マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.53084

Added to the Dr.Web virus database: 2013-08-07

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, <SYSTEM32>\SysConfig.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe <SYSTEM32>\SysConfig.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = '<SYSTEM32>\SysConfig.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SystemConfiguration' = '<SYSTEM32>\SysConfig.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winlogon' = '<SYSTEM32>\SysConfig.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\readme.txt
  • <Drive name for removable media>:\Autorun.inf
  • <Drive name for removable media>:\SysConfig.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
Creates and executes the following:
  • '<SYSTEM32>\SysConfig.exe'
Executes the following:
  • '%WINDIR%\explorer.exe' <SYSTEM32>
Terminates or attempts to terminate
the following system processes:
  • <SYSTEM32>\ctfmon.exe
the following user processes:
  • NAVAPW32.EXE
  • AVPCC.EXE
  • zapro.exe
  • AVP.EXE
  • ZONEALARM.EXE
  • AVGCC32.EXE
  • AVGCTRL.EXE
  • avgcc.exe
  • AVPM.EXE
  • AVSYNMGR.EXE
Searches for windows to
detect programs and games:
  • ClassName: '(null)' WindowName: 'Yahoo! Messenger'
Modifies settings of Windows Explorer:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
  • C:\SysConfig.exe
  • C:\Autorun.inf
  • C:\readme.txt
  • <SYSTEM32>\readme.txt
  • <SYSTEM32>\SysConfig.exe
Sets the 'hidden' attribute to the following files:
  • C:\Autorun.inf
  • <Drive name for removable media>:\SysConfig.exe
  • <Drive name for removable media>:\Autorun.inf
  • <SYSTEM32>\readme.txt
  • <SYSTEM32>\SysConfig.exe
  • C:\SysConfig.exe
Deletes the following files:
  • %TEMP%\~DF5ED6.tmp
  • %TEMP%\~DFE564.tmp
  • %TEMP%\~DFA9EE.tmp
  • %TEMP%\~DF5202.tmp
  • %TEMP%\~DF436D.tmp
  • %TEMP%\~DF899E.tmp
  • %TEMP%\~DF2B88.tmp
  • %TEMP%\~DFC5BD.tmp
  • %TEMP%\~DF6C86.tmp
  • %TEMP%\~DF22D5.tmp
  • %TEMP%\~DFFF5E.tmp
  • %TEMP%\~DF738D.tmp
Miscellaneous:
Searches for the following windows:
  • ClassName: '(null)' WindowName: 'Run'
  • ClassName: '(null)' WindowName: 'Kaspersky Anti-Virus 7.0'
  • ClassName: '(null)' WindowName: 'Command Prompt'
  • ClassName: '' WindowName: '(null)'
  • ClassName: '(null)' WindowName: 'Autorun.inf - Notepad'
  • ClassName: '(null)' WindowName: 'Google - Microsoft Internet Explorer'
  • ClassName: '(null)' WindowName: 'Windows Media Player'
  • ClassName: '(null)' WindowName: 'Friendster - Home - Microsoft Internet Explorer'
  • ClassName: '(null)' WindowName: 'templates.htt - Notepad'
  • ClassName: '(null)' WindowName: 'Yahoo! - Microsoft Internet Explorer'