Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Gedzac.15

Added to the Dr.Web virus database: 2012-08-19

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Classes\regfile\shell\open\command] '' = '%WINDIR%\MSRundll32.exe "%1" %*'
  • [<HKLM>\SOFTWARE\Classes\exefile\shell\open\command] '' = '%WINDIR%\MSRundll32.exe "%1" %*'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
blocks the following features:
  • System Restore (SR)
  • System File Checker (SFC)
Creates and executes the following:
  • %WINDIR%\MSRundll32.exe
Executes the following:
  • <SYSTEM32>\net1.exe stop SharedAccess
  • <SYSTEM32>\net.exe stop SharedAccess
  • %WINDIR%\regedit.exe /s c:\l.reg
Injects code into
the following system processes:
  • <SYSTEM32>\svchost.exe
Terminates or attempts to terminate
the following user processes:
  • httplook.exe
  • GUARD.EXE
  • magent.exe
  • mpftray.exe
  • MCAGENT.EXE
  • fsav.exe
  • Drwebwcl.exe
  • fsav32.exe
  • fsavgui.exe
  • fsavaui.exe
  • WebMoney.exe
  • spidernt.exe
  • zapro.exe
  • ZONEALARM.EXE
  • zlclient.exe
  • nod.exe
  • NAVAPW32.EXE
  • nod32.exe
  • smc.exe
  • outpost.exe
  • AVP.COM
  • AVGCTRL.EXE
  • AVP.EXE
  • AVPCC.EXE
  • AVP32.EXE
  • ashAvast.exe
  • ash.exe
  • ashAvSrv.exe
  • AVGCC32.EXE
  • avgcc.exe
  • drweb.exe
  • ClamWin.exe
  • Drweb32w.exe
  • Drwebupw.exe
  • drweb386.exe
  • AVSYNMGR.EXE
  • AVPM.EXE
  • bdagent.exe
  • ccapp.exe
  • bdss.exe
Modifies file system :
Creates the following files:
  • \Device\LanmanRedirector\#$*\MAILSLOT\NET\NETLOGON
  • %WINDIR%\ymsg\amor_love.zip
  • %WINDIR%\ymsg\mi poema.zip
  • \Device\LanmanRedirector\#$%^&*\MAILSLOT\NET\NETLOGON
  • \Device\LanmanRedirector\#$%^*\MAILSLOT\NET\NETLOGON
  • \Device\LanmanRedirector\#$%*\MAILSLOT\NET\NETLOGON
  • %WINDIR%\ymsg\Video.zip
  • %WINDIR%\Wininit.ini
  • C:\l.reg
  • %WINDIR%\MSRundll32.exe
  • %WINDIR%\ymsg\chicas_girls.zip
  • %WINDIR%\ymsg\Mi foto.zip
  • %WINDIR%\Leliel.zip
Network activity:
Connects to:
  • '<Private IP address>':80
  • '<Private IP address>':139
  • 'www.fb#.gov':80
  • '<Private IP address>':445
TCP:
HTTP GET requests:
  • www.fb#.gov/
UDP:
  • DNS ASK www.fb#.gov
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'RegEdit_RegEdit' WindowName: ''