Home / malware Virus:Win32/Jadtre.I
First posted on 13 July 2010.
Source: SecurityHomeAliases :
Virus:Win32/Jadtre.I is also known as W32/Threat-HLLIT-based!Maximus (Authentium (, W32/Pikorms.G (Norman), Win32.Jadtre.Gen (VirusBuster), Worm/AutoRun.JT (AVG), TR/Crypt.EPACK.Gen2 (Avira), Gen:Trojan.Heur.GZ.Nq0@bu4q41bi (BitDefender), Win32/Wapomi.A (CA), Win32.Dropper.5 (Dr.Web), Win32/AutoRun.NAX (ESET), Virus.Win32.Jadtre (Ikarus), W32/Fujacks.be (McAfee), Win32.Fednu.e (Rising AV), W32/Jadtre-B (Sophos), Virus.Win32.Jadtre.b (Sunbelt Software), W32.Wapomi.B!inf (Symantec), PE_PIKOR.A (Trend Micro) more.
Explanation :
Virus:Win32/Jadtre.I is a detection for a virus that infects Windows executable files, and spreads to computers via network shares and removable drives. The virus attempts to connect to a remote server to log its presence, and attempts to download and execute arbitrary files.
Top
Virus:Win32/Jadtre.I is a detection for a virus that infects Windows executable files, and spreads to computers via network shares and removable drives. The virus attempts to connect to a remote server to log its presence, and attempts to download and execute arbitrary files. Installation When executed, a Virus:Win32/Jadtre.I infected file drops and executes a copy of the virus body with a random name, which may be detected as Virus:Win32/Jadtre.gen!A. The dropped virus file attempts to install itself as a Windows system service DLL. It searches for a stopped system service from the following list:Schedule RemoteRegistry helpsvc CryptSvc Themes Browser Tapisrv Nla Netman SSDPSRV upnphost Ntmssvc EventSystem xmlprov WmdmPmSN FastUserSwitchingCompatibility BITS AppMgmt If the virus does not find a stopped service from the above list, it attempts to stop one of the services. The virus disables Windows System File Checker (SFC) and replaces the stopped service with a copy of the dropped virus body as a DLL. The virus DLL may therefore be named as one of the following, depending on which service it replaces:schedsvc.dll regsvc.dll pchsvc.dll cryptsvc.dll browser.dll tapisrv.dll mswsock.dll netman.dll ssdpsrv.dll upnphost.dll ntmssvc.dll es.dll xmlprov.dll mspmsnsv.dll shsvcs.dll qmgr.dll appmgmts.dll Virus:Win32/Jadtre.I sets the replaced service as an autostart system service to make sure the virus DLL is loaded at each Windows start. Virus:Win32/Jadtre.I may also drop a device driver with a random filename as the following:<system folder>\drivers\<random>.sys (for example, <system folder>\drivers\55C03AF5.sys) The dropped component may be detected as VirTool:WinNT/Jadtre.B. Spreads via€¦ File infection Virus:Win32/Jadtre.I infects Windows executable files that have a file extension of ".EXE". The virus can infect executables within .RAR archive container files. Removable drives Virus:Win32/Jadtre.I copies itself to removable drives as the following:<drive:>\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\setup.exe The virus then writes an Autorun configuration file named "autorun.inf" pointing to "setup.exe". When the drive is accessed from a computer supporting the Autorun feature, the virus is launched automatically. Network shares Virus:Win32/Jadtre.I attempts to connect to network shares by using a built-in dictionary containing user names and passwords. After successfully connecting to the share, the virus drops a copy of the virus body in the share folder. Payload Downloads and executes arbitrary files Virus:Win32/Jadtre.I connects to a remote host to download and execute arbitrary files in the infected computer. Modifies HOSTS file Virus:Win32/Jadtre.I replaces the host file "<system folder>\drivers\etc\hosts" with an empty configuration in order to remove any previously blocked hosts.
Analysis by Chun FengLast update 13 July 2010