Home / malwarePDF  

Win32.Worm.Autoit.P


First posted on 21 November 2011.
Source: BitDefender

Aliases :

Win32.Worm.Autoit.P is also known as Trojan-Downloader.Win32.Agent.akh.

Explanation :

Malware is written using AutoIT, which is a "BASIC-like scripting language designed for automating the Windows GUI and general scripting".

Once executed:
- checks if "system.exe" process exists and if it does it executes "explorer.exe" from system directory
- if any of below processes are running:
* msconfig.exe
* rstrui.exe
* regedit.exe
* taskmgr.exe
it exits.

- tries to kill the following processes if they are running:
* winsystem.exe
* handydriver.exe
* kerneldrive.exe
* wscript.exe
* cmd.exe
* nod32krn.exe
* nod32kui.exe

- malware copies itself as:
* %windir%msmsgs.exe
* %windir%wininit.exe
and modifies a registry key so that it is run at every system startup

- modifies settings of explorer so that file extensions are hidden
- modifies settings of explorer so that hidden files are not shown
- modifies settings to disable Task Manager
- modifies settings of disable Regedit

- copies itself into all non-removable drives as "system.exe" and adds an autorun.inf file so that it is executed automatically each

time the drive is activated or browsed
- deletes following registry keys:
* HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMainWindow Title
* HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesNOD32krnImagePath
* HKEY_LOCAL_MACHINESYSTEMControlSet001Services
od32drvImagePath
* HKEY_CLASSES_ROOTlnkfileisShortcut

- deletes following files:
* %program files dir%ESET
od32.exe
* %program files dir%ESET
od32kui.exe
* %program files dir%ESET
od32krn.exe

- downloads files from internet:
* http://ppt.th.gs/[removed]/bad1.exe
* http://ppt.th.gs/[removed]/bad2.exe
* http://ppt.th.gs/[removed]/bad3.exe

into Windows directory and adds them to Windows startup

Last update 21 November 2011

 

TOP