Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\WINDOWS] 'ImagePath' = '%CommonProgramFiles%\Microsoft Shared\MSINFO\rejoice48.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\WINDOWS] 'Start' = '00000002'
Malicious functions:
Executes the following:
- '<SYSTEM32>\calc.exe'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE'
Injects code into
the following system processes:
- <SYSTEM32>\calc.exe
Modifies file system:
Creates the following files:
- %ProgramFiles%\_rejoice48.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\rejoice48.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Fiele Ps.txt
Sets the 'hidden' attribute to the following files:
- %ProgramFiles%\_rejoice48.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\rejoice48.exe
Deletes the following files:
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Fiele Ps.txt
Deletes itself.
Network activity:
Connects to:
- 'cx####.meibu.com':8181
UDP:
- DNS ASK cx####.meibu.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Tshangxing' WindowName: ''
- ClassName: 'MS_WINHELP' WindowName: ''
- ClassName: 'TAppBuilder' WindowName: ''