Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Joke/Renos.W
Date discovered:13/12/2012
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:28.160 Bytes
MD5 checksum:fa7582def8348c22b69a4bb360eff64b
VDF version:7.11.53.216

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: Downloader-AFH
   •  Kaspersky: not-virus:Hoax.Win32.Renos.s


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a file
   • Drops a file
   • Registry modification


Right after execution the following information is displayed:


 Files It copies itself to the following location:
   • c:\winstall.exe



The following files are created:

– Non malicious files:
   • C:\Program Files\SpySheriff\base.avd; C:\Program
      Files\SpySheriff\base001.avd; C:\Program Files\SpySheriff\base002.avd;
      C:\Program Files\SpySheriff\found.wav; C:\Program
      Files\SpySheriff\heur000.dll; C:\Program Files\SpySheriff\heur001.dll;
      C:\Program Files\SpySheriff\heur002.dll; C:\Program
      Files\SpySheriff\heur003.dll; C:\Program Files\SpySheriff\IESecurity.dll;
      C:\Program Files\SpySheriff\notfound.wav; C:\Program
      Files\SpySheriff\ProcMon.dll; C:\Program Files\SpySheriff\removed.wav;
      C:\Program Files\SpySheriff\SpySheriff.exe; C:\Program
      Files\SpySheriff\Uninstall.exe; C:\Program Files\SpySheriff\SpySheriff.dvm

– It creates the following archive containing a copy of the malware:
   • %PROGRAM FILES%\asdfasdfasdfasdfasdfasdfasdfasdf

%WINDIR%\desktop.html



It tries to download a file:

– The location is the following:
   • www.spy**********.com/trial.php?rest=0&ver=14087464&a=00000088
It is saved on the local hard drive under: %HOME%\Application Data\Install.dat Furthermore this file gets executed after it was fully downloaded.

 Registry The following registry key is added in order to run the process after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows installer"="c:\winstall.exe"



The values of the following registry keys are removed:

–  [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • pro

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
   • NoDesktop



The following registry keys including all values and subkeys are removed:
   • [HKCU\SOFTWARE\Install]
   • [HKCU\Software\Microsoft\Internet Explorer\Desktop\Components]
   • [HKCU\Software\Microsoft\Internet Explorer\Desktop\Components\0]



The following registry keys are added:

– [HKCU\Software\Microsoft\Internet Explorer\Desktop\Components]
   • "DeskHtmlVersion"=dword:00000110
   • "DeskHtmlMinorVersion"=dword:00000005
   • "Settings"=dword:00000001
   • "GeneralFlags"=dword:00000000

– [HKCU\Software\Microsoft\Internet Explorer\Desktop\Components\0]
   • "Source"="About:Home"
   • "SubscribedURL"="About:Home"
   • "FriendlyName"="My Current Home Page"
   • "Flags"=dword:00000002
   • "Position"=hex:%hex values%
   • "CurrentState"=dword:40000004
   • "OriginalStateInfo"=hex:%hex values%
   • "RestoredStateInfo"=hex::%hex values%



The following registry keys are changed:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
   Old value:
   • "Wallpaper"="%user defined settings%"
   New value:
   • "Wallpaper"="%WINDIR%\desktop.html"

– [HKCU\Control Panel\Desktop]
   Old value:
   • "Pattern"="%user defined settings%"
   New value:
   • "Pattern"=""

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
   Old value:
   • "NoDriveTypeAutoRun"=dword:%user defined settings%
     "NoActiveDesktop"=dword:%user defined settings%
     "ClassicShell"=dword:%user defined settings%
     "ForceActiveDesktopOn"=dword:%user defined settings%
   New value:
   • "NoDriveTypeAutoRun"=dword:00000091
     "NoActiveDesktop"=dword:00000000
     "ClassicShell"=dword:00000000
     "ForceActiveDesktopOn"=dword:00000001

– [HKCU\Software\Microsoft\Internet Explorer\Desktop\General]
   Old value:
   • "WallpaperFileTime"=hex:%user defined settings%
     "WallpaperLocalFileTime"=hex:%user defined settings%
     "TileWallpaper"="%user defined settings%"
     "WallpaperStyle"="%user defined settings%"
     "ComponentsPositioned"=dword:%user defined settings%
   New value:
   • "WallpaperFileTime"=hex:be,a1,a0,ff,22,de,c5,01
     "WallpaperLocalFileTime"=hex:be,71,29,c3,33,de,c5,01
     "TileWallpaper"="0"
     "WallpaperStyle"="2"
     "ComponentsPositioned"=dword:00000002

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
   ActiveDesktop]
   Old value:
   • "NoChangingWallpaper"=dword:%user defined settings%
     "NoComponents"=dword:%user defined settings%
     "NoAddingComponents"=dword:%user defined settings%
     "NoDeletingComponents"=dword:%user defined settings%
     "NoEditingComponents"=dword:%user defined settings%
     "NoHTMLWallPaper"=dword:%user defined settings%
   New value:
   • "NoChangingWallpaper"=dword:00000000
     "NoComponents"=dword:00000000
     "NoAddingComponents"=dword:00000000
     "NoDeletingComponents"=dword:00000000
     "NoEditingComponents"=dword:00000000
     "NoHTMLWallPaper"=dword:00000000

 File details Programming language:
The malware program was written in MS Visual C++.

Description inserted by Iulia Diaconescu on Tuesday, November 1, 2005
Description updated by Iulia Diaconescu on Monday, December 12, 2005

Back . . . .