Win32.HLLW.Autoruner1.24949
Added to the Dr.Web virus database:
2012-08-16
Virus description added:
2012-09-05
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Classes\.cmd] '' = 'Pr00-X '
- [<HKLM>\SOFTWARE\Classes\.exe] '' = 'Pr00-X '
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Vista Activation Pacth' = '<SYSTEM32>\Vista Activation Pacth.exe'
- [<HKLM>\SOFTWARE\Classes\.com] '' = 'Pr00-X'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
Malicious functions:
Executes the following:
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.wave"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.exe"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.ini"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.png"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.gif"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.bmp"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.pdf"
- <SYSTEM32>\rundll32.exe <SYSTEM32>\shell32.dll,OpenAs_RunDLL <SYSTEM32>\H
- <SYSTEM32>\msg.exe * H A C K E D
- <SYSTEM32>\ping.exe 127.0.0.1 -n 30
- <SYSTEM32>\ping.exe 127.0.0.1 -n 4
- <SYSTEM32>\reg.exe delete "HKLM\SYSTEM\currentcontrolset\control\safeboot\minimal" /f
- <SYSTEM32>\reg.exe delete "HKLM\SYSTEM\CurrentControlSet\control\safeboot\network" /f
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.jpg"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.log"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.wmv"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.txt"
- <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Vista Activation Pacth" /t REG_SZ /d "<SYSTEM32>\Vista Activation Pacth.exe" /f
- <SYSTEM32>\reg.exe add "HKLM\System\CurrentControlSet\Services\Mouclass" /v Start /t REG_DWORD /d "4" /f
- <SYSTEM32>\reg.exe add "HKLM\System\CurrentControlSet\Services\Kbdclass" /v Start /t REG_DWORD /d "4" /f
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.dll"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.cmd"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.wav"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.mp3"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.sys"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.reg"
- <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.com"
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\microsoft[1]
- <SYSTEM32>\H
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\microsoft[1]
- C:\autorun.inf
- %TEMP%\~1.bat
- <SYSTEM32>\Vista Activation Pacth.exe
- <SYSTEM32>\<Virus name>.exe
Sets the 'hidden' attribute to the following files:
Deletes the following files:
Network activity:
Connects to:
- 'localhost':1039
- '20#.#6.232.182':80
- 'localhost':1036
TCP:
UDP:
- DNS ASK www.microsoft.com
- DNS ASK microsoft.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'IEFrame' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息