Home / malwarePDF  

Win32.Worm.Hakaglan.B


First posted on 21 November 2011.
Source: BitDefender

Aliases :

Win32.Worm.Hakaglan.B is also known as Worm.Win32.AutoRun.fwl, W32/Sohanad.D, Worm:Win32/Nuquel.Y.

Explanation :

This worm have a folder icon and perform the following action upon execution:
- make a copy of itself inside %windir% folder, as “SCVHOST.exe”
- make a copy of itself inside %windir%system32 folder, as “SCVHOST.exe”
- register itself at startup in many places, by adding the registry values:
HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun : “Yahoo Messsenger” -> “c:WindowsSystem32SCVHOST.exe”
HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell -> “SCVHOST.exe”.
- disables the task manager, registry tools and folder options by settings next registry keys: HKCUSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem:
"DisableTaskMgr" ->"1";
"DisableRegistryTools" ->"1";
HKCUSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer:
"NofolderOptions" ->"1";
- creates a schedule, using windows AT command schedule, for runnig “%windir%System32SCVHOST.exe”(a copy of malware) every day at 09:00AM. It also removes the limit on how long scheduled tasks are active by setting the key HKLMSYSTEMCurrentControlSetServicesSchedule:
"AtTaskMaxHours"->"0".
- disables Internet Explorer to start in offline mode by setting the registry HKCUSOFTWAREMicrosoftWindowsCurrentVersionInternet Settings:
"GlobalUserOffline"-> "0"
- creates the following registry entry so that its copy is shared HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerWorkgroupCrawlerShares: "shared"->"New folder.exe". If it finds any shared drivers, it copy itself on the under name “New folder.exe.”

- it spread itself via shared drives, removable drives and yahoo messenger.

Last update 21 November 2011

 

TOP