Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe <SYSTEM32>\winsas.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\driver
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
Creates and executes the following:
- <SYSTEM32>\k.exe
- <SYSTEM32>\winsas.exe
- <SYSTEM32>\k.exe (downloaded from the Internet)
Executes the following:
- <SYSTEM32>\net1.exe STOP NOD32 Kernel Service
- <SYSTEM32>\net1.exe STOP AntiVirScheduler
- <SYSTEM32>\net.exe STOP SharedAccess
- <SYSTEM32>\net1.exe STOP AntiVirservice
- <SYSTEM32>\taskkill.exe /f /im dap.exe /t
- <SYSTEM32>\net1.exe STOP SharedAccess
- <SYSTEM32>\net1.exe STOP wuauserv
- <SYSTEM32>\net.exe STOP AntiVirScheduler
- <SYSTEM32>\net.exe STOP MCSHIELD
- <SYSTEM32>\regsvr32.exe /s MSWINSCK.OCX
- <SYSTEM32>\net.exe STOP NOD32 Kernel Service
- <SYSTEM32>\net1.exe STOP MCSHIELD
- <SYSTEM32>\net.exe STOP wuauserv
- <SYSTEM32>\net.exe STOP AntiVirservice
Modifies file system :
Creates the following files:
- <SYSTEM32>\iSas
- C:\i
- <SYSTEM32>\winsas.exe
- <SYSTEM32>\k.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\k[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\p[1].php
- C:\driver
- <SYSTEM32>\MSWINSCK.OCX
- <SYSTEM32>\winsas.ico
- <SYSTEM32>\winsas
- C:\autorun.inf
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\driver.exe
- <SYSTEM32>\winsas.exe
- <Drive name for removable media>:\autorun.inf
- C:\autorun.inf
- C:\driver.exe
Deletes the following files:
- %TEMP%\~DF30CD.tmp
- C:\i
- C:\driver
- <Drive name for removable media>:\driver
Network activity:
Connects to:
- 'sa##2.co.cc':80
- 'any':25
- 'localhost':1088
- '<Private IP address>':445
- '<Private IP address>':139
TCP:
HTTP GET requests:
- sa##2.co.cc/k.txt
- sa##2.co.cc/i/_counter/p.php?h=############################################################
UDP:
- DNS ASK sa##2.co.cc
Miscellaneous:
Searches for the following windows:
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: '' WindowName: '<SYSTEM32>'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: '' WindowName: ''
- ClassName: '' WindowName: 'System Configuration Utility'
- ClassName: '' WindowName: 'Windows Task Manager'