Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner1.36609

Added to the Dr.Web virus database: 2013-05-08

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Classes\lnkfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\SOFTWARE\Classes\exefile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\IExplorer.exe'
  • [<HKLM>\SOFTWARE\Classes\piffile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '<SYSTEM32>\smsx.scr'
  • [<HKLM>\SOFTWARE\Classes\comfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\SOFTWARE\Classes\batfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MSMSGS' = '<LS_APPDATA>\WINDOWS\WINLOGON.EXE'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Tambio' = '%WINDIR%\Tambio.exe'
  • [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '<SYSTEM32>\smsx~1.SCR'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Service%USERNAME%' = '<LS_APPDATA>\WINDOWS\SERVICES.EXE'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe "<SYSTEM32>\IExplorer.exe"'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'System Monitoring' = '<LS_APPDATA>\WINDOWS\LSASS.EXE'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Logon%USERNAME%' = '<LS_APPDATA>\WINDOWS\CSRSS.EXE'
Creates or modifies the following files:
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup\Empty.pif
Creates the following files on removable media:
  • <Drive name for removable media>:\Tambio\FotoX.exe
  • <Drive name for removable media>:\Hallo %USERNAME%.exe
  • <Drive name for removable media>:\Autorun.inf
  • <Drive name for removable media>:\Systs.bat
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Registry Editor (RegEdit)
blocks the following features:
  • System Restore (SR)
Creates and executes the following:
  • '<LS_APPDATA>\WINDOWS\SERVICES.EXE'
  • '<LS_APPDATA>\WINDOWS\LSASS.EXE'
  • '<LS_APPDATA>\WINDOWS\SMSS.EXE'
  • '<LS_APPDATA>\WINDOWS\CSRSS.EXE'
  • '%WINDIR%\Tambio.exe'
  • '<SYSTEM32>\IExplorer.exe'
  • '<LS_APPDATA>\WINDOWS\WINLOGON.EXE'
Modifies settings of Windows Explorer:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoViewContextMenu' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoTrayItemsDisplay' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoDesktop' = '00000001'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoStartMenuMorePrograms' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoStartMenuMorePrograms' = '00000001'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoControlPanel' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoControlPanel' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoCommonGroups' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoToolbarCustomize' = '00000001'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoCommonGroups' = '00000001'
Modifies file system :
Creates the following files:
  • C:\Pesan.txt
  • %WINDIR%\msvbvm60.dll
  • <LS_APPDATA>\WINDOWS\LSASS.EXE
  • <LS_APPDATA>\WINDOWS\SMSS.EXE
  • C:\Tambio\FotoX.exe
  • C:\Hallo %USERNAME%.exe
  • C:\Autorun.inf
  • C:\Systs.bat
  • <LS_APPDATA>\WINDOWS\SERVICES.EXE
  • C:\Tambio.exe
  • <SYSTEM32>\shell.exe
  • %WINDIR%\Tambio.exe
  • <LS_APPDATA>\WINDOWS\WINLOGON.EXE
  • <LS_APPDATA>\WINDOWS\CSRSS.EXE
  • <SYSTEM32>\smsx.scr
  • <SYSTEM32>\IExplorer.exe
Sets the 'hidden' attribute to the following files:
  • C:\Autorun.inf
  • %WINDIR%\msvbvm60.dll
  • C:\Tambio.exe
  • <Drive name for removable media>:\Systs.bat
  • <Drive name for removable media>:\Autorun.inf
  • C:\Systs.bat
  • <LS_APPDATA>\WINDOWS\CSRSS.EXE
  • <LS_APPDATA>\WINDOWS\LSASS.EXE
  • <LS_APPDATA>\WINDOWS\WINLOGON.EXE
  • %WINDIR%\Tambio.exe
  • <LS_APPDATA>\WINDOWS\SMSS.EXE
