Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner1.58885

Added to the Dr.Web virus database: 2013-10-21

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'logogo' = '%WINDIR%\system\logogo.exe'
Malicious functions:
Creates and executes the following:
  • '%WINDIR%\system\logogo.exe' /update
  • '%WINDIR%\system\logogo.exe' /sleepDown
Executes the following:
  • '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://we#.#5623.com/90/tj.htm
Injects code into
the following system processes:
  • <SYSTEM32>\ctfmon.exe
  • <SYSTEM32>\spoolsv.exe
  • %WINDIR%\Explorer.EXE
  • <SYSTEM32>\cscript.exe
  • <SYSTEM32>\cmd.exe
  • <SYSTEM32>\alg.exe
  • <SYSTEM32>\svchost.exe
  • <SYSTEM32>\csrss.exe
  • <SYSTEM32>\smss.exe
  • System
  • <SYSTEM32>\lsass.exe
  • <SYSTEM32>\services.exe
  • <SYSTEM32>\winlogon.exe
a large number of user processes.
Modifies file system :
Creates the following files:
  • %WINDIR%\system\SYSTEM32.tmp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\anc[1].jpg
  • %WINDIR%\system\SYSTEM32.vxd
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\anc[1].jpg
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\tj[1].htm
  • C:\autorun.inf
  • %WINDIR%\system\logogo.exe
  • %WINDIR%\system\inudhya.dll
  • C:\setup.exe
Sets the 'hidden' attribute to the following files:
  • C:\setup.exe
  • C:\autorun.inf
  • %WINDIR%\system\logogo.exe
Deletes the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\anc[1].jpg
  • %WINDIR%\system\SYSTEM32.vxd
  • %WINDIR%\system\SYSTEM32.tmp
  • C:\autorun.inf
Deletes itself.
Network activity:
Connects to:
  • 'we#.#5623.com':80
  • 'localhost':1038
  • 'an#.#onis6.net':80
TCP:
HTTP GET requests:
  • we#.#5623.com/90/tj.htm
  • an#.#onis6.net/anc.jpg
UDP:
  • DNS ASK we#.#5623.com
  • DNS ASK an#.#onis6.net
Miscellaneous:
Searches for the following windows:
  • ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
  • ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
  • ClassName: '' WindowName: '(null)'
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'