Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Siggen.1538

Added to the Dr.Web virus database: 2010-12-20

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run] 'NVIDIA driver monitor' = '%WINDIR%\nvsvc32.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'NVIDIA driver monitor' = '%WINDIR%\nvsvc32.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'NVIDIA driver monitor' = '%WINDIR%\nvsvc32.exe'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '%WINDIR%\nvsvc32.exe:*:Enabled:NVIDIA driver monitor'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:NVIDIA driver monitor'
Creates and executes the following:
  • '%WINDIR%\nvsvc32.exe'
Executes the following:
  • '<SYSTEM32>\net1.exe' stop wuauserv
  • '<SYSTEM32>\sc.exe' config wuauserv start= disabled
  • '<SYSTEM32>\net1.exe' stop MsMpSvc
  • '<SYSTEM32>\sc.exe' config MsMpSvc start= disabled
  • '<SYSTEM32>\net.exe' stop MsMpSvc
  • '<SYSTEM32>\netsh.exe' firewall add allowedprogram 1.exe 1 ENABLE
  • '<SYSTEM32>\net1.exe' stop
  • '<SYSTEM32>\net.exe' stop wuauserv
  • '%WINDIR%\explorer.exe' http://br#####sers.myspace.com/Browse/Browse.aspx
Searches for windows to
detect programs and games:
  • ClassName: 'MSNHiddenWindowClass' WindowName: '(null)'
  • ClassName: '_Oscar_StatusNotify' WindowName: '(null)'
Modifies file system :
Creates the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index[1].php
  • %WINDIR%\nvsvc32.exe
Sets the 'hidden' attribute to the following files:
  • %WINDIR%\nvsvc32.exe
  • <Full path to virus>
Network activity:
Connects to:
  • '13#.#4.181.237':80
  • '24#.#56.38.240':1234
  • 'localhost':1040
TCP:
HTTP GET requests:
  • 13#.#4.181.237/index.php
UDP:
  • DNS ASK ve###tek.com
  • DNS ASK al#####shistory.info
  • DNS ASK jo######faccountancy.com
  • DNS ASK st###ntime.info
  • DNS ASK ds.###enix-cc.net
  • DNS ASK as###.ic.ac.uk
  • DNS ASK al#.##kibili.com
  • DNS ASK br#####sers.myspace.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'TskMultiChatForm.UnicodeClass' WindowName: '(null)'
  • ClassName: '__oxFrame.class__' WindowName: '(null)'
  • ClassName: 'HTMLSOURCEVIEW' WindowName: '(null)'
  • ClassName: 'Message Session' WindowName: '(null)'
  • ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
  • ClassName: '' WindowName: '(null)'
  • ClassName: 'Indicator' WindowName: '(null)'
  • ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'