Win32.IRC.Bot.693
Added to the Dr.Web virus database:
2025-03-29
Virus description added:
2025-03-31
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
- [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
- [HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
Modifies file system
Creates the following files
- %WINDIR%\syswow64\setup\winlogons.exe
- %WINDIR%\syswow64\setup\desktop.sys
- %WINDIR%\syswow64\setup\explorer.sys
- %WINDIR%\syswow64\setup\user32.dll
- %WINDIR%\syswow64\setup\gdi32.dll
- %WINDIR%\syswow64\setup\win.ini
Sets the 'hidden' attribute to the following files
- %WINDIR%\syswow64\setup\winlogons.exe
Miscellaneous
Searches for the following windows
- ClassName: 'HijackThis' WindowName: ''
- ClassName: 'TAAWCore' WindowName: ''
- ClassName: '' WindowName: 'Microsoft AntiSpyware AutoUpdater'
- ClassName: '' WindowName: 'Microsoft AntiSpyware (Beta 1)'
- ClassName: 'ThunderRT6FormDC' WindowName: 'gcasDtServHolder'
- ClassName: 'Sym_ccWebWindow_Class' WindowName: 'Norton AntiVirus'
- ClassName: '' WindowName: 'AVG Anti-Virus 7.1'
- ClassName: '' WindowName: 'AnalogX PacketMon (www.analogx.com)'
- ClassName: 'IrisWnd' WindowName: ''
- ClassName: '' WindowName: 'CommView'
- ClassName: '' WindowName: 'EtherDetect'
- ClassName: '' WindowName: 'Sniffem'
- ClassName: 'LF-MAIN' WindowName: ''
- ClassName: '' WindowName: 'Sniphere v2.0'
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: 'SandboxieControlWndClass' WindowName: ''
Creates and executes the following
- '%WINDIR%\syswow64\setup\winlogons.exe' /del <Full path to file>
Executes the following
- '%WINDIR%\syswow64\setup\winlogons.exe' /del <Full path to file>' (with hidden window)
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息