マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.24949

Added to the Dr.Web virus database: 2012-08-16

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Classes\.cmd] '' = 'Pr00-X '
  • [<HKLM>\SOFTWARE\Classes\.exe] '' = 'Pr00-X '
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Vista Activation Pacth' = '<SYSTEM32>\Vista Activation Pacth.exe'
  • [<HKLM>\SOFTWARE\Classes\.com] '' = 'Pr00-X'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
Malicious functions:
Executes the following:
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.wave"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.exe"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.ini"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.png"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.gif"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.bmp"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.pdf"
  • <SYSTEM32>\rundll32.exe <SYSTEM32>\shell32.dll,OpenAs_RunDLL <SYSTEM32>\H
  • <SYSTEM32>\msg.exe * H A C K E D
  • <SYSTEM32>\ping.exe 127.0.0.1 -n 30
  • <SYSTEM32>\ping.exe 127.0.0.1 -n 4
  • <SYSTEM32>\reg.exe delete "HKLM\SYSTEM\currentcontrolset\control\safeboot\minimal" /f
  • <SYSTEM32>\reg.exe delete "HKLM\SYSTEM\CurrentControlSet\control\safeboot\network" /f
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.jpg"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.log"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.wmv"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.txt"
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Vista Activation Pacth" /t REG_SZ /d "<SYSTEM32>\Vista Activation Pacth.exe" /f
  • <SYSTEM32>\reg.exe add "HKLM\System\CurrentControlSet\Services\Mouclass" /v Start /t REG_DWORD /d "4" /f
  • <SYSTEM32>\reg.exe add "HKLM\System\CurrentControlSet\Services\Kbdclass" /v Start /t REG_DWORD /d "4" /f
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.dll"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.cmd"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.wav"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.mp3"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.sys"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.reg"
  • <SYSTEM32>\attrib.exe -s -r -h "<SYSTEM32>\*.com"
Modifies file system :
Creates the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\microsoft[1]
  • <SYSTEM32>\H
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\microsoft[1]
  • C:\autorun.inf
  • %TEMP%\~1.bat
  • <SYSTEM32>\Vista Activation Pacth.exe
  • <SYSTEM32>\<Virus name>.exe
Sets the 'hidden' attribute to the following files:
  • %TEMP%\~1.bat
Deletes the following files:
  • <SYSTEM32>\hal.dll
Network activity:
Connects to:
  • 'localhost':1039
  • '20#.#6.232.182':80
  • 'localhost':1036
TCP:
HTTP GET requests:
  • 20#.#6.232.182/
UDP:
  • DNS ASK www.microsoft.com
  • DNS ASK microsoft.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'IEFrame' WindowName: ''
  • ClassName: 'MS_AutodialMonitor' WindowName: ''
  • ClassName: 'MS_WebcheckMonitor' WindowName: ''
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: '' WindowName: ''
  • ClassName: 'Shell_TrayWnd' WindowName: ''