Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Autoruner2.8385

Added to the Dr.Web virus database: 2014-02-22

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe] 'Debugger' = 'msvcrt.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ctfmon.exe' = 'ctfmon.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\Autorun.inf
  • <Drive name for removable media>:\tmpdata\tmpdata.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List] '<SYSTEM32>\msvcrt.exe' = '<SYSTEM32>\msvcrt.exe:*:Enabled:DHCP Router'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\msvcrt.exe' = '<SYSTEM32>\msvcrt.exe:*:Enabled:DHCP Router'
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
blocks the following features:
  • System Restore (SR)
  • Windows Security Center
Creates and executes the following:
  • '<SYSTEM32>\msvcrt.exe' /C sc stop TmPfw
  • '<SYSTEM32>\msvcrt.exe' <Full path to virus>
Executes the following:
  • '<SYSTEM32>\sc.exe' config vsmon start= disabled
  • '<SYSTEM32>\sc.exe' stop vsmon
  • '<SYSTEM32>\sc.exe' delete vsmon
  • '<SYSTEM32>\net1.exe' stop vsmon
  • '<SYSTEM32>\sc.exe' config cmdAgent start= disabled
  • '<SYSTEM32>\sc.exe' stop cmdAgent
  • '<SYSTEM32>\sc.exe' delete cmdAgent
  • '<SYSTEM32>\net1.exe' /pid=3848
  • '<SYSTEM32>\net.exe' stop SPF4
  • '<SYSTEM32>\sc.exe' delete SbPF.Launcher
  • '<SYSTEM32>\net1.exe' /C sc stop acssrv
  • '<SYSTEM32>\sc.exe' stop SPF4
  • '<SYSTEM32>\sc.exe' stop SbPF.Launcher
  • '<SYSTEM32>\net.exe' stop SbPF.Launcher
  • '<SYSTEM32>\net1.exe' stop SbPF.Launcher
  • '<SYSTEM32>\sc.exe' config SbPF.Launcher start= disabled
  • '<SYSTEM32>\sc.exe' /C sc stop SmcService
  • '<SYSTEM32>\sc.exe' /C net stop SmcService
  • '<SYSTEM32>\sc.exe' /C sc config SmcService start= disabled
  • '<SYSTEM32>\sc.exe' delete KPF4
  • '<SYSTEM32>\net.exe' stop KPF4
  • '<SYSTEM32>\sc.exe' delete TmPfw
  • '<SYSTEM32>\ipconfig.exe' config KPF4 start= disabled
  • '<SYSTEM32>\sc.exe' stop KPF4
  • '<SYSTEM32>\sc.exe' /pid=2472
  • '<SYSTEM32>\net1.exe' stop SmcService
  • '<SYSTEM32>\sc.exe' /pid=2712
  • '<SYSTEM32>\net.exe' stop cmdAgent
  • '<SYSTEM32>\sc.exe' /C sc delete SmcService
  • '<SYSTEM32>\net1.exe' /pid=3768
  • '<SYSTEM32>\sc.exe' delete SmcService
  • '<SYSTEM32>\sc.exe' stop SmcService
  • '<SYSTEM32>\net1.exe' stop "Sophos AutoUpdate Service"
  • '<SYSTEM32>\sc.exe' delete "Sophos AutoUpdate Service"
  • '<SYSTEM32>\sc.exe' stop "Sophos Client Firewall"
  • '<SYSTEM32>\net.exe' stop "Sophos Client Firewall"
  • '<SYSTEM32>\sc.exe' stop "Sophos AutoUpdate Service"
  • '<SYSTEM32>\net1.exe' stop SAVAdminService
  • '<SYSTEM32>\sc.exe' config "Sophos AutoUpdate Service" start= disabled
  • '<SYSTEM32>\net.exe' stop "Sophos AutoUpdate Service"
  • '<SYSTEM32>\sc.exe' config "Sophos Client Firewall Manager" start= disabled
  • '<SYSTEM32>\sc.exe' stop "Sophos Client Firewall Manager"
