First posted on 06 June 2007.
Source: SecurityHome
Virus:W32/IndoVirus.A is also known as  Virus.Win32.IndoVirus.a.
The IndoVirus.A virus creates multiple copies of itself on all available drives. It pretends to be a folder by hiding the original folder and copying its file with the name of a hidden folder and displays a folder-like icon.
 Installation to system
Upon execution, the virus drops a copy of itself with a random name to Windows and Windows system directories:
 
 
 -  %windir%system32[random].com
  -  %windir%[random].scr
  -  %temp%[random].bat
  
 
 It also drops the following files, which are copies of the virus:
 
 
 -  %userprofile%My DocumentsMy Music.exe
  -  %userprofile%My DocumentsMy Pictures.exe
  
 
 The malware uses an icon of a folder, it drops a copy of itself using the name of all existing folders into the root directory of all drives in an infected machine and then it hides the original folders. So, this malware pretends to be a valid folder on a hard drive.
 
The virus modifies the Registry so that a user can not change Explorer's option to "Show all hidden files or folders". To check that, it is enough to open Windows Explorer, click on Tools menu and choose Folder Options. And then to click on View tab. The "Show all hidden files or folders" option is not available after the infection. The following Registry entries are modified:
 
 
 -  HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALL
the 'Type' is set to blank (the normal value of this is the string 'radio')  -  HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced
the 'ShowSuperHidden' is set to 00000000  -  HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHideFileExt
the 'UncheckedValue' is set to 00000001  -  HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALL
the 'CheckedValue' is set to 00000000  -  HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvancedFolderSuperHidden
the 'UncheckedValue' is set to 00000001  
 
 Autostart
 
The virus creates the following startup Registry entries for its files:
 
 
 -  HKCUSoftwareMicrosoftWindowsCurrentVersionRun
Zul_Cinta_Anick = C:WINDOWSsystem32[random].com  - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionRun
 cintaku = C:WINDOWS[random].scr  - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon
 Explorer.exe = C:WINDOWS[random].scr  - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell
 Explorer.exe = C:DOCUME~1[user]LOCALS~1Temp[random].bat  
 
 Payload
 
 The virus disables the Windows Task Manager and modifies the following Registry entries:
 
 
 -  HKLMSOFTWAREClassesexefile
 (default) = File Folder (the default value is 'Application')  - HKLMSOFTWAREClassesatfile
 (default) = Kabatia (the default value is 'MS-DOS Batch file')  - HKLMSOFTWAREClassescomfile
 (default) = Demi Allah Zul cinta kamu Anick (the default value is 'MS-DOS Application')
 translation in english: Swear to God, Zul loves you Anick  
Last update 06 June 2007
 
TOP