Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'WINLOGIN' = 'c:\2779\SCANNING.EXE'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'TASKMAN' = 'c:\2779\DTCI.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'WINLOGIN' = 'c:\2779\SCANNING.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'DTCI' = 'c:\2779\DtcI.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\Autorun.inf
- <Drive name for removable media>:\2779\Desktop.ini
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Modifies file system :
Creates the following files:
- C:\2779\Desktop.ini
- %TEMP%\winlogon.exe
- %TEMP%\logonui.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\Autorun.inf
- C:\2779\Desktop.ini
- <Drive name for removable media>:\2779\Desktop.ini
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''