Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run] 'Firewall Administrating' = '%WINDIR%\infocard.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Firewall Administrating' = '%WINDIR%\infocard.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Firewall Administrating' = '%WINDIR%\infocard.exe'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '%WINDIR%\infocard.exe:*:Enabled:Firewall Administrating'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:Firewall Administrating'
Creates and executes the following:
- '%WINDIR%\infocard.exe'
Executes the following:
- '<SYSTEM32>\net.exe' stop wuauserv
- '<SYSTEM32>\sc.exe' config wuauserv start= disabled
- '<SYSTEM32>\net1.exe' stop wuauserv
- '%WINDIR%\explorer.exe' http://br#####sers.myspace.com/Browse/Browse.aspx
- '<SYSTEM32>\net.exe' stop MsMpSvc
- '<SYSTEM32>\net1.exe' stop MsMpSvc
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram 1.exe 1 ENABLE
Searches for windows to
detect programs and games:
- ClassName: 'MSNHiddenWindowClass' WindowName: '(null)'
- ClassName: '_Oscar_StatusNotify' WindowName: '(null)'
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Browse[1].aspx
- %WINDIR%\infocard.exe
- %WINDIR%\infocard.exb
Sets the 'hidden' attribute to the following files:
- %WINDIR%\infocard.exe
- <Full path to virus>
Deletes the following files:
- %WINDIR%\infocard.exb
Network activity:
Connects to:
- 'br#####sers.myspace.com':80
- 'ur#.###itwordurl.com':1234
- 'localhost':1040
TCP:
HTTP GET requests:
- br#####sers.myspace.com/Browse/Browse.aspx
UDP:
- DNS ASK br#####sers.myspace.com
- DNS ASK ur#.###itwordurl.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Message Session' WindowName: '(null)'
- ClassName: 'TskMultiChatForm.UnicodeClass' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: '__oxFrame.class__' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'