To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:ipsec'
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
blocks the following features:
- System Restore (SR)
- User Account Control (UAC)
- Windows Security Center
Creates and executes the following:
- <SYSTEM32>\Ver.exe (downloaded from the Internet)
Executes the following:
- <SYSTEM32>\at.exe 09:00 /interactive /EVERY:m,t,w,th,f,s,su <SYSTEM32>\RunVer.exe
- <SYSTEM32>\at.exe /delete /yes
Injects code into
the following system processes:
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\ctfmon.exe
- %WINDIR%\Explorer.EXE
a large number of user processes.
Forces autoplay for removable media.