Home Malware Programs Worms Java.Cogyeka

Java.Cogyeka

Posted: July 9, 2012

Threat Metric

Ranking: 12,229
Threat Level: 2/10
Infected PCs: 15,446
First Seen: July 9, 2012
Last Seen: March 8, 2025
OS(es) Affected: Windows

Java.Cogyeka is a worm that circulates through removable and mapped drives. Java.Cogyeka also drops a remote file onto the infected computer. Once executed, Java.Cogyeka creates several potentially malicious files. Java.Cogyeka also creates the certain registry entry. Java.Cogyeka downloads a module from the specific location '[RANDOM LETTERS].[DOMAIN NAME]:[RANDOM PORT NUMBER]'. Java.Cogyeka opens a random UDP port on the targeted PC that is used by the downloaded module.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%DriveLetter%\autorun.inf File name: %DriveLetter%\autorun.inf
Mime Type: unknown/inf
Group: Malware file
%DriveLetter%\RECYCLER\[SID]\desktop.ini File name: %DriveLetter%\RECYCLER\[SID]\desktop.ini
Mime Type: unknown/ini
Group: Malware file
%DriveLetter%\RECYCLER\[SID]\[RANDOM LETTERS].[THREE RANDOM LETTERS] File name: %DriveLetter%\RECYCLER\[SID]\[RANDOM LETTERS].[THREE RANDOM LETTERS]
Mime Type: unknown/[THREE RANDOM LETTERS]
Group: Malware file
%Temp%\hsperfdata_[USER NAME]\[RANDOM DIGITS] File name: %Temp%\hsperfdata_[USER NAME]\[RANDOM DIGITS]
Group: Malware file
%Temp%\hsperfdata_[USER NAME]\[RANDOM LETTERS].dll File name: %Temp%\hsperfdata_[USER NAME]\[RANDOM LETTERS].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%Temp%\hsperfdata_[USER NAME]\[SYSTEM EXECUTABLE FILE NAME].exe File name: %Temp%\hsperfdata_[USER NAME]\[SYSTEM EXECUTABLE FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%\jar_cache[RANDOM DIGITS].tmp File name: %Temp%\jar_cache[RANDOM DIGITS].tmp
Mime Type: unknown/tmp
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{175975F5-C68F-0875-C827-9225E76EAC65}\"StubPath" = "cmd /q /c start "" /I /B javaw -classpath %Temp%\jar_cache[NUMBERS].tmp"

Additional Information

The following URL's were detected:
-about.me
Loading...