Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLM.Generic.411

Added to the Dr.Web virus database: 2012-01-04

Virus description added:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [<HKCU>\Control Panel\Desktop\] 'SCRNSAVE.EXE' = '<SYSTEM32>\babon.SCR'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'babon' = '%WINDIR%\babon'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'MSMSGS' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\winlogon.exe'
  • [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\] 'Logonuser' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\csrss.exe'
  • [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\] 'System Monitoring' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\lsass.exe'
  • [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe "<SYSTEM32>\IExplorer.exe"'
  • [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\IExplorer.exe'
  • [<HKLM>\Software\Classes\exefile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\Software\Classes\lnkfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\Software\Classes\piffile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\Software\Classes\batfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
  • [<HKLM>\Software\Classes\comfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
Creates the following files on removable media
  • <Drive name for removable media>:\wangsit.txt
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\cewek_imoet.exe
  • <Drive name for removable media>:\file_rahasia user.exe
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
blocks the following features:
  • System Restore (SR)
modifies the following system settings:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoFolderOptions' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoTrayContextMenu' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoClose' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'StartMenuLogOff' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoFind' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoSetFolders' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoSetTaskbar' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoRun' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoUserNameInStartMenu' = '00000001'
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system
Creates the following files
  • %WINDIR%\babon.exe
  • %HOMEPATH%\local settings\application data\csrss.exe
  • %HOMEPATH%\local settings\application data\smss.exe
  • D:\file_rahasia user.exe
  • D:\cewek_imoet.exe
  • D:\autorun.inf
  • D:\wangsit.txt
  • C:\file_rahasia user.exe
  • C:\cewek_imoet.exe
  • C:\autorun.inf
  • %HOMEPATH%\local settings\application data\winlogon.exe
  • %WINDIR%\msvbvm60.dll
  • %HOMEPATH%\local settings\application data\windows\smss.exe
  • %HOMEPATH%\local settings\application data\windows\lsass.exe
  • %HOMEPATH%\local settings\application data\windows\csrss.exe
  • %HOMEPATH%\local settings\application data\windows\winlogon.exe
  • C:\users\all users\start menu\programs\startup\empty.pif
  • %WINDIR%\syswow64\iexplorer.exe
  • %WINDIR%\syswow64\babon.scr
  • %WINDIR%\syswow64\shell.exe
  • C:\babon.exe
  • C:\wangsit.txt
  • %HOMEPATH%\local settings\application data\lsass.exe
Sets the 'hidden' attribute to the following files
  • %HOMEPATH%\local settings\application data\windows\winlogon.exe
  • %HOMEPATH%\local settings\application data\windows\lsass.exe
  • %HOMEPATH%\local settings\application data\windows\csrss.exe
  • %HOMEPATH%\local settings\application data\windows\smss.exe
  • %WINDIR%\babon.exe
  • %WINDIR%\msvbvm60.dll
  • C:\autorun.inf
  • D:\autorun.inf
  • <Drive name for removable media>:\autorun.inf
  • C:\babon.exe
Deletes the following files
  • %HOMEPATH%\local settings\application data\csrss.exe
Substitutes the following files
  • %HOMEPATH%\local settings\application data\csrss.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'RegEdit_RegEdit' WindowName: ''
  • ClassName: '' WindowName: 'Registry Editor'
  • ClassName: '' WindowName: 'Folder Options'
  • ClassName: '' WindowName: 'Local Settings'
  • ClassName: 'ExploreWClass' WindowName: ''
  • ClassName: 'CabinetWClass' WindowName: ''
  • ClassName: 'RebarWindow32' WindowName: ''
  • ClassName: 'ComboBoxEx32' WindowName: ''
  • ClassName: 'ComboBox' WindowName: ''
  • ClassName: 'Edit' WindowName: ''
  • ClassName: '#32770' WindowName: ''
Creates and executes the following
  • '%WINDIR%\babon.exe'
  • '%WINDIR%\syswow64\iexplorer.exe'
  • '%HOMEPATH%\local settings\application data\windows\winlogon.exe'
  • '%HOMEPATH%\local settings\application data\windows\csrss.exe'
  • '%HOMEPATH%\local settings\application data\windows\lsass.exe'
  • '%WINDIR%\babon.exe' ' (with hidden window)
  • '%WINDIR%\syswow64\iexplorer.exe' ' (with hidden window)
  • '%HOMEPATH%\local settings\application data\windows\winlogon.exe' ' (with hidden window)
  • '%HOMEPATH%\local settings\application data\windows\csrss.exe' ' (with hidden window)
  • '%HOMEPATH%\local settings\application data\windows\lsass.exe' ' (with hidden window)