La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLW.Autoruner.56180

Aggiunto al database dei virus Dr.Web: 2011-08-13

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '"%TEMP%\7~EV^7.eXe"' = '"%TEMP%\7~EV^7.eXe"'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '<Full path to virus>' = '<Full path to virus>'
Creates or modifies the following files:
  • %WINDIR%\Tasks .scr
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup .scr
Creates the following files on removable media:
  • <Drive name for removable media>:\win7~.exe
  • <Drive name for removable media>:\autorun.inf
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '"%TEMP%\7~EV^7.eXe"' = '"%TEMP%\7~EV^7.eXe:*:Enabled:Windows" Update'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:Windows Update'
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
Executes the following:
  • <SYSTEM32>\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ""%TEMP%\7~EV^7.eXe"" /t REG_SZ /d ""%TEMP%\7~EV^7.eXe"" /f
  • <SYSTEM32>\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "<Full path to virus>" /d "<Full path to virus>:*:Enabled:Windows Update" /f
  • <SYSTEM32>\ftp.exe -s:rr3h6
  • <SYSTEM32>\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v ""%TEMP%\7~EV^7.eXe"" /d ""%TEMP%\7~EV^7.eXe":*:Enabled:Windows Update" /f
  • <SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSuperHidden /T REG_DWORD /D 00000000 /F
  • <SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Hidden /T REG_DWORD /D 00000002 /F
  • <SYSTEM32>\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "<Full path to virus>" /t REG_SZ /d "<Full path to virus>" /f
  • <SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V HideFileExt /T REG_DWORD /D 00000001 /F
Terminates or attempts to terminate
the following user processes:
  • chrome.exe
Modifies file system :
Creates the following files:
  • %WINDIR%\msagent .scr
  • %WINDIR%\msapps .scr
  • %WINDIR%\Media .scr
  • %WINDIR%\Microsoft.NET .scr
  • %WINDIR%\mui .scr
  • %WINDIR%\pchealth .scr
  • %WINDIR%\PeerNet .scr
  • %WINDIR%\OemDir .scr
  • %WINDIR%\Offline Web Pages .scr
  • %WINDIR%\java .scr
  • %WINDIR%\Driver Cache .scr
  • %WINDIR%\ehome .scr
  • %WINDIR%\Debug .scr
  • %WINDIR%\Downloaded Program Files .scr
  • %WINDIR%\Fonts .scr
  • %WINDIR%\inf .scr
  • %WINDIR%\Installer .scr
  • %WINDIR%\Help .scr
  • %WINDIR%\ime .scr
  • %WINDIR%\Temp .scr
  • %WINDIR%\twain_32 .scr
  • <SYSTEM32> .scr
  • <Auxiliary element>
  • %WINDIR%\Web .scr
  • %TEMP%\%USERNAME%_USER-4BB09A9C02.txt
  • %TEMP%\rr3h6
  • %WINDIR%\WinSxS .scr
  • %WINDIR%\<Auxiliary name> .scr
  • %WINDIR%\system .scr
  • %WINDIR%\pss .scr
  • %WINDIR%\Registration .scr
  • %WINDIR%\Prefetch .scr
  • %WINDIR%\Provisioning .scr
  • %WINDIR%\repair .scr
  • %WINDIR%\SoftwareDistribution .scr
  • %WINDIR%\srchasst .scr
  • %WINDIR%\Resources .scr
  • %WINDIR%\security .scr
  • %PROGRAM_FILES%\Movie Maker .scr
  • %PROGRAM_FILES%\MSBuild .scr
  • %PROGRAM_FILES%\microsoft frontpage .scr
  • %PROGRAM_FILES%\Microsoft.NET .scr
  • %PROGRAM_FILES%\MSN .scr
  • %PROGRAM_FILES%\NetMeeting .scr
  • %PROGRAM_FILES%\Online Services .scr
  • %PROGRAM_FILES%\MSN Gaming Zone .scr
  • %PROGRAM_FILES%\MSXML 6.0 .scr
  • %PROGRAM_FILES%\Messenger .scr
  • %ALLUSERSPROFILE%\Start Menu\Programs\Accessories .scr
  • %ALLUSERSPROFILE%\Start Menu\Programs\Administrative Tools .scr
  • %TEMP%\7~EV^7.eXe
  • %HOMEPATH%\Start Menu\Programs .scr
  • %ALLUSERSPROFILE%\Start Menu\Programs\Games .scr
  • %PROGRAM_FILES%\FireFox .scr
  • %PROGRAM_FILES%\Internet Explorer .scr
  • %CommonProgramFiles% .scr
  • %PROGRAM_FILES%\ComPlus Applications .scr
  • %WINDIR%\$NtUninstallWIC$ .scr
  • %WINDIR%\addins .scr
  • %HOMEPATH%\My Documents\My Pictures .scr
  • %WINDIR%\$MSI31Uninstall_KB893803v2$ .scr
  • %WINDIR%\AppPatch .scr
  • %WINDIR%\Connection Wizard .scr
  • %WINDIR%\Cursors .scr
  • %WINDIR%\assembly .scr
  • %WINDIR%\Config .scr
  • %HOMEPATH%\My Documents\My Music .scr
  • %PROGRAM_FILES%\Uninstall Information .scr
  • %PROGRAM_FILES%\Windows Media Player .scr
  • %PROGRAM_FILES%\Outlook Express .scr
  • %PROGRAM_FILES%\Reference Assemblies .scr
  • %PROGRAM_FILES%\Windows NT .scr
  • %PROGRAM_FILES%\<Auxiliary name> .scr
  • %HOMEPATH%\My Documents\Downloads .scr
  • %PROGRAM_FILES%\WindowsUpdate .scr
  • %PROGRAM_FILES%\xerox .scr
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\win7~.exe
  • <Drive name for removable media>:\autorun.inf
Network activity:
Connects to:
  • 'ft#.##free.com.br':21
  • 'localhost':1039
UDP:
  • DNS ASK ft#.##free.com.br
Miscellaneous:
Searches for the following windows:
  • ClassName: 'NDDEAgnt' WindowName: 'NetDDE Agent'
  • ClassName: 'MS_WINHELP' WindowName: ''