Grey pigeon variant Win32.Hupigon. aqc Analysis Report

Source: Internet
Author: User

Analyze the virus belt clearing Solution

Virus name: Backdoor. Win32.Hupigon. aqc

Virus Type: Rear category

File MD5: 45AF12FEE7E3077156FC5B3CD0B8836F

File length: 245,825 bytes

Infected system: windows 98 or later

Shelling type: nSPack 3.1

Virus description:

The virus is a gray pigeon variant. After the virus runs, copy itself to the system directory and rename it as UMWdfa.com, and delete itself. Create a service and start it at random. Create the process UMWdfa.com to download the virus file and connect to the network to wait for the connection from the virus control side. After the connection is successful, the user's machine will be remotely controlled.

Behavior Analysis:

1. After the virus runs, copy itself to the system directory and delete itself:

% System32 % MicrosoftUMWdfa.com

2. Modify the registry value to modify the default Internet Settings:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsCachePathsDirectory
New: String: "C: Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent. IE5"
Old: String: "C: Documents and settingscommandrelocal SettingsTemporary Internet FilesContent. IE5"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsCachePathspath1CachePath
New: String: "C: Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent. IE5Cache1"
Old: String: "C: Documents and settingscommandrelocal SettingsTemporary Internet FilesContent. IE5Cache1"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsCachePathspath2CachePath
New: String: "C: Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent. IE5Cache2"
Old: String: "C: Documents and settingscommandrelocal SettingsTemporary Internet FilesContent. IE5Cache2"


3. Create a service and start the service at random:

Service name: Windows UMWdfa

Display name: Windows User Modb Driver Frame

Description: Enables Windows user mode drivers.

Path of the executable file: C: WINDOWSsystem32MicrosoftUMWdfa.com

Start mode: automatic

4. Download related virus files from the connected network:

Protocol: TCP

Address: www.jjxhsf-com (210.51.12.206: 80)

Port: 80

Process: UMWdfa.com

5. Create the UMWdfa.com process to connect to the network and wait for the virus control terminal (192.168.18.3: 5680) to connect. After the connection is successful, the user's machine will be remotely controlled.

Note:

% Windir % mongodws directory

% DriveLetter % logical drive root directory

% ProgramFiles % default system program installation directory

% HomeDrive % partition of the current startup system

% Documents and Settings % root directory of the current user document

% Temp % current user TEMP cache variable; Path:

% Documents and Settings % current user \ Local SettingsTemp

% System32 % is a mutable path;

The virus queries the operating system to determine the location of the current System32 folder;

In Windows2000/NT, the default installation path is C: WinntSystem32;

In Windows 95/98/Me, the default installation path is C: WindowsSystem;

In Windows XP, the default installation path is C: WindowsSystem32.

Clear Solution:

1. You can use the CERT Trojan line to completely clear the virus (recommended). Please download www.antiy.com from the CERT website.

2. manually clear the file according to the behavior analysis and restore the relevant system settings. We recommend that you use ATool, ATool: www.antiy.com or http://www.antiy.com/download/index.htm.

(1) Use the CERT Trojan defense line or the "Process Management" in the ATool to disable virus processes.

(2) Forcibly delete virus files

% System32 % MicrosoftUMWdfa.com

(3) restore the registry project of the virus modification, and delete the registry entry added by the virus.

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsCachePathsDirectory
New: String: "C: Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent. IE5"
Old: String: "C: Documents and settingscommandrelocal SettingsTemporary Internet FilesContent. IE5"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsCachePathspath1CachePath
New: String: "C: Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent. IE5Cache1"
Old: String: "C: Documents and settingscommandrelocal SettingsTemporary Internet FilesContent. IE5Cache1"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsCachePathspath2CachePath
New: String: "C: Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent. IE5Cache2"
Old: String: "C: Documents and settingscommandrelocal SettingsTemporary Internet FilesContent. IE5Cache2"


(4) disable the Windows UMWdfa service.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.