Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'wuhen' = '<Full path to virus>'
Malicious functions:
Executes the following:
- '<SYSTEM32>\wsqmcons.exe'
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\schtasks.exe' /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
- '<SYSTEM32>\sc.exe' start w32time task_started
- '<SYSTEM32>\sdclt.exe' /CONFIGNOTIFICATION
- '<SYSTEM32>\taskhost.exe' $(Arg0)
Modifies file system :
Creates the following files:
- C:\ProgramData\Microsoft\RAC\Temp\sqlBAF6.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBA68.tmp
Deletes the following files:
- C:\ProgramData\Microsoft\RAC\Temp\sqlBA68.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBAF6.tmp
Network activity:
UDP:
- DNS ASK ti##.#indows.com
- 'ti##.#indows.com':123