Win32.HLLW.Autoruner1.27397
Added to the Dr.Web virus database:
2012-10-07
Virus description added:
2012-10-17
Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\lanmanserver] 'Start' = '00000002'
Creates the following files on removable media:
- <Drive name for removable media>:\2012 Phim.exe
Malicious functions:
Creates and executes the following:
- %TEMP%\kis.exe
- %ALLUSERSPROFILE%\Application Data\inetinfo.exe
Executes the following:
- <SYSTEM32>\sc.exe config wscsvc start= di
- <SYSTEM32>\net.exe stop wscsvc
- <SYSTEM32>\net1.exe user HelpAssistant /active
- <SYSTEM32>\net1.exe localgroup %USERNAME%s HelpA
- <SYSTEM32>\sc.exe config lanmanserver start= auto
- <SYSTEM32>\net1.exe s
- <SYSTEM32>\net1.exe stop wscsvc
- <SYSTEM32>\reg.exe add "HKEY_LO
- <SYSTEM32>\net1.exe user HelpAssistant "active
- <SYSTEM32>\tasklist.exe
- <SYSTEM32>\arp.exe -a
- <SYSTEM32>\cmd.exe /c %TEMP%\info.bat
- <SYSTEM32>\net1.exe localgroup %USERNAME%s
- <SYSTEM32>\reg.exe add HKEY_LOCAL_MACH
- <SYSTEM32>\net1.exe user HelpAssistant "active:YES1
- <SYSTEM32>\cmd.exe /c %TEMP%\oi.bat
- <SYSTEM32>\reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Current
Modifies file system :
Creates the following files:
- C:\winword3.doc
- %TEMP%\oi.bat
- %TEMP%\kis.exe
- %TEMP%\temp.vih
- %ALLUSERSPROFILE%\Application Data\inetinfo.exe
- %TEMP%\info.bat
Deletes the following files:
- %TEMP%\oi.bat
- %TEMP%\info.bat
- %TEMP%\temp.vih
Network activity:
Connects to:
UDP:
- DNS ASK vi##.zdungk.com
- DNS ASK windowsupdate.microsoft.com
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息