FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner1.26077

Added to the Dr.Web virus database: 2012-09-18

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'msngms' = '<SYSTEM32>\ijava.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'msngms' = '<SYSTEM32>\bit.pif'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
Executes the following:
  • <SYSTEM32>\attrib.exe +R +S +H Y:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H Z:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H W:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H X:\autorun.inf
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFolderOptions /t REG_DWORD /d "1" /f
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\Currentversion\Policies\System" /v DisableTaskMgr /t reg_dword /d "1" /f
  • <SYSTEM32>\reg.exe add HKcU\Software\Microsoft\Windows\CurrentVersion\Policies\system /v disabletaskmgr /t REG_DWORD /d 1 /f
  • <SYSTEM32>\reg.exe add HKlm\Software\Microsoft\Windows\CurrentVersion\Policies\system /v disabletaskmgr /t REG_DWORD /d 1 /f
  • <SYSTEM32>\attrib.exe +R +S +H Q:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H R:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H O:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H P:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H U:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H V:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H S:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H T:\autorun.inf
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t reg_dword /d "1" /f
  • <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoSetTaskbar /t reg_dword /d 00000001 /f
  • <SYSTEM32>\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_ DWORD /d 1 /f
  • <SYSTEM32>\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control" /v "WaitToKillServiceTimeout" /d "40000" /F
  • <SYSTEM32>\reg.exe add "HKEY_CURRENT_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoCLose /t reg_dword /d 00000001 /f
  • <SYSTEM32>\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v Hidden /t REG_DWORD /d 0 /f
  • <SYSTEM32>\reg.exe add HKCR\exefile\shell\open\command /v asd /t REG_SZ /d <SYSTEM32>\bit.pif /f
  • <SYSTEM32>\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f
  • <SYSTEM32>\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableMsConfig /t REG_DWORD /d 1 /f
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d "1" /f
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t REG_DWORD /d "0" /f
  • <SYSTEM32>\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d "1" /f
  • <SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d "2" /f
  • <SYSTEM32>\reg.exe add "HKCU\Control Panel\desktop" /v "WaitToKillAppTimeout" /d "40000" /F
  • <SYSTEM32>\reg.exe add "HKCU\Control Panel\desktop" /v "WaitToKillServiceTimeout" /d "40000" /F
  • <SYSTEM32>\reg.exe add "HKCU\Control Panel\desktop" /v "AutoEndTasks" /d "0" /F
  • <SYSTEM32>\reg.exe add "HKCU\Control Panel\desktop" /v "HungAppTimeout" /d "40000" /F
  • <SYSTEM32>\taskkill.exe /F /IM wmplayer.exe /IM wmplayer.exe
  • <SYSTEM32>\taskkill.exe /F /IM WINWORD.EXE /IM WINWORD.EXE
  • <SYSTEM32>\taskkill.exe /F /IM avp.exe /IM avp.exe
  • <SYSTEM32>\taskkill.exe /F /IM POWERPNT.EXE /IM POWERPNT.EXE
  • <SYSTEM32>\taskkill.exe /F /IM firefox.exe /IM firefox.exe
  • <SYSTEM32>\taskkill.exe /F /IM IEXPLORE.exe /IM IEXPLORE.exe
  • <SYSTEM32>\taskkill.exe /F /IM notepad.exe /IM notepad.exe
  • <SYSTEM32>\taskkill.exe /F /IM taskmgr.exe /IM taskmgr.exe
  • <SYSTEM32>\reg.exe add "HKLM\software\microsoft\windows\currentversion\run" /v msngms /d "<SYSTEM32>\ijava.exe" /f
  • <SYSTEM32>\taskkill.exe /F /IM msnmsgr.exe /IM msnmsgr.exe
  • <SYSTEM32>\cmd.exe /c ""%TEMP%\1.tmp\amx.bat" "
  • <SYSTEM32>\reg.exe add "HKLM\software\microsoft\windows\currentversion\run" /v msngms /d "<SYSTEM32>\bit.pif" /f
  • <SYSTEM32>\taskkill.exe /F /IM avastui.exe /IM avastui.exe
  • <SYSTEM32>\taskkill.exe /F /IM avastSvc.exe /IM avastSvc.exe
  • <SYSTEM32>\taskkill.exe /F /IM nod32krm.exe /IM nod32krm.exe
  • <SYSTEM32>\taskkill.exe /F /IM nod32kui.exe /IM nod32kui.exe
  • <SYSTEM32>\attrib.exe -h -s -r autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H I:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H J:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H G:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H H:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H M:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H N:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H K:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H L:\autorun.inf
  • <SYSTEM32>\attrib.exe "E:\amx.exe" +s +r +h
  • <SYSTEM32>\attrib.exe "Z:\amx.exe" +s +r +h
  • <SYSTEM32>\attrib.exe -h -s -r amx.exe
  • <SYSTEM32>\attrib.exe "C:\amx.exe" +s +r +h
  • <SYSTEM32>\attrib.exe +R +S +H E:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H F:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H C:\autorun.inf
  • <SYSTEM32>\attrib.exe +R +S +H <Drive name for removable media>:\autorun.inf
Terminates or attempts to terminate
the following user processes:
  • firefox.exe
  • iexplore.exe
  • msnmsgr.exe
  • AVP.EXE
Modifies settings of Windows Explorer:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoSetTaskbar' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
  • <Current directory>\autorun.inf
  • C:\autorun.inf
  • <Current directory>\nvappbar.exe
  • %TEMP%\1.tmp\amx.bat
  • <Current directory>\KeyLogger.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
  • C:\autorun.inf
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: '' WindowName: ''

Dr.Web © Doctor Web
2003 — 2022

Doctor Web is a Russian cybersecurity company focused on threat detection, prevention and response technologies.