Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'KB01321295.exe' = '"%APPDATA%\KB01321295.exe"'
Malicious functions:
Creates and executes the following:
- %APPDATA%\KB01321295.exe
Injects code into
the following system processes:
- <SYSTEM32>\cscript.exe
a large number of user processes.
Modifies file system :
Creates the following files:
- %TEMP%\exp1.tmp.bat
- %APPDATA%\KB01321295.exe
Deletes itself.
Network activity:
Connects to:
- '91.##1.103.143':8080
- '11#.#34.150.163':8080
- '20#.#43.147.35':8080
- '41.##8.5.140':8080
- '95.##2.167.193':8080
- '17#.#03.96.79':8080
- '18#.#06.189.124':8080
- '89.##1.176.87':8080
- '97.##.75.172':8080
- '20#.#17.147.52':8080
- '12#.#9.61.59':8080
- '83.##8.208.55':8080
- '21#.#4.250.173':8080
- '19#.#1.107.70':8080
- '20#.#72.252.26':8080
- '20#.#72.252.29':8080
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''