•Bypasses firewall, removes, or modifies the listed registry keys.
•To complicate detection of its presence in the operating system:
▫Forces the system to hide from view:
▪hidden files;
▪file extensions.
▫Blocks execution of the listed system utilities:
▪Command Prompt (CMD);
▪Windows Task Manager (Taskmgr);
▪Registry Editor (RegEdit).
▪Windows Firewall.
▪System Updates (Windows Update).
▪Windows Security Center.
▪System Anti-virus (Windows Defender).
▫Blocks the following features:
▪System Restore (SR);
▪Windows File Protection (WFP);
▪User Account Control (UAC);
▪System File Checker (SFC);
▪Windows Security Center.
▪Windows Support Center (Action Center).
▫Changes the listed system preferences:
▪changes the DNS server;
▪disables taskbar notifications.
▫removes shadow copies of volumes;
▫adds anti-virus exceptions using the listed registry keys.
•Creates and executes the listed processes:
▫creates and executes files (an exploit);
▫creates and loads libraries (an exploit);
▫downloads and executes files.
•Executes the listed processes.
•Injects code into the listed processes:
▫listed system processes;
▫listed user processes;
▫a large number of user processes.
•Installs hooks to intercept notifications:
▫About keystrokes:
▪Handler for all processes;
▪Handler for the listed processes.
•Terminates or attempts to terminate:
▫processes;
▫listed system processes;
▫listed user processes;
▫a large number of user processes.
▫processes of traffic analysis and program running applications;
▫processes by name.
•Searches for registry branches where third-party applications store passwords.
•Executes WMI operations.
•Registers a file system filter driver.
•Searches for the listed windows to:
▫bypass different anti-viruses;
▫bypass the Windows File Protection system;
▫detect analytics tools;
▫detect applications and games;
▫detect virtual machines.
•Creates an onion service.
•Loads the listed drivers.
•Hooks the following functions in the System Service Descriptor Table (SSDT):
▫a handler.
•Restores hooked functions in the System Service Descriptor Table (SSDT).
•Brute forces passwords of OS accounts.
•Performs a bruteforce attack in the network.
•Disables AMSI.
•Changes firewall settings.
•Changes router settings.
•Stops critical services.
•Manages services.
•Blocks through firewall:
▫SSH;
▫telnet;
▫standard web service ports.
•Modifies the listed settings of Windows Explorer.
•Modifies the listed settings of Windows Internet Explorer.
•Affects processes:
▫hides the listed processes;
▫traces processes;
▫injects itself in processes.
•Forces autorun for removable media.
•Sets a new unauthorized home page for Internet Explorer.
•Attempts to shut down Windows OS.
•Sends SMS.
•Executes the code of detectable threats.
•Downloads detectable threats from the internet.
•Sends contacts saved on the device to a remote server.
•Sends data on incoming SMS to a remote server.
•Overlays the interface preventing access to it.
•Sets a lock screen password.
•Prompts to install a third-party application.
•Hides its icon from screen.
•Ends incoming phone calls.
•Muffles incoming phone calls.
•Intercepts incoming SMS and terminates the process of their transmission to handlers of other apps.
•Deactivates a device administrator.
•Removes user data.
•Threat detection based on machine learning.
•Contains typical banking trojan/virus code.
•Contains typical locker code.
•Loads the listed detectable threats to be executed.
•Downloads the listed detectable threats from the internet.
•Launches a large number of processes. |