Mydoom.F is a Worm. Worms are reproducing malicious programs that run independently and travel across network connections without human action. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities. The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself. File Related Changes It drops the following file(s) on the system: - "c:\Program Files\Microsoft Silverlight\4.0.60531.0\da\rvzidvfg.exe"
- "c:\Program Files\Common Files\microsoft shared\OCR\mkzjjmrlyup.exe"
- "c:\py\lib\zhuxsu.exe"
- "c:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\web\bobjvtdq.exe"
- "c:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\umlcjdpirnog.exe"
- "c:\Program Files\Common Files\microsoft shared\VC\rngalrn.exe"
- "c:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\hqdnlnnjprniy.exe"
- "c:\Program Files\Common Files\microsoft shared\Triedit\chbcwilo.exe"
- "c:\Program Files\Common Files\microsoft shared\ink\1.7\ogfo.exe"
- "c:\Windows\System32\nwqkndcpotzp.exe"
- "c:\py\tcl\tcl8.5\tzdata\Atlantic\tyjgw.exe"
- "c:\Windows\System32\yumwl.dll"
- "c:\Program Files\Common Files\microsoft shared\DAO\satfyi.exe"
- "c:\py\DLLs\jipgudvgl.exe"
- "c:\Program Files\Adobe\Reader 9.0\Reader\plug_ins\dlhuqakt.exe"
- "c:\py\tcl\dde1.3\wirgopo.exe"
- "c:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\jrvhp.exe"
- "c:\Program Files\Windows Media Player\Media Renderer\uwuomjxnykuq.exe"
- "c:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\wdlvpeg.exe"
- "c:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\enknalqezdc.exe"
Network Activity We observed the following DNS query/queries: - bar.foo
- mail-in100.apple.com
- mx2.shore.net
- acm.org.s7b2.psmtp.com
- python.org
- acm.org
- mail-in2.apple.com
- mail-in5.apple.com
- acm.org.s7a2.psmtp.com
- apple.com
- www.python.org
- mail-in21.apple.com
- mail-in24.apple.com
- shore.net
- mail-in23.apple.com
- mail.python.org
- mx1.shore.net
- mail-in25.apple.com
- mail-in6.apple.com
- acm.org.s7b1.psmtp.com
- mail-in7.apple.com
- acm.org.s7a1.psmtp.com
- bar.baz
- mail-in22.apple.com
- unicode.org
- mail-in4.apple.com
The sample sends Spam mails to a number of sources Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\euyuek = C:\Windows\system32\nwqkndcpotzp.exe
|