Win32.HLLW.Autoruner.62035
Added to the Dr.Web virus database:
2011-10-05
Virus description added:
2011-10-05
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = 'C:\Program File\Microsoft\MicrosoftSafety.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = 'C:\Program File\Microsoft\MicrosoftSafety.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = ' C:\Program File\Microsoft\MicrosoftSafety.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\C0MM\C0MM\svchost.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
Executes the following:
- <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 1 /f
- <SYSTEM32>\net1.exe users /add SYS_4321 passPass
- <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t REG_DWORD /d 0 /f
- <SYSTEM32>\attrib.exe +s +h +r <Drive name for removable media>:\autorun.inf
- <SYSTEM32>\reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v SYS_4321 /t REG_DWORD /d 0 /f
- <SYSTEM32>\reg.exe add "HKEY_CLASSES_ROOT\Network\SharingHandler" /v "" /t REG_SZ /d "" /f
- <SYSTEM32>\net1.exe users SYS_4321 passPass
- <SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system" /v shutdownwithoutlogon /d 0 /t REG_DWORD /f
- <SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d "C:\Program File\Microsoft\MicrosoftSafety.exe" /f
- <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d "C:\Program File\Microsoft\MicrosoftSafety.exe" /f
- <SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d " C:\Program File\Microsoft\MicrosoftSafety.exe" /f
- <SYSTEM32>\reg.exe DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf" /f
- <SYSTEM32>\net1.exe localgroup %USERNAME%s /add SYS_4321
- <SYSTEM32>\net1.exe share SYS_C$=C:\
- <SYSTEM32>\attrib.exe +s +H "C:\Program File\Microsoft"
- <SYSTEM32>\attrib.exe +s +H C:\C0MM
- <SYSTEM32>\attrib.exe +s +H "<Current directory>\<Virus name>"
- <SYSTEM32>\tskill.exe taskmagr
- <SYSTEM32>\attrib.exe +s +H "C:\Program File"
- <SYSTEM32>\attrib.exe +s +H C:\C0MM\C0MM
- <SYSTEM32>\net1.exe share SYS_D$=<Drive name for removable media>:\
- <SYSTEM32>\attrib.exe -r -a <Drive name for removable media>:\autorun.inf
- <SYSTEM32>\attrib.exe +s +H <Drive name for removable media>:\C0MM\C0MM
- <SYSTEM32>\attrib.exe -r -a C:\autorun.inf
- <SYSTEM32>\attrib.exe +s +h +r C:\autorun.inf
- <SYSTEM32>\attrib.exe +s +H <Drive name for removable media>:\C0MM
Modifies file system :
Creates the following files:
- C:\autorun.inf
- C:\C0MM\C0MM\svchost.exe
- C:\Program File\Microsoft\MicrosoftSafety.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- C:\autorun.inf
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: '' WindowName: 'af32d3b0'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息