  • '<SYSTEM32>\net1.exe' stop "Sophos Client Firewall Manager"
  • '<SYSTEM32>\sc.exe' delete "Sophos Client Firewall Manager"
  • '<SYSTEM32>\net1.exe' stop "Sophos Client Firewall"
  • '<SYSTEM32>\sc.exe' config "Sophos Client Firewall" start= disabled
  • '<SYSTEM32>\net.exe' stop "Sophos Client Firewall Manager"
  • '<SYSTEM32>\sc.exe' delete "Sophos Client Firewall"
  • '<SYSTEM32>\net1.exe' /C net stop SAVService
  • '<SYSTEM32>\sc.exe' config acssrv start= disabled
  • '<SYSTEM32>\net.exe' stop SAVService
  • '<SYSTEM32>\sc.exe' delete acssrv
  • '<SYSTEM32>\sc.exe' /pid=3092
  • '<SYSTEM32>\sc.exe' delete SPF4
  • '<SYSTEM32>\net1.exe' stop acssrv
  • '<SYSTEM32>\sc.exe' /pid=2952
  • '<SYSTEM32>\sc.exe' stop SAVAdminService
  • '<SYSTEM32>\net.exe' stop SAVAdminService
  • '<SYSTEM32>\sc.exe' delete SAVAdminService
  • '<SYSTEM32>\sc.exe' config SAVAdminService start= disabled
  • '<SYSTEM32>\sc.exe' config SavService start= disabled
  • '<SYSTEM32>\sc.exe' stop SAVService
  • '<SYSTEM32>\sc.exe' delete SAVService
  • '<SYSTEM32>\net1.exe' stop SAVService
  • '<SYSTEM32>\net.exe' stop PASRV
  • '<SYSTEM32>\net1.exe' stop AntiVirService
  • '<SYSTEM32>\sc.exe' config PASRV start= disabled
  • '<SYSTEM32>\sc.exe' stop PASRV
  • '<SYSTEM32>\sc.exe' stop AntiVirService
  • '<SYSTEM32>\net.exe' stop AntiVirService
  • '<SYSTEM32>\sc.exe' delete AntiVirService
  • '<SYSTEM32>\sc.exe' config AntiVirService start= disabled
  • '<SYSTEM32>\sc.exe' delete VSSERV
  • '<SYSTEM32>\sc.exe' config VSSERV start= disabled
  • '<SYSTEM32>\net.exe' stop avg8wd
  • '<SYSTEM32>\net1.exe' stop VSSERV
  • '<SYSTEM32>\sc.exe' delete PASRV
  • '<SYSTEM32>\net1.exe' stop PASRV
  • '<SYSTEM32>\sc.exe' stop VSSERV
  • '<SYSTEM32>\net.exe' stop VSSERV
  • '<SYSTEM32>\sc.exe' delete K7RTScan
  • '<SYSTEM32>\net1.exe' stop K7RTScan
  • '<SYSTEM32>\sc.exe' stop K7TSMngr
  • '<SYSTEM32>\net.exe' stop K7TSMngr
  • '<SYSTEM32>\net.exe' stop K7RTScan
  • '<SYSTEM32>\ipconfig.exe' /flushdns
  • '<SYSTEM32>\sc.exe' config K7RTScan start= disabled
  • '<SYSTEM32>\sc.exe' stop K7RTScan
  • '<SYSTEM32>\sc.exe' config "avast! Antivirus" start= disabled
  • '<SYSTEM32>\sc.exe' stop "avast! Antivirus"
  • '<SYSTEM32>\net1.exe' stop "avast! Antivirus"
  • '<SYSTEM32>\sc.exe' delete "avast! Antivirus"
  • '<SYSTEM32>\sc.exe' delete K7TSMngr
  • '<SYSTEM32>\sc.exe' config K7TSMngr start= disabled
  • '<SYSTEM32>\net.exe' stop "avast! Antivirus"
  • '<SYSTEM32>\net1.exe' stop K7TSMngr
  • '<SYSTEM32>\sc.exe' config McShield start= disabled
  • '<SYSTEM32>\sc.exe' stop McShield
  • '<SYSTEM32>\sc.exe' delete McShield
  • '<SYSTEM32>\net1.exe' stop McShield
  • '<SYSTEM32>\sc.exe' delete ekrn
  • '<SYSTEM32>\sc.exe' config ekrn start= disabled
  • '<SYSTEM32>\net.exe' stop McShield
  • '<SYSTEM32>\net1.exe' stop ekrn
  • '<SYSTEM32>\sc.exe' stop TmPfw
