Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "%WINDIR%\csrss.exe"'
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\ZWmiApRplL] 'Start' = '00000001'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
Modifies file system :
Creates the following files:
- C:\csrss.exe
- <SYSTEM32>\drive21.sys
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\drive21.sys
Miscellaneous:
Searches for the following windows:
- ClassName: 'MS_WINHELP' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'