Juske.JR15 is a Worm. Worms are reproducing malicious programs that run independently and travel across network connections without human action. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities. The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself. File Related Changes It drops the following file(s) on the system: Process Related Changes It creates the following mutex(es): - "IESQMMUTEX_0_208"
- "MSIMGSIZECacheMutex"
- "Nvidia Drive Mon"
- "SmartScreen_ClientId_Mutex"
- "ConnHashTable<3588>_HashTable_Mutex"
- "SmartScreen_UrsCacheMutex_2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2High_S-1-5-21-239287854-1939494589-2009181562-1001"
It creates the following process(es): - c:\Program Files\Internet Explorer\iexplore.exe [ \c:\Program Files\Internet Explorer\iexplore.exe SCODEF:3588 CREDAT:14337 ]
- c:\windows\nvsvc32.exe [ \c:\windows\nvsvc32.exe ]
- C:\Windows\system32\netsh.exe [ netsh firewall add allowedprogram 1.exe 1 ENABLE ]
- C:\Windows\explorer.exe [ explorer.exe http://browseusers.myspace.com/Browse/Browse.aspx ]
- c:\windows\nvsvc32.exe
Network Activity It attempts to connect to the following remote servers: - googleapis.l.google.com:443 (74.125xxxxxx)
- crl.globalsign.net:80 (108.162.xxxxxx)
- clients.l.google.com:80 (74.125.xxxxxx)
- 301.myspace.com:80 (216.178xxxxxx)
- myspace.com:443 (216.178xxxxxx)
- ssl-google-analytics.l.google.com:443 (74.125.xxxxxx)
- ocsp.verisign.net:80 (199.7.xxxxxx)
- cs53.wac.edgecastcdn.net:443 (72.21.xxxxxx)
We observed the following DNS query/queries: - erdbeerlounge.de
- mas.tguia.cl
- journals.lww.com
- astro.ic.ac.uk
- a4-images.myspacecdn.com
- www.shearman.com
- a2-images.myspacecdn.com
- unclefed.com
- websitetrafficspy.com
- jb.asm.org
- x.myspacecdn.com
- ols.systemofadown.com
- uks.linkedin.com
- a1-images.myspacecdn.com
- qun.51.com
- mas.univie.ac.at
- mas.ahlamontada.com
- browseusers.myspace.com
- versatek.com
- mas.archivum.info
- old.longjuyt2tugas.com
- ope.oaklandathletics.com
- southampton.ac.uk
- epp.gunmablog.jp
- shopstyle.com
- gtglobal-ocsp.geotrust.com
- clients1.google.com
- summer-uni-sw.eesp.ch
- deirdremccloskey.org
- ssl.google-analytics.com
- cms.myspacecdn.com
- mas.mtime.com
- middleastpost.org
- a3-images.myspacecdn.com
- www.download.windowsupdate.com
- tripadvisor.com
- screenservice.com
- old.youku.com
- insidehighered.com
- pru.landmines.org
- myspace.com
- transnationale.org
- scribbidyscrubs.com
- goodreads.com
- mas.josbank.com
- xxx.jagdcom.de
- owidget.me
- crl.globalsign.net
- journalofaccountancy.com
- stayontime.info
- xxx.stopklatka.pl
- heidegger.x-y.net
- mas.juegosbakugan.net
- mcsp.lvengine.com
- albertoshistory.info
- beta.neogen.ro
- ate.lacoctelera.net
- ale.pakibili.com
- mix.price-erotske.in.rs
- opl.munin.irf.se
- mix.thenaturistclub.com
- crl.geotrust.com
- scottprigge.net
- ajax.googleapis.com
- mas.0730ip.com
Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKLM\software\microsoft\windowsnt\currentversion\terminalserver\install\Software\Microsoft\Windows\CurrentVersion\Run\nvidiadrivermonitor = c:\windows\nvsvc32.exe
- HKCU\Software\Microsoft\Windows\CurrentVersion\Run\nvidiadrivermonitor = c:\windows\nvsvc32.exe
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run\nvidiadrivermonitor = c:\windows\nvsvc32.exe
|