The worm infects the system by dropping a copy of itself and the autorun.inf file into the drive. During the infection process, the worm will make copies of itself and place them in various, randomly generated files, then delete the original copy of the worm.
Once installed, the worm will also attempt to connect to two sites, most likely in order to send information, to download malicious programs or to receive further commands.
File System Changes
Creates these files:
- %System%\[Random].DLL
- %System%\[Random].EXE
- C:\autorun.inf
- C:\auto.exe
- %System%\delme.bat
Process Changes
Uses these temporary processes:
These modules were loaded into other processes:
Writes in memory of these processes:
- %System%\services.exe
- %System%\lsass.exe
- %System%\svchost.exe
Network Connections
Attempts to download files from:
- https://alexa.verynx.cn//[...]xa.txt
Attempts to connect to:
- https://211.100.21.4/[..].cnt
Registry Modifications
Sets these values:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random] = "%System%\[random].EXE -k"
Creates these keys:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random]
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random]
Deletes these keys:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ERSvc