Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Win32.HLLW.Autohit.12340

Added to the Dr.Web virus database: 2010-07-15

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfwiz.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfuser.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Njeeves.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nbrowser.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfsvc32.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npflgutl.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nuaa.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfrules.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfports.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvcsched.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EHttpSrv.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcoa.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvoy.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtpsvc.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SSCVIHOST.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe] 'Debugger' = 'rundll32.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blastclnn.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blastclnnn.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe] 'Debugger' = 'rundll32.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'jre͸' = '%APPDATA%\Java\ߙJviewʚ.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'CRNJEUFỦ' = '%APPDATA%\Java\ϝshimgvwʅ.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe] 'Debugger' = 'rundll32.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe] 'Debugger' = 'rundll32.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\New Folder.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npc_login.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprosec.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npcsvc32.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npc_tray.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorunme.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scsaver.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg32.exe] 'Debugger' = 'cmd.exe /c del /f /q '
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ise32.exe] 'Debugger' = 'cmd.exe /c del /f /q '
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\RИCYCLER\thumbs.db
  • <Drive name for removable media>:\RИCYCLER\Desktop.ini
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks the following features:
  • System Restore (SR)
  • User Account Control (UAC)
Creates and executes the following:
  • '%APPDATA%\Java\ߙJviewʚ.exe'
  • '%APPDATA%\Java\ϝshimgvwʅ.exe'
Executes the following:
  • '<SYSTEM32>\reg.exe' DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
  • '<SYSTEM32>\net1.exe' Share "=e:" /UNLIMITED
  • '<SYSTEM32>\rundll32.exe' shimgvw.dll, ImageView_Fullscreen
Modifies file system :
Creates the following files:
  • %TEMP%\njbztkz
  • %TEMP%\aut2.tmp
  • <LS_APPDATA>\Microsoft\CD Burning\RИCYCLER\Desktop.ini
  • <LS_APPDATA>\Microsoft\CD Burning\autorun.inf
  • <LS_APPDATA>\Microsoft\CD Burning\RИCYCLER\thumbs.db
  • %TEMP%\odbqpba
  • %TEMP%\aut1.tmp
  • %APPDATA%\Java\Desktop.ini
  • %APPDATA%\Java\ߙJviewʚ.exe
  • %APPDATA%\Java\ϝshimgvwʅ.exe
Sets the 'hidden' attribute to the following files:
  • <LS_APPDATA>\Microsoft\CD Burning\RИCYCLER\Desktop.ini
  • <Drive name for removable media>:\autorun.inf
  • <LS_APPDATA>\Microsoft\CD Burning\autorun.inf
  • <LS_APPDATA>\Microsoft\CD Burning\RИCYCLER\thumbs.db
  • <Drive name for removable media>:\RИCYCLER\thumbs.db
  • %APPDATA%\Java\ϝshimgvwʅ.exe
  • %APPDATA%\Java\Desktop.ini
  • <Drive name for removable media>:\RИCYCLER\Desktop.ini
  • %APPDATA%\Java\ߙJviewʚ.exe
Deletes the following files:
  • %TEMP%\aut2.tmp
  • %TEMP%\njbztkz
  • %TEMP%\aut1.tmp
  • %TEMP%\odbqpba
Network activity:
UDP:
  • DNS ASK www.google.com
Miscellaneous:
Searches for the following windows:
  • ClassName: '(null)' WindowName: 'GINA Logon'
  • ClassName: 'Indicator' WindowName: '(null)'
  • ClassName: 'ShImgVw:CPreviewWnd' WindowName: '(null)'
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'