Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.Wplugin.2

Added to the Dr.Web virus database: 2011-06-17

Virus description added:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe system3_.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Yahoo Messengger' = '%HOMEPATH%\Desktop\system3_.exe'
Creates or modifies the following files
  • %WINDIR%\tasks\at1.job
  • <SYSTEM32>\tasks\at1
Malicious functions
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
modifies the following system settings:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NofolderOptions' = '00000001'
Executes the following
  • '%WINDIR%\syswow64\at.exe' /delete /yes
  • '%WINDIR%\syswow64\at.exe' 09:00 /interactive /EVERY:m,t,w,th,f,s,su %HOMEPATH%\Desktop\system3_.exe
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system
Creates the following files
  • %APPDATA%\wplugin.dll
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7jdrrz7a\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7dgvchcf\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\39yo4jrc\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\b17absx0\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\index.dat
  • %LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\desktop.ini
  • %APPDATA%\microsoft\windows\cookies\low\index.dat
  • %LOCALAPPDATA%\microsoft\windows\history\low\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\desktop.ini
  • %HOMEPATH%\desktop\autorun.ini
  • %HOMEPATH%\desktop\system3_.exe
  • %WINDIR%\ws2help.dll
  • %WINDIR%\explorer.exe.local
  • %WINDIR%\wplugin.dll
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\index.dat
Sets the 'hidden' attribute to the following files
  • %HOMEPATH%\desktop\system3_.exe
  • %HOMEPATH%\desktop\autorun.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\b17absx0\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\39yo4jrc\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7dgvchcf\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7jdrrz7a\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\history\low\desktop.ini
Network activity
TCP
HTTP GET requests
  • http://h1.##pway.com/asdb000/setting.ini
  • http://h1.##pway.com/asdb002/setting.ini
  • http://h1.##pway.com/asdb004/setting.ini
  • http://h1.##pway.com/asdb006/setting.ini
  • http://h1.##pway.com/asdb008/setting.ini
  • http://h1.##pway.com/asdb010/setting.ini
  • http://h1.##pway.com/asdb012/setting.ini
  • http://h1.##pway.com/asdb014/setting.ini
  • http://h1.##pway.com/asdb016/setting.ini
  • http://h1.##pway.com/asdb018/setting.ini
  • http://h1.##pway.com/asdb020/setting.ini
  • http://h1.##pway.com/asdb022/setting.ini
  • http://h1.##pway.com/asdb024/setting.ini
  • http://h1.##pway.com/asdb026/setting.ini
  • http://h1.##pway.com/asdb028/setting.ini
UDP
  • DNS ASK h1.##pway.com
  • DNS ASK ba####0.0catch.com
  • DNS ASK ba####1.0catch.com
  • DNS ASK ba####2.0catch.com
  • DNS ASK ba####3.0catch.com
  • DNS ASK ba####4.0catch.com
  • DNS ASK ba####5.0catch.com
  • DNS ASK ba####6.0catch.com
  • DNS ASK ba####7.0catch.com
  • DNS ASK ba####8.0catch.com
  • DNS ASK ba####9.0catch.com
Miscellaneous
Creates and executes the following
  • '%WINDIR%\syswow64\cmd.exe' /C AT /delete /yes' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su %HOMEPATH%\Desktop\system3_.exe' (with hidden window)
Executes the following
  • '%WINDIR%\syswow64\cmd.exe' /C AT /delete /yes
  • '%WINDIR%\syswow64\cmd.exe' /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su %HOMEPATH%\Desktop\system3_.exe
  • '%WINDIR%\syswow64\rundll32.exe' "%WINDIR%\syswow64\WININET.dll",DispatchAPICall 1