Win32.HLLW.Facebook.156.origin
Added to the Dr.Web virus database:
2025-01-31
Virus description added:
2025-01-31
Technical Information
To ensure autorun and distribution
Sets the following service settings
- [HKLM\System\CurrentControlSet\Services\ddnsfilter] 'Start' = '00000002'
- [HKLM\System\CurrentControlSet\Services\ddnsfilter] 'ImagePath' = '<SYSTEM32>\SvchoSt.ExE -k ddnsfilter'
- [HKLM\sYsTEM\CuRrenTcoNtroLsET\serVicES\dDNsFilter\pAraMEters] 'ServICeDll' = '%ProgramFiles(x86)%\DDnsFilter\DDnsFilter.dll'
- [HKLM\System\CurrentControlSet\Services\DnsFilter] 'Start' = '00000001'
- [HKLM\System\CurrentControlSet\Services\DnsFilter] 'ImagePath' = '<DRIVERS>\DnsFilter.sys'
Creates the following services
- 'ddnsfilter' <SYSTEM32>\SvchoSt.ExE -k ddnsfilter
- 'DnsFilter' <DRIVERS>\DnsFilter.sys
Malicious functions
Executes the following
- '%WINDIR%\syswow64\netsh.exe' fIrewaLl AdD AllOWeDPrOgrAm naMe="ddnsfilter" prOGram="<SYSTEM32>\SvchoSt.ExE" mode=ENABLE
- '%WINDIR%\syswow64\netsh.exe' fIrewaLl AdD pOrToPEnIng tcP 8085 ddnsfilter eNABLe
Modifies file system
Creates the following files
- <Full path to file>.exe
- %WINDIR%\syswow64\drivers\dnsfilter.sys
- %ProgramFiles(x86)%\ddnsfilter\ddnsfilter.dll
- %TEMP%\dnsfilter.bat
Deletes the following files
Miscellaneous
Creates and executes the following
- '<Full path to file>.exe' /res
Executes the following
- '%WINDIR%\syswow64\cmd.exe' /c copy "<Full path to file>" "<Full path to file>.exe"
- '%WINDIR%\syswow64\cmd.exe' /c "<Full path to file>.exe" /res >%teMP%\DnsFilter.bat
- '%WINDIR%\syswow64\cmd.exe' /c "%teMP%\DnsFilter.bat"
- '%WINDIR%\syswow64\reg.exe' add "soFtWARe\miCRoSOfT\INTerNEt exPloREr\MAin" /v tp /t REG_SZ /d 8238
- '%WINDIR%\syswow64\sc.exe' CreATe "ddnsfilter" tyPE= share start= auto binPaTh= "<SYSTEM32>\SvchoSt.ExE -k ddnsfilter"
- '%WINDIR%\syswow64\reg.exe' adD "hklm\sYsTEM\CuRrenTcoNtroLsET\serVicES\dDNsFilter\pAraMEters" /v ServICeDll /t ReG_EXpaND_Sz /d "%ProgramFiles(x86)%\DDnsFilter\DDnsFilter.dll" /f
- '%WINDIR%\syswow64\reg.exe' adD "hklm\sYsTEM\CuRrenTcoNtroLsET\serVicES\dDNsFilter" /v FailuREaCtIOns /t rEG_BInaRY /d 00000000000000000000000003000000140000000100000060EA00000100000060EA00000100000060EA0000 /f
- '%WINDIR%\syswow64\reg.exe' adD "hklm\SOfTwaRe\mIcrOSoFt\WiNdoWs nt\CURrENtveRSiOn\svcHoSt" /v ddnsfilter /t rEg_mULti_sz /d "ddnsfilter\0" /f
- '%WINDIR%\syswow64\sc.exe' start ddnsfilter
- '%WINDIR%\syswow64\svchost.exe' -k ddnsfilter
- '%WINDIR%\syswow64\sc.exe' boot ok
- '%WINDIR%\syswow64\ipconfig.exe' /flushdns
- '%WINDIR%\syswow64\cmd.exe' /c copy "<Full path to file>" "<Full path to file>.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c "<Full path to file>.exe" /res >%teMP%\DnsFilter.bat' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c "%teMP%\DnsFilter.bat"' (with hidden window)
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息