Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Taskhelp' = '%APPDATA%\Systems\start.exe'
Malicious functions:
Creates and executes the following:
- %APPDATA%\Systems\idle.exe
- %APPDATA%\Systems\start.exe
- %TEMP%\sf.exe
Executes the following:
- <SYSTEM32>\cmd.exe /c ""%TEMP%\7ZSfx000.cmd" "
Modifies file system :
Creates the following files:
- %APPDATA%\Systems\libcurl-4.dll
- %APPDATA%\Systems\start.exe
- %APPDATA%\Systems\msexec.exe
- %TEMP%\7ZSfx000.cmd
- %APPDATA%\Systems\libpthread-2.dll
- %APPDATA%\Systems\libpdcurses.dll
- %APPDATA%\Systems\idle.exe
- %APPDATA%\Systems\data.ini
- %APPDATA%\Systems\phatk110817Juniperbitalignv2w128long4.bin
- %TEMP%\sf.exe
- %APPDATA%\Systems\dxdiag.exe
- %APPDATA%\Systems\poclbm110817.cl
- %APPDATA%\Systems\phatk110817.cl
Deletes the following files:
- %TEMP%\7ZSfx000.cmd
- %TEMP%\sf.exe
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''