Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner.53447

Added to the Dr.Web virus database: 2011-07-06

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\system.exe run'
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\system32.exe
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\SriLanka.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
Creates and executes the following:
  • %WINDIR%\Explore.exe run
  • %PROGRAM_FILES%\WindowsNT.exe run
  • <SYSTEM32>\system.exe run
  • %HOMEPATH%\Start Menu\Programs\Startup\system32.exe run
Terminates or attempts to terminate
the following user processes:
  • AVP.EXE
Modifies settings of Windows Explorer:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000000'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000000'
Forces autoplay for removable media.
Modifies file system :
Creates the following files:
  • %TEMP%\aut13.tmp
  • %TEMP%\aut12.tmp
  • %TEMP%\aut15.tmp
  • %TEMP%\aut14.tmp
  • %TEMP%\autF.tmp
  • %TEMP%\autE.tmp
  • %TEMP%\aut11.tmp
  • %TEMP%\aut10.tmp
  • %TEMP%\aut1B.tmp
  • %TEMP%\aut1A.tmp
  • %TEMP%\aut1D.tmp
  • %TEMP%\aut1C.tmp
  • %TEMP%\aut17.tmp
  • %TEMP%\aut16.tmp
  • %TEMP%\aut19.tmp
  • %TEMP%\aut18.tmp
  • %TEMP%\autD.tmp
  • %WINDIR%\autorun.inf
  • %TEMP%\aut2.tmp
  • %TEMP%\aut4.tmp
  • %TEMP%\aut3.tmp
  • <SYSTEM32>\system.exe
  • %TEMP%\aut1.tmp
  • %PROGRAM_FILES%\WindowsNT.exe
  • %WINDIR%\Explore.exe
  • %TEMP%\autA.tmp
  • %TEMP%\aut9.tmp
  • %TEMP%\autC.tmp
  • %TEMP%\autB.tmp
  • %TEMP%\aut6.tmp
  • %TEMP%\aut5.tmp
  • %TEMP%\aut8.tmp
  • %TEMP%\aut7.tmp
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\SriLanka.exe
  • %WINDIR%\autorun.inf
  • <SYSTEM32>\system.exe
  • %HOMEPATH%\Start Menu\Programs\Startup\system32.exe
Deletes the following files:
  • %TEMP%\aut15.tmp
  • %TEMP%\aut14.tmp
  • %TEMP%\aut17.tmp
  • %TEMP%\aut16.tmp
  • %TEMP%\aut11.tmp
  • %TEMP%\aut10.tmp
  • %TEMP%\aut13.tmp
  • %TEMP%\aut12.tmp
  • %TEMP%\aut1B.tmp
  • %TEMP%\aut1A.tmp
  • %TEMP%\aut1D.tmp
  • %TEMP%\aut1C.tmp
  • <Drive name for removable media>:\SriLanka.exe
  • %TEMP%\aut18.tmp
  • %TEMP%\aut19.tmp
  • <Drive name for removable media>:\autorun.inf
  • %TEMP%\aut6.tmp
  • %TEMP%\aut5.tmp
  • %WINDIR%\autorun.inf
  • %TEMP%\aut7.tmp
  • %TEMP%\aut2.tmp
  • %TEMP%\aut1.tmp
  • %TEMP%\aut4.tmp
  • %TEMP%\aut3.tmp
  • %TEMP%\autD.tmp
  • %TEMP%\autC.tmp
  • %TEMP%\autF.tmp
  • %TEMP%\autE.tmp
  • %TEMP%\aut9.tmp
  • %TEMP%\aut8.tmp
  • %TEMP%\autB.tmp
  • %TEMP%\autA.tmp
Network activity:
Connects to:
  • '11#.#11.111.1':25
UDP:
  • DNS ASK sm##.gmail.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''