Home / malwarePDF  

Worm:Win32/Helompy.D


First posted on 07 January 2012.
Source: Microsoft

Aliases :

Worm:Win32/Helompy.D is also known as Win32.HLLW.Napad (Dr.Web), Worm.Win32.AutoRun.argc (Kaspersky), W32/YahLover.worm.gen (McAfee), Troj/AutoIt-JO (Sophos), W32.SillyDC (Symantec), Mal_OtorunN (Trend Micro).

Explanation :

Worm:Win32/Helompy.D is a worm that spreads to removable drives as a file named "subst.exe".
Top

Worm:Win32/Helompy.D is a worm that spreads to removable drives as a file named "subst.exe".

Installation
Worm:Win32/Helompy.D may appear as a file folder. When executed, the worm simulates opening a file folder by the same name, as in the following example: The worm creates a folder in the root of the system drive, named "win", with 'hidden' and 'system' attributes. The worm drops a copy of itself as the following, and runs the dropped copy:

  • C:\win\lsass.exe


When the worm runs, it creates a hidden window with a title "HeloMyPrc". The worm detects if this name is present, and if not, it runs the following files that are presumed to be copies of the worm:

  • C:\win\lsass.exe
  • D:\Programs\lsass.exe


The registry is modified to run the worm copy at each Windows start.

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "run32"
With data: "C:\win\lsass.exe"

Spreads via... Removable drives Worm:Win32/Helompy.D drops a copy of itself to removable drives as a file named "subst.exe". The worm then writes an Autorun configuration file named "autorun.inf" pointing to the worm copy. When the drive is accessed from a computer supporting the Autorun feature, the worm is launched automatically.

Analysis by Haoran Yu

Last update 07 January 2012

 

TOP