Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Window Interactive WWAN' = '<SYSTEM32>\javligwvxkkh.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\javligwvxkkh.exe
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\Web Update Server Protection BitLocker] 'Start' = '00000002'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
- Windows Security Center
Creates and executes the following:
- '<SYSTEM32>\uhvsraxd.exe' "<SYSTEM32>\javligwvxkkh.exe"
- '%WINDIR%\Temp\ccc2l0rr3sr6fmr.exe' -r 51551 tcp
- '%TEMP%\ccc2l0rr30uufmztnqr5.exe'
- '<SYSTEM32>\javligwvxkkh.exe'
Modifies file system :
Creates the following files:
- <SYSTEM32>\tpsccfjoa\run
- <SYSTEM32>\tpsccfjoa\rng
- <SYSTEM32>\tpsccfjoa\cfg
- <SYSTEM32>\tpsccfjoa\por
- %WINDIR%\Temp\ccc2l0rr3sr6fmr.exe
- %TEMP%\ccc2l0rr30uufmztnqr5.exe
- <SYSTEM32>\tpsccfjoa\tst
- <SYSTEM32>\tpsccfjoa\etc
- <SYSTEM32>\uhvsraxd.exe
- <SYSTEM32>\javligwvxkkh.exe
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\uhvsraxd.exe
- <SYSTEM32>\javligwvxkkh.exe
Deletes the following files:
- %WINDIR%\Temp\ccc2l0rr3sr6fmr.exe
- <DRIVERS>\etc\hosts
- %TEMP%\ccc2l0rr30uufmztnqr5.exe
Substitutes the HOSTS file.
Network activity:
UDP:
- DNS ASK fi###nice.net
- DNS ASK am###stol.com
- DNS ASK vi###mojo.com
- DNS ASK qu###else.net
- DNS ASK fi###else.net
- DNS ASK qu###nice.net
- DNS ASK el#####arimagine.com
- DNS ASK do####club-grup.com
- DNS ASK ja###uter.com
- DNS ASK mo###uia.com
- DNS ASK mo###itio.com
- '23#.#55.255.250':1900