  • <LS_APPDATA>\WINDOWS\SERVICES.EXE
Deletes the following files:
  • %TEMP%\~DFA553.tmp
  • %TEMP%\~DFDF69.tmp
  • %TEMP%\~DFDE52.tmp
  • %TEMP%\~DFAE8E.tmp
  • %TEMP%\~DF563C.tmp
  • %TEMP%\~DFAA7A.tmp
  • %TEMP%\~DF8C9D.tmp
  • %TEMP%\~DF5282.tmp
  • %TEMP%\~DF531F.tmp
  • %TEMP%\~DF7D22.tmp
  • %TEMP%\~DF2F5C.tmp
  • %TEMP%\~DFADF.tmp
  • %TEMP%\~DF8A1.tmp
  • %TEMP%\~DF2C8A.tmp
  • %TEMP%\~DF28D1.tmp
  • %TEMP%\~DF7A84.tmp
  • %TEMP%\~DFA1FB.tmp
  • %TEMP%\~DFB121.tmp
  • %TEMP%\~DF787E.tmp
  • %TEMP%\~DF19DC.tmp
  • %TEMP%\~DF3041.tmp
  • %TEMP%\~DF4FBD.tmp
  • %TEMP%\~DFD634.tmp
  • %TEMP%\~DF71BB.tmp
  • %TEMP%\~DF7FC6.tmp
  • %TEMP%\~DF255B.tmp
  • %TEMP%\~DFD21F.tmp
  • %TEMP%\~DFE89D.tmp
  • %TEMP%\~DF1CE.tmp
Miscellaneous:
Searches for the following windows:
  • ClassName: '' WindowName: 'The Killer Machine'
  • ClassName: '' WindowName: 'Windows'
  • ClassName: '' WindowName: 'Group Policy'
  • ClassName: '' WindowName: 'SmadAV 3.4'
  • ClassName: '' WindowName: 'Internet Explorer'
  • ClassName: '' WindowName: 'S myaydyyAyV y3y.y6_S myaydyyAyV y3y.y6'
  • ClassName: '' WindowName: 'smadav36'
  • ClassName: '' WindowName: 'Manage'
  • ClassName: '' WindowName: 'Control Panel'
  • ClassName: '' WindowName: 'Local Settings'
  • ClassName: '' WindowName: 'Registry Editor'
  • ClassName: '' WindowName: 'System Restore'
  • ClassName: '' WindowName: 'Run'
  • ClassName: '' WindowName: 'Run as'
  • ClassName: '' WindowName: 'System Tolls'
  • ClassName: '' WindowName: 'Games'
  • ClassName: 'RebarWindow32' WindowName: ''
  • ClassName: 'CabinetWClass' WindowName: ''
  • ClassName: 'ExploreWClass' WindowName: ''
  • ClassName: 'ComboBoxEx32' WindowName: ''
  • ClassName: '#32770' WindowName: ''
  • ClassName: 'Edit' WindowName: ''
  • ClassName: 'ComboBox' WindowName: ''
  • ClassName: '' WindowName: 'System Configuration Utility'
  • ClassName: '' WindowName: 'Safe Mode'
  • ClassName: '' WindowName: 'Printers and Faxes'
  • ClassName: '' WindowName: 'Startup'
  • ClassName: '' WindowName: 'Search Results'
  • ClassName: '' WindowName: 'Computer Management'
  • ClassName: '' WindowName: 'WinPatrol'
  • ClassName: '' WindowName: 'Tools'
  • ClassName: 'ELKAV-1.0.0_ELKAV-1.0.0' WindowName: ''
  • ClassName: 'PCMAV_PCMAV' WindowName: ''
  • ClassName: 'WormKiller_WormKiller' WindowName: ''
  • ClassName: 'IBProcMan_IBProcMan' WindowName: ''
  • ClassName: 'avast_avast' WindowName: ''
  • ClassName: 'patch_patch' WindowName: ''
  • ClassName: 'panda_panda' WindowName: ''
  • ClassName: 'Autoruns_Autoruns' WindowName: ''
  • ClassName: 'RegEdit_RegEdit' WindowName: ''
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: 'The Killer Machine_The Killer Machine' WindowName: ''
  • ClassName: 'S myaydyyAyV y3y.y6_S myaydyyAyV y3y.y6' WindowName: ''
  • ClassName: 'smadav36_smadav36' WindowName: ''
  • ClassName: 'SmadAV 3.4_SmadAV 3.4' WindowName: ''
  • ClassName: 'cillin_cillin' WindowName: ''
  • ClassName: 'warez_warez' WindowName: ''
  • ClassName: 'Project1_Project1' WindowName: ''
  • ClassName: 'Form1_Form1' WindowName: ''
  • ClassName: 'tool_tool' WindowName: ''
  • ClassName: 'WinPatrol_WinPatrol' WindowName: ''
  • ClassName: 'black_black' WindowName: ''
  • ClassName: 'trojan_trojan' WindowName: ''
  • ClassName: 'rootkit_rootkit' WindowName: ''
  • ClassName: 'fuck_fuck' WindowName: ''
  • ClassName: 'center_center' WindowName: ''
  • ClassName: 'sophos_sophos' WindowName: ''
  • ClassName: 'control_control' WindowName: ''
  • ClassName: 'firewall_firewall' WindowName: ''
  • ClassName: 'mal_mal' WindowName: ''
  • ClassName: 'norton_norton' WindowName: ''