The worm infects the system by dropping a copy of itself and the autorun.inf file into the drive. During the infection process, the worm will make copies of itself and place them in various, randomly generated files, then delete the original copy of the worm.
Once installed, the worm will also attempt to connect to two sites, most likely in order to send information, to download malicious programs or to receive further commands.
File System Changes
Creates these files:
Uses these temporary processes:
These modules were loaded into other processes:
Writes in memory of these processes:
Attempts to download files from:
Attempts to connect to:
Sets these values:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random] = "%System%\[random].EXE -k"
Creates these keys:
Deletes these keys: