该病毒会在磁盘中释放出文件,会修改注册表,会建立映像劫持。
在磁盘中释放出以下文件:
C:DOCUME~1SANDBOXLocal SettingsTemporary Internet Files
Application DataMicrosoftOffice
在注册表中创建了以下信息:
"HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALL"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsAVP.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRav.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRavMon.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRavMonD.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRavStub.exe"
在注册表中设置了以下信息:
"HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALL" "CheckedValue" ""
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsAVP.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRav.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRavMon.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRavMonD.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRavStub.exe" "Debugger" "ntsd -d"
会从以下注册表中读取信息:
"HKCUSoftwareBorlandLocales"
"HKLMSoftwareBorlandLocales"
"HKCUSoftwareBorlandDelphiLocales"
"HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun"
病毒会连接作者指定的网址:
http://www.9z9t.com/down1.txt
域名:"www.9z9t.com" 端口:80 (TCP)
www.9z9t.com/down1.txt
在系统中创建了以下进程:
病毒尝试使用[SeDebugPrivilege]权限枚举进程
病毒会通过以下途径传播:
病毒会修改硬盘中存在的可执行文件