Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Autorun.zvj
Date discovered:11/02/2009
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Medium
Static file:Yes
File size:24.660 Bytes
MD5 checksum:a4e34591b7ec8e73b0d8aec161bf9395
IVDF version:7.01.02.09 - Wednesday, February 11, 2009

 General Method of propagation:
   • Autorun feature


Aliases:
   •  Mcafee: W32/Autorun.worm.ex
   •  Panda: W32/Autorun.IST.worm
   •  Eset: Win32/AutoRun.Agent.JA
   •  Bitdefender: Trojan.Agent.AMQQ


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Blocks access to certain websites
   • Blocks access to security websites
   • Downloads malicious files
   • Drops malicious files
   • Registry modification

 Files  It copies itself to the following locations. Those files have random bytes appended so they may differ from the original one:
   • %WINDIR%\ini\ini.exe
   • %drive%\recycle.{%GUID%}\ini.exe



It overwrites a file.
%SYSDIR%\drivers\etc\hosts



It deletes the initially executed copy of itself.



It deletes the following file:
   • %WINDIR%\Help\%all files%



The following files are created:

%WINDIR%\ini\desktop.ini
%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%WINDIR%\ini\wsock32.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.nvc

%all directories%\wsock32.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.nvc

%WINDIR%\ini\shit.vbs Further investigation pointed out that this file is malware, too. Detected as: TR/Script.11167

%WINDIR%\Tasks\°²×°.bat Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.zvj




It tries to download some files:

– The location is the following:
   • http://w.wonthe.cn/**********
At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://w.ssddffgg.cn/d2/**********?mac=dKYBBzvozo&ver=1.3
At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://w.ssddffgg.cn/**********

 Registry The values of the following registry key are removed:

–  [HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings]
   • ActiveDebugging
   • DisplayLogo
   • SilentTerminate
   • UseWINSAFER



The following registry keys including all values and subkeys are removed:
   • [HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\]
   • [HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\]



The following registry key is added:

– [HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\
   {H8I22RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}]
   • "@"="windir"
   • "stubpath"="%WINDIR%\ini\shit.vbs"

 Hosts The host file is modified as explained:

– In this case existing entries are deleted.

– Access to the following domains is effectively blocked:
   • 127.0.0.1 www.360.cn; 127.0.0.1 www.360safe.cn; 127.0.0.1
      www.360safe.com; 127.0.0.1 www.chinakv.com; 127.0.0.1
      www.rising.com.cn; 127.0.0.1 rising.com.cn; 127.0.0.1 dl.jiangmin.com;
      127.0.0.1 jiangmin.com; 127.0.0.1 www.jiangmin.com; 203.208.37.99
      www.duba.net; 127.0.0.1 www.eset.com.cn; 127.0.0.1 www.nod32.com;
      203.208.37.99 shadu.duba.net; 203.208.37.99 union.kingsoft.com;
      127.0.0.1 www.kaspersky.com.cn; 127.0.0.1 kaspersky.com.cn; 127.0.0.1
      virustotal.com; 127.0.0.1 www.kaspersky.com; 127.0.0.1 60.210.176.251;
      127.0.0.1 www.cnnod32.cn; 127.0.0.1 www.lanniao.org; 127.0.0.1
      www.nod32club.com; 127.0.0.1 www.dswlab.com; 127.0.0.1 bbs.sucop.com;
      127.0.0.1 www.virustotal.com; 127.0.0.1 tool.ikaka.com; 127.0.0.0
      360.qihoo.com; 127.0.0.1 qihoo.com; 127.0.0.1 www.qihoo.com; 127.0.0.1
      www.qihoo.cn; 127.0.0.1 124.40.51.17; 127.0.0.1 58.17.236.92


 Process termination List of processes that are terminated:
   • rfwproxy.exe; rfwmain.exe; rfwsrv.exe; Navapsvc.exe; Navapw32.exe;
      EGHOST.EXE; FileDsty.exe; RavTask.exe; RavMonD.exe; UlibCfg.exe;
      CCenter.exe; RavMon.exe; RavLite.exe; Rav.exe; kasmain.exe;
      kissvc.exe; kavstart.exe; kwatch.exe; kav32.exe; 360Safe.exe; avp.exe;
      vptray.exe; mmsk.exe; FWMon.exe; THGUARD.EXE; TrojanHunter.exe;
      TBSCAN.EXE; WEBSCANX.EXE; Iparmor.exe; PFW.exe; AST.exe; ast.exe;
      360tray.exe


 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

설명 삽입자 Petre Galan   2010년 2월 26일 금요일
설명 업데이트 Andrei Ivanes   2010년 3월 2일 화요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.