Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SVCHOST' = '\WINDOWS\Media\SVCHOST.EXE'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
Malicious functions:
Executes the following:
- <SYSTEM32>\logonui.exe /status
- <SYSTEM32>\cmd.exe /c del.bat
Modifies settings of Windows Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoDesktop' = '00000001'
Attempts to shut down the Windows operating system.
Modifies file system :
Creates the following files:
- <Current directory>\del.bat
- C:\autorun.inf
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- C:\autorun.inf
Miscellaneous:
Searches for the following windows:
- ClassName: 'Button' WindowName: ''
- ClassName: 'StatusWindowClass' WindowName: ''
- ClassName: 'Progman' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''