Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner.52376

Added to the Dr.Web virus database: 2011-06-24

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'syshost.exe' = '"%APPDATA%\syshost.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'syshost.exe' = '"%APPDATA%\syshost.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%APPDATA%\cnbzoj\gtRgDw.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\{Administr\autorun.inf
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\{Administr\syshost.exe
Malicious functions:
Creates and executes the following:
  • %APPDATA%\syshost.exe 
  • %APPDATA%\cnbzoj\gtRgDw.exe 
Executes the following:
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "%APPDATA%\cnbzoj\gtRgDw.exe" /f
  • <SYSTEM32>\cmd.exe /c """%TEMP%\HXdGV.bat"" "
Injects code into
the following system processes:
  • <SYSTEM32>\cscript.exe
  • <SYSTEM32>\ctfmon.exe
  • %WINDIR%\Explorer.EXE
the following user processes:
  • nod.exe
  • netxray.exe
  • msnmsgr.exe
  • nod32.exe
  • pidgin.exe
  • outpost.exe
  • opera.exe
  • msn6.exe
  • lotroclient.exe
  • lin.bin
  • l2.bin
  • magent.exe
  • mpftray.exe
  • miranda32.exe
  • maplestory.exe
  • wow.exe
  • woool.exe
  • windump.exe
  • wsm.exe
  • zlclient.exe
  • zapro.exe
  • ybclient.exe
  • winbaram.exe
  • smc.exe
  • skype.exe
  • qip.exe
  • so3d.exe
  • trillian.exe
  • sro_client.exe
  • spidernt.exe
  • chrome.exe
  • ccapp.exe
  • cabalmain.exe
  • dekaron.exe
  • drweb386.exe
  • drweb.exe
  • dnf.exe
  • bdsubmit.exe
  • aion.exe
  • ageofconan.exe
  • __cd75efb816b2cc__.exe
  • ash.exe
  • bdss.exe
  • bdagent.exe
  • avgcc.exe
  • ge.exe
  • gc.exe
  • fsavgui.exe
  • googletalk.exe
  • iexplore.exe
  • httplook.exe
  • gw.exe
  • fsavaui.exe
  • ekrn.exe
  • egni.exe
  • ecmd.exe
  • elementclient.exe
  • fsav32.exe
  • fsav.exe
  • firefox.exe
Modifies file system :
Creates the following files:
  • %APPDATA%\syshost.exe
  • %APPDATA%\cnbzoj\gtRgDw.exe
  • %TEMP%\HXdGV.bat
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\{Administr\syshost.exe
  • <Drive name for removable media>:\autorun.inf
  • %APPDATA%\cnbzoj\gtRgDw.exe
  • %APPDATA%\syshost.exe
Deletes the following files:
  • <Drive name for removable media>:\autorun.inf
Network activity:
Connects to:
  • 'dr#####ork.no-ip.org':3211
UDP:
  • DNS ASK dr#####ork.no-ip.org
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''