Win32.HLLW.Siggen.1591
Added to the Dr.Web virus database:
2011-01-20
Virus description added:
2014-07-22
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run] 'NVIDIA driver monitor' = '%WINDIR%\nvsvc32.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'NVIDIA driver monitor' = '%WINDIR%\nvsvc32.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'NVIDIA driver monitor' = '%WINDIR%\nvsvc32.exe'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '%WINDIR%\nvsvc32.exe:*:Enabled:NVIDIA driver monitor'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:NVIDIA driver monitor'
Creates and executes the following:
Executes the following:
- '<SYSTEM32>\net1.exe' stop wuauserv
- '<SYSTEM32>\sc.exe' config wuauserv start= disabled
- '<SYSTEM32>\net1.exe' stop MsMpSvc
- '<SYSTEM32>\sc.exe' config MsMpSvc start= disabled
- '<SYSTEM32>\net.exe' stop MsMpSvc
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram 1.exe 1 ENABLE
- '<SYSTEM32>\net1.exe' stop
- '<SYSTEM32>\net.exe' stop wuauserv
- '%WINDIR%\explorer.exe' http://br#####sers.myspace.com/Browse/Browse.aspx
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index[1].php
- %WINDIR%\nvsvc32.exe
Sets the 'hidden' attribute to the following files:
- %WINDIR%\nvsvc32.exe
- <Full path to virus>
Network activity:
Connects to:
- '13#.#4.181.237':80
- 'localhost':1039
TCP:
UDP:
- DNS ASK st###ntime.info
- DNS ASK ve###tek.com
- DNS ASK tr####ationale.org
- DNS ASK jo######faccountancy.com
- DNS ASK ft#.##oenix-cc.net
- DNS ASK ap#.####rtoshistory.info
- DNS ASK as###.ic.ac.uk
- DNS ASK br#####sers.myspace.com
- DNS ASK al#.##kibili.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'ComboBoxEx32' WindowName: '(null)'
- ClassName: 'ComboBox' WindowName: '(null)'
- ClassName: 'Address Band Root' WindowName: '(null)'
- ClassName: 'msctls_statusbar32' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'ReBarWindow32' WindowName: '(null)'
- ClassName: 'IEFrame' WindowName: '(null)'
- ClassName: 'Frame Tab' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'HTMLSOURCEVIEW' WindowName: '(null)'
- ClassName: 'Internet Explorer_Server' WindowName: '(null)'
- ClassName: 'WorkerW' WindowName: '(null)'
- ClassName: 'TabWindowClass' WindowName: '(null)'
- ClassName: 'Shell DocObject View' WindowName: '(null)'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息