La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLW.Autoruner1.16725

Aggiunto al database dei virus Dr.Web: 2012-06-01

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Classes\BWChart\shell\open\command] '' = '<Full path to virus> "%1"'
Creates the following files on removable media:
  • <Drive name for removable media>:\gtnowb.pif
  • <Drive name for removable media>:\autorun.inf
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\winlogon.exe' = '<SYSTEM32>\winlogon.exe:*:enabled:@shell32.dll,-1'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:ipsec'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
blocks the following features:
  • User Account Control (UAC)
  • Windows Security Center
Injects code into
the following system processes:
  • <SYSTEM32>\cscript.exe
a large number of user processes.
Modifies file system :
Creates the following files:
  • %TEMP%\Temporary Internet Files\Content.IE5\ONY02NHC\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\WY4YU7F8\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\WPUJ6V8P\desktop.ini
  • C:\autorun.inf
  • C:\esqt.pif
  • %TEMP%\Temporary Internet Files\Content.IE5\82912DNS\desktop.ini
  • %TEMP%\History\History.IE5\desktop.ini
  • %HOMEPATH%\My Documents\bwchart\favorites.txt
  • %HOMEPATH%\My Documents\bwchart\comments.txt
  • %TEMP%\windnxxxn.exe
  • %HOMEPATH%\My Documents\bwchart\replays.txt
  • %HOMEPATH%\My Documents\bwchart\buildorders.txt
  • %HOMEPATH%\My Documents\bwchart\akas.txt
  • %HOMEPATH%\My Documents\bwchart\mapakas.txt
Sets the 'hidden' attribute to the following files:
  • C:\autorun.inf
  • %TEMP%\History\History.IE5\desktop.ini
  • C:\esqt.pif
  • <Drive name for removable media>:\gtnowb.pif
  • <Drive name for removable media>:\autorun.inf
  • %TEMP%\Temporary Internet Files\Content.IE5\WPUJ6V8P\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\ONY02NHC\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\82912DNS\desktop.ini
  • %TEMP%\Temporary Internet Files\Content.IE5\WY4YU7F8\desktop.ini
Deletes the following files:
  • %TEMP%\windnxxxn.exe
Network activity:
Connects to:
  • 'bw#####.teamliquid.net':80
  • 'ru.#rans.pl':65520
TCP:
HTTP GET requests:
  • bw#####.teamliquid.net/download.js
UDP:
  • DNS ASK bw#####.teamliquid.net
  • DNS ASK ru.#rans.pl
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''