This post is part of the series of Practical Malware Analysis Exercises.
Parsing/processing commands, and sleeping, are contained within the loop.
A for loop with 1440 iterations.
Sends UserAgent with pma%d
instead of pma
%d
is the duration of the program run.
(1440 iterations) * (60s sleep) = 1440 minutes = 24 hours = 1 day.
- URL:
http://www.practicalmalwareanalysis.com/cc.htm
- User agent:
Internet Explorer 7.50/pma
+ numerical wildcard
Setting the registry key enables persistence. Will run for 24 hours after each boot, transmitting uptime and fetching commands each minute.
- Malware identifies itself to server via UserAgent string.
- Malware gets 1 byte (a-e) command from
cc.htm
page via HTML comment. - Based on command, copy self to
cc.exe
, install, delete, or sleep. - Will run for 24 hours.