Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Word' = '<SYSTEM32>\WINWORD.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Printer Cpl' = '%WINDIR%\SPOOL32.EXE'
- [<HKLM>\SOFTWARE\Classes\regfile\shell\open\command] '' = 'cmd.exe /c del "%1"'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\SETUP.EXE
Malicious functions:
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
- Registry Editor (RegEdit)
Creates and executes the following:
- %WINDIR%\SPOOL32.EXE
- <SYSTEM32>\WINWORD.EXE
Executes the following:
- <SYSTEM32>\rundll32.exe shell32.dll,Activate_RunDLL
Injects code into
the following system processes:
- %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
- %WINDIR%\SPOOL32.EXE
- %WINDIR%\help.htm
- %WINDIR%\Artis Hot.jpg .exe
- <Current directory>\Artis Hot.jpg .exe
- %WINDIR%\exe.ico
- <SYSTEM32>\WINWORD.EXE
Deletes the following files:
- %TEMP%\~DFC07D.tmp
Miscellaneous:
Searches for the following windows:
- ClassName: '' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Button' WindowName: ''