Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner1.60833

Added to the Dr.Web virus database: 2013-11-09

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'System' = '%TEMP%\SystemFiles\Systems.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows' = '%TEMP%\Windows.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Driver' = '%TEMP%\Driver.exe'
Malicious functions:
Creates and executes the following:
  • '%TEMP%\SystemFiles\Systems.exe'
Executes the following:
  • '<SYSTEM32>\taskkill.exe' /f /im Windows.exe /t
  • '<SYSTEM32>\taskkill.exe' /f /im Driver.exe /t
Modifies file system :
Creates the following files:
  • %TEMP%\SystemFiles\delete
  • %TEMP%\SystemFiles\finale
  • %TEMP%\SystemFiles\win.jpg
  • %TEMP%\SystemFiles\dat
  • %TEMP%\SystemFiles\Systems.exe
  • %TEMP%\Driver.exe
  • %TEMP%\Windows.exe
Sets the 'hidden' attribute to the following files:
  • %TEMP%\SystemFiles\delete
  • %TEMP%\SystemFiles\finale
  • %TEMP%\SystemFiles\win.jpg
  • %TEMP%\SystemFiles\dat
  • %TEMP%\SystemFiles\Systems.exe
  • %TEMP%\Windows.exe
  • %TEMP%\Driver.exe
Deletes the following files:
  • %TEMP%\SystemFiles\win.jpg
Network activity:
Connects to:
  • 'localhost':1037
  • 'localhost':1035
UDP:
  • DNS ASK sm##.#ail.yahoo.fr
  • DNS ASK ch####p.dyndns.org
  • DNS ASK co####ion.juplo.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'
  • ClassName: '(null)' WindowName: '(null)'
  • ClassName: 'Indicator' WindowName: '(null)'