Для корректной работы нашего сайта необходимо включить поддержку JavaScript в вашем браузере.
Win32.HLLM.Generic.411
Добавлен в вирусную базу Dr.Web:
2012-01-04
Описание добавлено:
2019-07-22
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
[<HKCU>\Control Panel\Desktop\] 'SCRNSAVE.EXE' = '<SYSTEM32>\babon.SCR'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'babon' = '%WINDIR%\babon'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run\] 'MSMSGS' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\winlogon.exe'
[<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\] 'Logonuser' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\csrss.exe'
[<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\] 'System Monitoring' = '%HOMEPATH%\Local Settings\Application Data\WINDOWS\lsass.exe'
[<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe "<SYSTEM32>\IExplorer.exe"'
[<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\IExplorer.exe'
[<HKLM>\Software\Classes\exefile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
[<HKLM>\Software\Classes\lnkfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
[<HKLM>\Software\Classes\piffile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
[<HKLM>\Software\Classes\batfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
[<HKLM>\Software\Classes\comfile\shell\open\command] '' = '"<SYSTEM32>\shell.exe" "%1" %*'
Creates the following files on removable media
<Drive name for removable media>:\wangsit.txt
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\cewek_imoet.exe
<Drive name for removable media>:\file_rahasia user.exe
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
Registry Editor (RegEdit)
blocks the following features:
modifies the following system settings:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoFolderOptions' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoTrayContextMenu' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoClose' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'StartMenuLogOff' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoFind' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoSetFolders' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoSetTaskbar' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoRun' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\] 'NoUserNameInStartMenu' = '00000001'
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system
Creates the following files
%WINDIR%\babon.exe
%HOMEPATH%\local settings\application data\csrss.exe
%HOMEPATH%\local settings\application data\smss.exe
D:\file_rahasia user.exe
D:\cewek_imoet.exe
D:\autorun.inf
D:\wangsit.txt
C:\file_rahasia user.exe
C:\cewek_imoet.exe
C:\autorun.inf
%HOMEPATH%\local settings\application data\winlogon.exe
%WINDIR%\msvbvm60.dll
%HOMEPATH%\local settings\application data\windows\smss.exe
%HOMEPATH%\local settings\application data\windows\lsass.exe
%HOMEPATH%\local settings\application data\windows\csrss.exe
%HOMEPATH%\local settings\application data\windows\winlogon.exe
C:\users\all users\start menu\programs\startup\empty.pif
%WINDIR%\syswow64\iexplorer.exe
%WINDIR%\syswow64\babon.scr
%WINDIR%\syswow64\shell.exe
C:\babon.exe
C:\wangsit.txt
%HOMEPATH%\local settings\application data\lsass.exe
Sets the 'hidden' attribute to the following files
%HOMEPATH%\local settings\application data\windows\winlogon.exe
%HOMEPATH%\local settings\application data\windows\lsass.exe
%HOMEPATH%\local settings\application data\windows\csrss.exe
%HOMEPATH%\local settings\application data\windows\smss.exe
%WINDIR%\babon.exe
%WINDIR%\msvbvm60.dll
C:\autorun.inf
D:\autorun.inf
<Drive name for removable media>:\autorun.inf
C:\babon.exe
Deletes the following files
%HOMEPATH%\local settings\application data\csrss.exe
Substitutes the following files
%HOMEPATH%\local settings\application data\csrss.exe
Miscellaneous
Searches for the following windows
ClassName: 'RegEdit_RegEdit' WindowName: ''
ClassName: '' WindowName: 'Registry Editor'
ClassName: '' WindowName: 'Folder Options'
ClassName: '' WindowName: 'Local Settings'
ClassName: 'ExploreWClass' WindowName: ''
ClassName: 'CabinetWClass' WindowName: ''
ClassName: 'RebarWindow32' WindowName: ''
ClassName: 'ComboBoxEx32' WindowName: ''
ClassName: 'ComboBox' WindowName: ''
ClassName: 'Edit' WindowName: ''
ClassName: '#32770' WindowName: ''
Creates and executes the following
'%WINDIR%\babon.exe'
'%WINDIR%\syswow64\iexplorer.exe'
'%HOMEPATH%\local settings\application data\windows\winlogon.exe'
'%HOMEPATH%\local settings\application data\windows\csrss.exe'
'%HOMEPATH%\local settings\application data\windows\lsass.exe'
'%WINDIR%\babon.exe' ' (with hidden window)
'%WINDIR%\syswow64\iexplorer.exe' ' (with hidden window)
'%HOMEPATH%\local settings\application data\windows\winlogon.exe' ' (with hidden window)
'%HOMEPATH%\local settings\application data\windows\csrss.exe' ' (with hidden window)
'%HOMEPATH%\local settings\application data\windows\lsass.exe' ' (with hidden window)
Скачайте Dr.Web для Android
Бесплатно на 3 месяца
Все компоненты защиты
Продление демо через AppGallery/Google Pay
Если Вы продолжите использование данного сайта, это означает, что Вы даете согласие на использование нами Cookie-файлов и иных технологий по сбору статистических сведений о посетителях. Подробнее
OK