Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Autoruner1.59289

Added to the Dr.Web virus database: 2013-10-28

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\WindowsDown] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
  • '<SYSTEM32>\9.exe'
  • '<SYSTEM32>\4.exe'
  • '<SYSTEM32>\7.exe'
  • '<SYSTEM32>\8.exe'
  • '<SYSTEM32>\6.exe'
  • '<SYSTEM32>\5.exe'
  • '<SYSTEM32>\servet.exe'
  • '<SYSTEM32>\1.exe'
  • '<SYSTEM32>\2.exe'
  • '<SYSTEM32>\3.exe'
  • '<SYSTEM32>\10.exe'
  • '<SYSTEM32>\9.exe' (downloaded from the Internet)
  • '<SYSTEM32>\10.exe' (downloaded from the Internet)
  • '<SYSTEM32>\8.exe' (downloaded from the Internet)
  • '<SYSTEM32>\7.exe' (downloaded from the Internet)
  • '<SYSTEM32>\3.exe' (downloaded from the Internet)
  • '<SYSTEM32>\2.exe' (downloaded from the Internet)
  • '<SYSTEM32>\1.exe' (downloaded from the Internet)
  • '<SYSTEM32>\6.exe' (downloaded from the Internet)
  • '<SYSTEM32>\5.exe' (downloaded from the Internet)
  • '<SYSTEM32>\4.exe' (downloaded from the Internet)
Executes the following:
  • '<SYSTEM32>\cmd.exe' /c <SYSTEM32>\Deleteme.bat
Modifies file system :
Creates the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\7[1].exe
  • <SYSTEM32>\7.exe
  • <SYSTEM32>\6.exe
  • <SYSTEM32>\5.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\6[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\8[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\10[1].exe
  • <SYSTEM32>\10.exe
  • <SYSTEM32>\9.exe
  • <SYSTEM32>\8.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\9[1].exe
  • <SYSTEM32>\1.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\2[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1[1].exe
  • <SYSTEM32>\servet.exe
  • <SYSTEM32>\Deleteme.bat
  • <SYSTEM32>\2.exe
  • <SYSTEM32>\4.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\4[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\3[1].exe
  • <SYSTEM32>\3.exe
Sets the 'hidden' attribute to the following files:
  • <SYSTEM32>\servet.exe
Deletes itself.
Network activity:
Connects to:
  • 'www.zy##.net.cn':80
  • 'localhost':1036
TCP:
HTTP GET requests:
  • www.zy##.net.cn/abc/7.exe
  • www.zy##.net.cn/abc/6.exe
  • www.zy##.net.cn/abc/8.exe
  • www.zy##.net.cn/abc/10.exe
  • www.zy##.net.cn/abc/9.exe
  • www.zy##.net.cn/abc/2.exe
  • www.zy##.net.cn/abc/1.exe
  • www.zy##.net.cn/abc/3.exe
  • www.zy##.net.cn/abc/5.exe
  • www.zy##.net.cn/abc/4.exe
UDP:
  • DNS ASK www.zy##.net.cn
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'