Home / malware Worm:Win32/Dogkild.C
First posted on 16 February 2010.
Source: SecurityHomeAliases :
Worm:Win32/Dogkild.C is also known as TR/Crypt.XPACK.Gen (Avira), Trojan.Downloader.Agent.AAWS (BitDefender), Trojan.KillProc.1565 (Dr.Web), Win32/AutoRun.KillAV.E (ESET), Worm.Win32.AutoRun.bbjs (Kaspersky), W32/Autorun.worm.c (McAfee), W32/Autorun.JSB (Panda), Worm.Win32.AutoRun.tqi (Rising AV), Troj/KillB-Gen (Sophos), Trojan.Killav (Symantec), WORM_AUTORUN.JSE (Trend Micro), Worm.AutoRun.AHNZ (VirusBuster).
Explanation :
Worm:Win32/Dogkild.C is a worm that that spreads via removable drives. It downloads and executes arbitrary files from a remote host. It has been designed to deliberately compromise particular System Restore hardware and software.
Top
Worm:Win32/Dogkild.C is a worm that that spreads via removable drives. It downloads and executes arbitrary files from a remote host. It has been designed to deliberately compromise particular System Restore hardware and software. InstallationWorm:Win32/Dogkild.C may consist of several components. When executed, it may drop the following files:c:\dianlw.dll (detected as TrojanDownloader:Win32/Kilfno.C) %temp%\dll<random>.tmp (detected as Worm:Win32/Dogkild.C) %windir%\fonts\cauin.sys (detected as TrojanDownloader:Win32/Perkesh.gen!A) Spreads via€¦ Removable drives Worm:Win32/Dogkild.C spreads via removable drives. The worm copies itself as "zxo.pif" to the root of all accessible removable drives. The worm then writes an autorun configuration file named "autorun.inf" pointing to the worm copy. When the drive is accessed from a computer supporting the Autorun feature, the worm is launched automatically. Payload Downloads and executes arbitrary filesWorm:Win32/Dogkild.C contacts remote hosts in order to download and execute files of the attacker's choice on the affected machine. Compromises system restore Win32/Dogkild may overwrite particular system files, thus bypassing the protection offered by System Restore hardware and software as the integrity of restore settings may be lost. The overwritten file may be "<system folder>\drivers\linkinfo.dll". Terminates processesWorm:Win32/Dogkild.C attempts to terminate the following processes that are related to security software:ekrn.exe egui.exe nod32krn.exe nod32kui.exe RavMonD.exe Lowers system securityWorm:Win32/Dogkild.C attempts to disable the following antivirus-related services:ekrn nod32krn avp Hinder Antivirus softwareWin32/Dogkild may hide the alert windows from the following antivirus-related processes:avp.exe egui.exe 360sd.exe 360rp.exe Rstray.exe RavMond.exe Kavstart.exe RavMond.exe 360rp.exe
Analysis by Chun FengLast update 16 February 2010