Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Classes\.bat] '' = 'batfile'
- [<HKLM>\SOFTWARE\Classes\anifile\Shell\Open\Command] '' = ''
Malicious functions:
Creates and executes the following:
- %HOMEPATH%\Templates\installstat.exe
- %TEMP%\nsw2.tmp\ns3.tmp "<SYSTEM32>\cscript.exe" "%PROGRAM_FILES%\EditPlus\kk14.icw"
Executes the following:
- <SYSTEM32>\wscript.exe "%HOMEPATH%\Templates\kk14.icw"
- <SYSTEM32>\cscript.exe "%PROGRAM_FILES%\EditPlus\kk14.icw"
Searches for registry branches where third party applications store passwords:
- [<HKCU>\Software\FlashFXP]
Modifies settings of Windows Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoInternetIcon' = '00000001'
Modifies file system :
Creates the following files:
- %PROGRAM_FILES%\baidu\baidu-dzl.exe
- %HOMEPATH%\Templates\installstat.exe
- %TEMP%\nsw2.tmp\ns3.tmp
- %PROGRAM_FILES%\EditPlus\kk14.icw
- %TEMP%\nsw2.tmp\nsExec.dll
- %TEMP%\nsw2.tmp\InstallOptions.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\huhawang[1]
- %TEMP%\nsw2.tmp\modern-wizard.bmp
- %HOMEPATH%\Templates\statistics.dll
- %TEMP%\nsw2.tmp\ioSpecial.ini
- %HOMEPATH%\Templates\kk14.icw
- %HOMEPATH%\Desktop\Internat Exlporer.lnk
- %PROGRAM_FILES%\WinRAR\14\14.dat
- %PROGRAM_FILES%\WinRAR\14\Desktop.ini
- %TEMP%\nsw2.tmp\System.dll
- %PROGRAM_FILES%\WinRAR\14\target.lnk
- C:\1________________________________________________________________________________________________________________________________________________________________________________________________________________.ani
- %PROGRAM_FILES%\EditPlus\1314.bat
- %HOMEPATH%\Desktop\МФ ±¦ Нш №є.lnk
- %HOMEPATH%\Desktop\НшЦ·Ц®јТ.1nk
- %TEMP%\nsw2.tmp\AccessControl.dll
Sets the 'hidden' attribute to the following files:
- %PROGRAM_FILES%\WinRAR\14\Desktop.ini
Deletes the following files:
- %HOMEPATH%\Templates\statistics.dll
- %HOMEPATH%\Templates\installstat.exe
- %TEMP%\nsw2.tmp\ns3.tmp
Network activity:
Connects to:
- 'www.hu###ang.com':80
- 'localhost':1038
- 'li####nh.kkjie.com':80
TCP:
HTTP GET requests:
- www.hu###ang.com/?00##
HTTP POST requests:
- li####nh.kkjie.com/t.asp?i=#####
UDP:
- DNS ASK www.hu###ang.com
- DNS ASK li####nh.kkjie.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''