Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Autorun.20828
Date discovered:03/11/2009
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:20.828 Bytes
MD5 checksum:327f259a5c429e347bff319b7d6bcc53
VDF version:7.01.06.180
IVDF version:7.01.06.185 - Tuesday, November 3, 2009

 General Method of propagation:
   • Autorun feature


Aliases:
   •  Mcafee: BackDoor-AWQ
   •  Kaspersky: Worm.Win32.AutoRun.doq
   •  Bitdefender: Worm.Generic.238241
   •  Panda: W32/Autorun.XZ
   •  GData: Worm.Generic.238241


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads malicious files
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following locations:
   • %drive%\explorer.exe
   • %SYSDIR%\iexplorer.exe
   • %SYSDIR%\wuauc1t.exe



The following files are created:

%drive%\AUTORUN.INF This is a non malicious text file with the following content:
   • %code that runs malware%




It tries to download some files:

– The location is the following:
   • http://2.trojan8.com/dd/**********
It is saved on the local hard drive under: C:\win20.pif

– The location is the following:
   • http://2.trojan8.com/dd/**********
It is saved on the local hard drive under: C:\win11.pif

– The location is the following:
   • http://2.trojan8.com/dd/**********
It is saved on the local hard drive under: C:\win12.pif

– The location is the following:
   • http://2.trojan8.com/dd/**********
It is saved on the local hard drive under: C:\win13.pif

– The location is the following:
   • http://2.trojan8.com/dd/**********
It is saved on the local hard drive under: C:\win19.pif



It tries to execute the following files:

– Filename:
   • net1 stop KPfwSvc


– Filename:
   • net stop "Norton AntiVirus Server"


– Filename:
   • net1 stop "Norton AntiVirus Server"


– Filename:
   • %PROGRAM FILES%\Internet Explorer\IEXPLORE.EXE


– Filename:
   • cmd /c net stop McShield


– Filename:
   • "%SYSDIR%\ntvdm.exe" -f -i1


– Filename:
   • "%SYSDIR%\ntvdm.exe" -f -i2


– Filename:
   • "%SYSDIR%\ntvdm.exe" -f -i3


– Filename:
   • "%SYSDIR%\ntvdm.exe" -f -i4


– Filename:
   • "%SYSDIR%\ntvdm.exe" -f -i5


– Filename:
   • cmd /c net stop KWhatchsvc


– Filename:
   • net stop McShield


– Filename:
   • cmd /c net stop KPfwSvc


– Filename:
   • net stop KWhatchsvc


– Filename:
   • cmd /c net stop "Norton AntiVirus Server"


– Filename:
   • net stop KPfwSvc


– Filename:
   • net1 stop McShield


– Filename:
   • net1 stop KWhatchsvc

 Registry –  [HKCU\Software\Microsoft\Internet Explorer\Safety\PrivacIE]
   • WebFilters



The following registry keys are added:

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Frameworkservice.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\AvMonitor.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Nod32kui.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\IceSword.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Ast.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Regedit.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\CCenter.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\WOPTILITIES.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\360rpt.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\VPC32.exe]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKCU\Software\Microsoft\Internet Explorer\Recovery\Active]
   • "{1F93FBCF-43BE-11D6-9666-000C29232653}"=dword:0x00000000

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\AVP.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKCU\Software\Microsoft\Internet Explorer\SQM\FreezeUploads]
   • "HighTime"=dword:0x01c1e2cb
   • "LowTime"=dword:0x466d396a

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\VPTRAY.exe]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKCU\Software\Microsoft\Internet Explorer\SQM\PIDs]
   • "PID_156"=dword:0x0000009c

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\360safe.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Mmsk.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Navapsvc.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\AutoRunKiller.exe]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Iparmor.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\Wuauclt.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\QQDOCTOR.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\KVWSC.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\ANTIARP.exe]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\KVMonxp.kxp]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\KVSrvXP.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\360tray.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\KASARP.exe]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"

– [HKCU\SOFTWARE\Microsoft\CTF\TIP\
   {1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
   {63800dac-e7ca-4df9-9a5c-20765055488d}]
   • "Enable"=dword:0x00000001

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\KRegEx.EXE]
   • "Debugger"="%SYSDIR%\wuauc1t.exe"



The following registry keys are changed:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
   Folder\Hidden\SHOWALL]
   New value:
   • "CheckedValue"=dword:0x00000000

 Injection – It injects itself as a remote thread into a process.

    Process name:
   • iexplore.exe


 Miscellaneous Accesses internet resources:
   • http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********;
      http://2.trojan8.com/dd/**********


Mutex:
It creates the following Mutex:
   • ssfsf

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Monday, April 4, 2011
Description updated by Andrei Ivanes on Friday, April 8, 2011

Back . . . .