Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Autorun.bfxw
Date discovered:20/04/2010
Type:Worm
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:128.000 Bytes
MD5 checksum:193A3BD3F8C6168D5BDF2BFA56B8823C
VDF version:7.10.02.173
IVDF version:7.10.06.141 - Tuesday, April 20, 2010

 General Method of propagation:
    Autorun feature


Aliases:
   •  Symantec: W32.Gammima.AG
   •  Kaspersky: Worm.Win32.AutoRun.bfxw
   •  Eset: Win32/PSW.OnLineGames.OUM
   •  Bitdefender: Trojan.Onlinegames.904


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops a malicious file

 Files It copies itself to the following locations:
   • %TEMPDIR%\nodqq.exe
   • %drive%\r3fhr.exe



The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%TEMPDIR%\nodqq%number%.dll Further investigation pointed out that this file is malware, too. Detected as: TR/PSW.Magania.dcmh

%SYSDIR%\drivers\cdaudio.sys

 Registry The following registry key is added in order to run the process after reboot:

[HKCU\SoftWare\Microsoft\Windows\CurrentVersion\Run\nod32
   • nod32="%TEMPDIR%\nodqq.exe"



The following registry keys are added in order to load the service after reboot:

[HKLM\SYSTEM\CurrentControlSet\Services\AVPsys]
   • "Type"=dword:00000001
   • "Start"=dword:00000003
   • "ErrorControl"=dword:00000001
   • "ImagePath"=\??\%SYSDIR%\drivers\cdaudio.sys
   • "DisplayName"="AVPsys"

[HKLM\SYSTEM\CurrentControlSet\Services\AVPsys\Security]
   • "Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
   • 00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
   • 00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,\
   • 05,12,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
   • 20,02,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
   • 00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,02,00,00,01,01,\
   • 00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

[HKLM\SYSTEM\CurrentControlSet\Services\AVPsys\Enum]
   • "Count"=dword:00000000
   • "NextInstance"=dword:00000000
   • "INITSTARTFAILED"=dword:00000001

 Injection – It injects itself into a process.

    Process name:
   • explorer.exe


 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Andrei Ivanes on Thursday, June 3, 2010
Description updated by Andrei Ivanes on Thursday, June 3, 2010

Back . . . .