[ Changes to filesystem ]
* Deletes file C:\M\TEST\79642AA8AE971B5E655CC5E4B989C133.EXE
* Creates file C:\windows\system32\mssrv32.exe
File length: 23040 bytes
File type: EXE
File entropy: 6.16391 (77.0489%)
Adobe Malware Classifier: Malicious
MD5 hash: 79642aa8ae971b5e655cc5e4b989c133
SHA1 hash: ee12fc5dfdf42658d713c11d095627e4f1b4670e
SHA256 hash: b81f4f21017f38ee51e25e23a4357dae649554e43bd55f9a4840262af7f51144
[ Changes to registry ]
* Creates value "DisableRawSecurity=01000000" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\AFD\Parameters
* Creates value "ImagePath=c:\windows\system32\mssrv32.exe" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\msupdate
* Creates value "DisplayName=Microsoft security update service" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\msupdate
* Creates value "Description=This service downloading and installing Windows security updates" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\msupdate
* Creates value "ObjectName=LocalSystem" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\msupdate
* Creates value "Start=02000000" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\msupdate
* Creates value "Type=10000000" in key HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\msupdate
* Modifies value "SavedLegacySettings=3C000000C20700000100000000000000000000000000000004000000000000004029829C4F33CB0101000000C0A800040000000000000000" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
old value "SavedLegacySettings=3C000000C10700000100000000000000000000000000000004000000000000004029829C4F33CB0101000000C0A800040000000000000000"
[ Network services ]
* Looks for an Internet connection.
* Connects to "ixi.alwaysdata.net" on port 80.
[ Process/window/string information ]
* Enables process privileges.
* Gets user name information.
* Gets volume information.
* Gets computer name.
* Creates a mutex "{F3532CE1-0832-11B1-920A-25000A276A73}".
* Creates process "(null),C:\WINDOWS\system32\svchost.exe,(null)".
* Injects code into process "c:\windows\system32\svchost.exe".
Seems like it intalls itself as Windows Service and injects code in svchost.exe