Home / malwarePDF  

Worm:W32/Autorun.GA


First posted on 12 September 2008.
Source: SecurityHome

Aliases :

There are no other names known for Worm:W32/Autorun.GA.

Explanation :

A standalone malicious program which uses computer or removable drives to make complete copies of itself.

right]AutoRun.GA creates a copy of itself as the following:

  • C:Program FilesMicrosoft Commonwuauclt.exe

It will change the title of the process to "notepad window".

It also drops two files into the root of available removable drives:

  • autorun.inf
  • wuauclt.exe

It injects codes to svchost.exe and explorer.exe.

It looks for a service that will run manually and then temporarily replaces the driver with malicious driver. It then runs the service and the returns the original driver.

Launchpoint

  • Key: HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsexplorer.exe
    Value: Debugger
    Data: C:Program FilesMicrosoft Commonwuauclt.exe

This entry is created for automatic execution when explorer.exe is launched.

The autorun.inf file is an autorun file of wuauclt.exe and contains the following strings:

  • [autorun]
    open=system.exe
    shellexecute=system.exe
    shellExplorecommand=system.exe
    shellOpencommand=system.exe
    shell=Explore

Stealth

The worm uses rootkit stealth techniques to hide its presence on the infected machine, including deleting its own installation file once the installation has been completed.

Last update 12 September 2008

 

TOP