Win32.HLLW.Autoruner2.64530
Added to the Dr.Web virus database:
2019-10-08
Virus description added:
2019-10-09
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'njw0rm.exe' = '"%TEMP%\njw0rm.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'njw0rm.exe' = '"%TEMP%\njw0rm.exe"'
Creates or modifies the following files
- %HOMEPATH%\start menu\programs\startup\njw0rm.exe
Creates the following files on removable media
- <Drive name for removable media>:\njw0rm.exe
- <Drive name for removable media>:\my pictures.lnk
- <Drive name for removable media>:\correct.avi.lnk
- <Drive name for removable media>:\delete.avi.lnk
- <Drive name for removable media>:\000814251_video_01.avi.lnk
- <Drive name for removable media>:\split.avi.lnk
- <Drive name for removable media>:\toolbar.bmp.lnk
- <Drive name for removable media>:\coffee.bmp.lnk
- <Drive name for removable media>:\dialmap.bmp.lnk
- <Drive name for removable media>:\dashborder_192.bmp.lnk
- <Drive name for removable media>:\dial.bmp.lnk
Malicious functions
To bypass firewall, removes or modifies the following registry keys
- [<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\njw0rm.exe' = '%TEMP%\njw0rm.exe:*:Enabled:njw0rm.exe'
Executes the following
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\njw0rm.exe" "njw0rm.exe" ENABLE
Modifies file system
Creates the following files
- %TEMP%\njw0rm.exe.ini
- %TEMP%\njw0rm.exe
Sets the 'hidden' attribute to the following files
- <Drive name for removable media>:\njw0rm.exe
Deletes itself.
Miscellaneous
Creates and executes the following
- '%TEMP%\njw0rm.exe' "del" <Full path to file>
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\njw0rm.exe" "njw0rm.exe" ENABLE' (with hidden window)
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息