Home / malwarePDF  

Worm:W32/Hairy.A


First posted on 06 July 2007.
Source: SecurityHome

Aliases :

Worm:W32/Hairy.A is also known as Virus.Win32.AutoRun.dv.

Explanation :

This malware was written in AutoIt scripting. It uses an icon of MS Winword.

Upon execution, it creates a file HarryPotter-TheDeathlyHallows.doc that has the following text and opens it using MS Winword:


It creates the folder C:WINDOWSCache and copies itself as HarryPotter-TheDeathlyHallows.exe to the said folder. This file will be copied from drives C to J if present. It will also be copied to the folder C:Documents and SettingsAll UsersDesktop.

This malware creates a file named harry potter.txt which contains the following text:


It also creates autorun.inf which will be copied to file which has the following data. This file be copied from drives C to J if present.


After running itself, it will force restarting the infected machine.

Payload One

It deletes all existing scheduled tasks by rendering the following command:

Note: AT is the command-line for task scheduler.

It attempts to create the following tasks but due to some instability of the code, it might not create them all:


Note: This means that the file C:WINDOWSCacheHarryPotter-TheDeathlyHallows.exe will be run everyday at the specified time.




Payload Two

It changes the Windows Product Owner and Product ID causing Windows Genuine Advantage validation to be triggered. There then no longer appears to be a valid Windows Operating System. This is done by modifying the following registry keys:

Note: To check this, you can press WindowsLogo key + Pause/Break key

Payload Three

It changes Internet Explorer's Window Title to 'JK Rowling Owns You'. It changes the start page as well.

Payload Four

It disables/hides the following System tools:


Payload Five

It creates the following users:


Payload Six

It runs a batch file on every start of the infected machine that displays the following message:



This batch file is saved at C:WINDOWSTempt alk.bat. It creates the following registry key so that in every machine start up this batch will be executed:

Last update 06 July 2007

 

TOP

Malware :

Family: