Win32.HLLM.Generic.411
Added to the Dr.Web virus database:
2012-01-04
Virus description added:
2019-07-22
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Control Panel\Desktop\] 'SCRNSAVE.EXE' = '<SYSTEM32>\babon.SCR'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'babon' = '%WINDIR%\babon'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'MSMSGS' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\winlogon.exe'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\] 'Logonuser' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\csrss.exe'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\] 'System Monitoring' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\lsass.exe'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe "<SYSTEM32>\IExplorer.exe"'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\IExplorer.exe'
- [<HKLM>\Software\Classes\exefile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\Software\Classes\lnkfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\Software\Classes\piffile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\Software\Classes\batfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
- [<HKLM>\Software\Classes\comfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
Creates the following files on removable media
- <Drive name for removable media>:\wangsit.txt
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\cewek_imoet.exe
- <Drive name for removable media>:\file_rahasia user.exe
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
blocks the following features:
modifies the following system settings:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoFolderOptions' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoTrayContextMenu' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoClose' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'StartMenuLogOff' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoFind' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoSetFolders' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoSetTaskbar' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoRun' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoUserNameInStartMenu' = '00000001'
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system
Creates the following files
- %WINDIR%\babon.exe
- %HOMEPATH%\local settings\application data\csrss.exe
- %HOMEPATH%\local settings\application data\smss.exe
- D:\file_rahasia user.exe
- D:\cewek_imoet.exe
- D:\autorun.inf
- D:\wangsit.txt
- C:\file_rahasia user.exe
- C:\cewek_imoet.exe
- C:\autorun.inf
- %HOMEPATH%\local settings\application data\winlogon.exe
- %WINDIR%\msvbvm60.dll
- %HOMEPATH%\local settings\application data\windows\smss.exe
- %HOMEPATH%\local settings\application data\windows\lsass.exe
- %HOMEPATH%\local settings\application data\windows\csrss.exe
- %HOMEPATH%\local settings\application data\windows\winlogon.exe
- C:\users\all users\start menu\programs\startup\empty.pif
- %WINDIR%\syswow64\iexplorer.exe
- %WINDIR%\syswow64\babon.scr
- %WINDIR%\syswow64\shell.exe
- C:\babon.exe
- C:\wangsit.txt
- %HOMEPATH%\local settings\application data\lsass.exe
Sets the 'hidden' attribute to the following files
- %HOMEPATH%\local settings\application data\windows\winlogon.exe
- %HOMEPATH%\local settings\application data\windows\lsass.exe
- %HOMEPATH%\local settings\application data\windows\csrss.exe
- %HOMEPATH%\local settings\application data\windows\smss.exe
- %WINDIR%\babon.exe
- %WINDIR%\msvbvm60.dll
- C:\autorun.inf
- D:\autorun.inf
- <Drive name for removable media>:\autorun.inf
- C:\babon.exe
Deletes the following files
- %HOMEPATH%\local settings\application data\csrss.exe
Substitutes the following files
- %HOMEPATH%\local settings\application data\csrss.exe
Miscellaneous
Searches for the following windows
- ClassName: 'RegEdit_RegEdit' WindowName: ''
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: '' WindowName: 'Folder Options'
- ClassName: '' WindowName: 'Local Settings'
- ClassName: 'ExploreWClass' WindowName: ''
- ClassName: 'CabinetWClass' WindowName: ''
- ClassName: 'RebarWindow32' WindowName: ''
- ClassName: 'ComboBoxEx32' WindowName: ''
- ClassName: 'ComboBox' WindowName: ''
- ClassName: 'Edit' WindowName: ''
- ClassName: '#32770' WindowName: ''
Creates and executes the following
- '%WINDIR%\babon.exe'
- '%WINDIR%\syswow64\iexplorer.exe'
- '%HOMEPATH%\local settings\application data\windows\winlogon.exe'
- '%HOMEPATH%\local settings\application data\windows\csrss.exe'
- '%HOMEPATH%\local settings\application data\windows\lsass.exe'
- '%WINDIR%\babon.exe' ' (with hidden window)
- '%WINDIR%\syswow64\iexplorer.exe' ' (with hidden window)
- '%HOMEPATH%\local settings\application data\windows\winlogon.exe' ' (with hidden window)
- '%HOMEPATH%\local settings\application data\windows\csrss.exe' ' (with hidden window)
- '%HOMEPATH%\local settings\application data\windows\lsass.exe' ' (with hidden window)
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息