To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%APPDATA%\Microsoft\jdb.exe' = '%APPDATA%\Microsoft\jdb.exe:*:Enabled:Windows Messanger'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\svchost.exe' = '%TEMP%\svchost.exe:*:Enabled:Windows Messanger'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
Creates and executes the following:
- %TEMP%\svchost.exe
- %TEMP%\jProtect.exe
- %TEMP%\syshost.exe
Executes the following:
- <SYSTEM32>\dumprep.exe 2896 -dm 7 7 "%TEMP%\WERe9db.dir00\svchost.exe.mdmp" 16325836412027356
- <SYSTEM32>\reg.exe ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "%APPDATA%\Microsoft\jdb.exe" /t REG_SZ /d "%APPDATA%\Microsoft\jdb.exe:*:Enabled:Windows Messanger" /f
- <SYSTEM32>\rundll32.exe <SYSTEM32>\sysdm.cpl,NoExecuteProcessException %TEMP%\svchost.exe
- <SYSTEM32>\dumprep.exe 2896 -dm 7 7 "%TEMP%\WERe9db.dir00\svchost.exe.hdmp" 16325836412027368
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:"%TEMP%\RES2.tmp"" ""%TEMP%\vbc1.tmp""
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /noconfig @"%TEMP%\ckkpenzl.cmdline"
- <SYSTEM32>\reg.exe ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "%TEMP%\svchost.exe" /t REG_SZ /d "%TEMP%\svchost.exe:*:Enabled:Windows Messanger" /f
- <SYSTEM32>\reg.exe ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f