Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- <SYSTEM32>\spoolsv.exe
- %WINDIR%\Tasks\spoolsv.ext
- <Full path to virus>
Substitutes the following executable system files:
- <SYSTEM32>\dllcache\spoolsv.exe with <SYSTEM32>\dllcache\spoolsv.exe.new
- <SYSTEM32>\spoolsv.exe with <SYSTEM32>\spoolsv.exe.new
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\config.txt'
- '<SYSTEM32>\config.txt' (downloaded from the Internet)
Executes the following:
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
Terminates or attempts to terminate
the following user processes:
- AVP.EXE
Modifies file system :
Creates the following files:
- C:\System Volume Information\_restore{E7F0F64C-F7E5-4319-8757-E9A20C1C4E14}\fifo.log
- \Device\zzz\zzz2\WINDOWS\system32\spoolsv.exe
- C:\System Volume Information\_restore{E7F0F64C-F7E5-4319-8757-E9A20C1C4E14}\RP15\RestorePointSize
- C:\System Volume Information\_restore{E7F0F64C-F7E5-4319-8757-E9A20C1C4E14}\RP15\rp.log
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\config[1].txt
- <SYSTEM32>\spoolsv.exe
- C:\zzz.sys
- <SYSTEM32>\config.txt
Deletes the following files:
- C:\zzz.sys
- %WINDIR%\Tasks\spoolsv.ext
Moves the following files:
- from <SYSTEM32>\dllcache\spoolsv.exe.new to <SYSTEM32>\dllcache\spoolsv.exe
- from <SYSTEM32>\spoolsv.exe.new to <SYSTEM32>\spoolsv.exe
Network activity:
Connects to:
- 'co.#eng6.us':80
TCP:
HTTP GET requests:
- co.#eng6.us/config.txt
UDP:
- DNS ASK co.#eng6.us