When executed, Win32/Looked.S copies itself to the %Windows% directory using the following filenames: rundl132.exe Logo1_.exe Note: '%Windows%' is a variable location. The malware determines the location of the current Windows folder by querying the operating system. The default installation location for the Windows directory for Windows 2000 and NT is C:\Winnt; for 95,98 and ME is C:\Windows; and for XP is C:\Windows. It then modifies the registry so that the file "rundl123.exe" is executed at each Windows start: HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load = "%Windows%\rundl132.exe" The worm then drops the DLL "vDll.dll" in the current directory. This is injected into the Explorer process and is used to download and launch processes inside Explorer's process space. The worm also creates the semaphore "SemaphoreMe" to ensure it runs only one instance of itself.
|
0 Comments:
Post a Comment
<< Home