Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Shell32' = '"<SYSTEM32>\Shell32.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Kernl32' = '"%WINDIR%\Kernl32.exe"'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\ADRY-Z.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Registry Editor (RegEdit)
Executes the following:
- <SYSTEM32>\rundll32.exe shell32.dll,Activate_RunDLL
Modifies settings of Windows Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
- C:\Windos.exe
- %HOMEPATH%\Desktop\Nokia 3gp.exe
- C:\Program File.exe
- %WINDIR%\Default.htm
- %WINDIR%\aku.txt
- %HOMEPATH%\Desktop\Kata-kata Mutiara.exe
- %WINDIR%\Kernl32.exe
- %WINDIR%\Autorun.inf
- <SYSTEM32>\Shell32.exe
- %HOMEPATH%\My Documents\Gadis Manies.exe
- %HOMEPATH%\My Documents\Nokia 3gp.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\ADRY-Z.exe
Miscellaneous:
Searches for the following windows:
- ClassName: 'spider' WindowName: ''
- ClassName: 'freewclass' WindowName: ''
- ClassName: '' WindowName: 'The Microsoft Hearts Network'
- ClassName: 'minesweeper' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Solitaire' WindowName: ''
- ClassName: '' WindowName: 'Windows Task Manager'