  • '<SYSTEM32>\net.exe' stop TmPfw
  • '<SYSTEM32>\ipconfig.exe' stop TmPfw
  • '<SYSTEM32>\sc.exe' config TmPfw start= disabled
  • '<SYSTEM32>\sc.exe' stop OutpostFirewall
  • '<SYSTEM32>\net.exe' stop OutpostFirewall
  • '<SYSTEM32>\sc.exe' delete OutpostFirewall
  • '<SYSTEM32>\sc.exe' config OutpostFirewall start= disabled
  • '<SYSTEM32>\sc.exe' stop avg9wd
  • '<SYSTEM32>\net.exe' stop avg9wd
  • '<SYSTEM32>\net1.exe' stop avg9wd
  • '<SYSTEM32>\sc.exe' config avg9wd start= disabled
  • '<SYSTEM32>\sc.exe' config avg8wd start= disabled
  • '<SYSTEM32>\sc.exe' stop avg8wd
  • '<SYSTEM32>\net1.exe' stop avg8wd
  • '<SYSTEM32>\sc.exe' delete avg8wd
  • '<SYSTEM32>\sc.exe' delete NOD32krn
  • '<SYSTEM32>\net1.exe' stop NOD32krn
  • '<SYSTEM32>\sc.exe' stop ekrn
  • '<SYSTEM32>\net.exe' stop ekrn
  • '<SYSTEM32>\net.exe' stop NOD32krn
  • '<SYSTEM32>\sc.exe' delete avg9wd
  • '<SYSTEM32>\sc.exe' config NOD32krn start= disabled
  • '<SYSTEM32>\sc.exe' stop NOD32krn
Injects code into
the following system processes:
  • <SYSTEM32>\net1.exe
  • <SYSTEM32>\net.exe
  • <SYSTEM32>\cmd.exe
  • <SYSTEM32>\ipconfig.exe
  • <SYSTEM32>\sc.exe
the following user processes:
  • GUARD.EXE
Terminates or attempts to terminate
the following user processes:
  • ntvdm.exe
  • GUARD.EXE
Searches for windows to
detect programs and games:
  • ClassName: 'gdkWindowToplevel' WindowName: 'The Wireshark Network Analyzer'
Hides the following processes:
  • <SYSTEM32>\msvcrt.exe
Modifies file system :
Creates the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\file[1]
  • <SYSTEM32>\msvcrt.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\rix[1]
Sets the 'hidden' attribute to the following files:
  • <SYSTEM32>\msvcrt.exe
Modifies the HOSTS file.
Deletes itself.
Network activity:
Connects to:
  • 'sr##.##inmeround.info':7302
  • 'sr##.#orpdev.info':6501
  • 'sr##.##nage-your-box.ru':41350
  • 'ri#.###senger-update.su':80
  • 'sr##.###senger-update.ru':9899
  • 'bs#.###senger-update.su':80
TCP:
HTTP GET requests:
  • bs#.###senger-update.su/file
  • ri#.###senger-update.su/rix
UDP:
  • DNS ASK sr##.##inmeround.info
  • DNS ASK sr##.#orpdev.info
  • DNS ASK sr##.##nage-your-box.ru
  • DNS ASK ri#.###senger-update.su
  • DNS ASK sr##.###senger-update.ru
  • DNS ASK bs#.###senger-update.su
Miscellaneous:
Searches for the following windows:
  • ClassName: 'PROCEXPL' WindowName: '(null)'
  • ClassName: 'WindowsForms10.Window.8.app.0.33c0d9d' WindowName: '(null)'
  • ClassName: 'TApplication' WindowName: 'HostsXpert'
  • ClassName: 'ThunderRT6Main' WindowName: 'HijackThis'
  • ClassName: 'TCPViewClass' WindowName: '(null)'
  • ClassName: 'ThunderRT6Main' WindowName: 'Malwarebytes'
  • ClassName: 'TWizardForm' WindowName: 'Setup - Malwarebytes'
  • ClassName: 'TApplication' WindowName: 'OTL'
  • ClassName: 'TApplication' WindowName: 'AVZ Antiviral Toolkit'