Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\RUNDLL32.LNK
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\wuauserv] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- %TEMP%\Pre6DDE.tmp
- %TEMP%\Pre6DDE.tmp (downloaded from the Internet)
Executes the following:
- <SYSTEM32>\rundll32.exe "<SYSTEM32>\ausrv.dll",CRestart
- <SYSTEM32>\tasklist.exe
- <SYSTEM32>\notepad.exe "%WINDIR%\winhelp.exe"
Modifies file system :
Creates the following files:
- %TEMP%\vmm4D99.tmp
- %TEMP%\~Thumbbs.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dnslookup[1].org&type=A&submit=Resolve
- %TEMP%\Pre6DDE.tmp
- %HOMEPATH%\Start Menu\Programs\Microsoft\Shortcut to startup_local.lnk
- %TEMP%\vmm4A9B.tmp
- %HOMEPATH%\Start Menu\Programs\Microsoft\RUNDLL32.LNK
- %TEMP%\vmmC21D.tmp
Deletes the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dnslookup[1].org&type=A&submit=Resolve
- %TEMP%\vmmC21D.tmp
Moves the following files:
- from %TEMP%\vmm4A9B.tmp to <SYSTEM32>\ausrv.dll
Network activity:
Connects to:
- 'www.dn###tch.info':80
- 'li#####zhen.zapto.org':80
TCP:
HTTP GET requests:
- www.dn###tch.info/dns/dnslookup?la####################################################
- li#####zhen.zapto.org/update/minjindang.jpg
UDP:
- DNS ASK www.dn###tch.info
- DNS ASK li#####zhen.zapto.org
Miscellaneous:
Searches for the following windows:
- ClassName: 'Notepad' WindowName: ''