %WINDIR%\Temp\scs10.tmp
- %WINDIR%\Temp\scs12.tmp
- %WINDIR%\Temp\scs14.tmp
- %WINDIR%\Temp\scs13.tmp
- %WINDIR%\Temp\scs22.tmp
- %WINDIR%\Temp\scs21.tmp
- %WINDIR%\Temp\scs23.tmp
- %WINDIR%\Temp\scs25.tmp
- %WINDIR%\Temp\scs24.tmp
- %WINDIR%\Temp\scs20.tmp
- %WINDIR%\Temp\scs1C.tmp
- %WINDIR%\Temp\scs1B.tmp
- %WINDIR%\Temp\scs1D.tmp
- %WINDIR%\Temp\scs1F.tmp
- %WINDIR%\Temp\scs1E.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\setting[1].nql
- <SYSTEM32>\autorun.ini
- <SYSTEM32>\setting.ini
- %WINDIR%\Temp\scs4.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\setting[1].nql
- %WINDIR%\Temp\scs3.tmp
- %WINDIR%\winfiles.exe
- <SYSTEM32>\winfiles.exe
- %TEMP%\aut1.tmp
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\winnt.exe
- %WINDIR%\Temp\scsC.tmp
- %WINDIR%\Temp\scsB.tmp
- %WINDIR%\Temp\scsD.tmp
- %WINDIR%\Temp\scsF.tmp
- %WINDIR%\Temp\scsE.tmp
- %WINDIR%\Temp\scsA.tmp
- %WINDIR%\Temp\scs6.tmp
- %WINDIR%\Temp\scs5.tmp
- %WINDIR%\Temp\scs7.tmp
- %WINDIR%\Temp\scs9.tmp
- %WINDIR%\Temp\scs8.tmp
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\setting.ini
- <Drive name for removable media>:\autorun.inf
- <SYSTEM32>\autorun.ini
- <SYSTEM32>\winfiles.exe
- %WINDIR%\winfiles.exe
Deletes the following files:
- %WINDIR%\Temp\scs16.tmp
- %WINDIR%\Temp\scs15.tmp
- %WINDIR%\Temp\scs18.tmp
- %WINDIR%\Temp\scs17.tmp
- %WINDIR%\Temp\scs12.tmp
- %WINDIR%\Temp\scs11.tmp
- %WINDIR%\Temp\scs14.tmp
- %WINDIR%\Temp\scs13.tmp
- %WINDIR%\Temp\scs19.tmp
- %WINDIR%\Temp\scs1F.tmp
- %WINDIR%\Temp\scs1E.tmp
- %WINDIR%\Temp\scs21.tmp
- %WINDIR%\Temp\scs20.tmp
- %WINDIR%\Temp\scs1B.tmp
- %WINDIR%\Temp\scs1A.tmp
- %WINDIR%\Temp\scs1D.tmp
- %WINDIR%\Temp\scs1C.tmp
- %WINDIR%\Temp\scs10.tmp
- %WINDIR%\Temp\scs4.tmp
- <Drive name for removable media>:\autorun.inf
- %WINDIR%\Temp\scs6.tmp
- %WINDIR%\Temp\scs5.tmp
- %WINDIR%\Temp\scs2.tmp
- %TEMP%\aut1.tmp
- <Drive name for removable media>:\winfiles.exe
- %WINDIR%\Temp\scs3.tmp
- %WINDIR%\Temp\scs7.tmp
- %WINDIR%\Temp\scsD.tmp
- %WINDIR%\Temp\scsC.tmp
- %WINDIR%\Temp\scsF.tmp
- %WINDIR%\Temp\scsE.tmp
- %WINDIR%\Temp\scs9.tmp
- %WINDIR%\Temp\scs8.tmp
- %WINDIR%\Temp\scsB.tmp
- %WINDIR%\Temp\scsA.tmp
Network activity:
Connects to:
- 'nh#####nglane4.t35.com':80
- 'nh#####nglane3.t35.com':80
TCP:
HTTP GET requests:
- nh#####nglane4.t35.com/setting.nql
- nh#####nglane3.t35.com/setting.nql
UDP:
- DNS ASK nh#####nglane4.t35.com
- DNS ASK nh#####nglane3.t35.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c04.c08.46000e'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c14.c18.47000f'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-be0.be4.44000c'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-bf4.bf8.45000d'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c24.c28.480010'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c64.c68.4b0013'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c7c.c80.4c0014'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c3c.c40.490011'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-c54.c58.4a0012'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-bd0.bd4.43000b'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b5c.b60.3c0002'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b6c.b70.3d0005'
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-acc.ad0.390001'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b7c.b80.3e0006'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-bac.bb0.410009'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-bbc.bc0.42000a'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b8c.b90.3f0007'
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b9c.ba0.400008'