Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = 'userinit.exe,rundll32.exe "%PROGRAM_FILES%\NetMeeting\nxf.dll" hxyc'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = 'userinit.exe,rundll32.exe "%PROGRAM_FILES%\NetMeeting\wmp.dll" hxyc'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\run.exe
Malicious functions:
Executes the following:
- <SYSTEM32>\rundll32.exe "%PROGRAM_FILES%\NetMeeting\wmp.dll" hxyc
Modifies file system :
Creates the following files:
- %PROGRAM_FILES%\NetMeeting\krnln.fnr
- %PROGRAM_FILES%\NetMeeting\krnln.fne
- C:\autorun.inf
- C:\run.exe
- %PROGRAM_FILES%\NetMeeting\dp1.fne
- %PROGRAM_FILES%\NetMeeting\spec.fne
- %TEMP%\E_4\krnln.fnr
- %PROGRAM_FILES%\NetMeeting\eAPI.fne
- %PROGRAM_FILES%\NetMeeting\wmp.dll
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\run.exe
- C:\autorun.inf
- C:\run.exe
Network activity:
Connects to:
- 'ya#####zhen.3322.org':8820
UDP:
- DNS ASK ya#####zhen.3322.org