Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Virus:W32/IndoVirus.A


Aliases:


IndoVirus.a
Virus.Win32.IndoVirus.a

Malware
Virus
W32

Summary

A program that secretly and maliciously integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

IndoVirus.A creates multiple copies of itself on all available drives. IndoVirus.A attempts to disguise its executable file(s) as Windows folders. It changes the attributes of the original root folders to "hidden" and makes copies of its file using those folder names. It displays a folder-like icon and adjusts the Folder Options/View to "Do not show hidden files and folders" and sets "Hide extensions for known file types". The result of this disguise are multiple files using folder-like icons lying in wait for the computer user to click on them.


Installation

Upon execution, the virus drops a copy of itself with a random name to the Windows and Windows System directories:

  • %temp%\[random].bat
  • %windir%\[random].scr
  • %windir%\system32\[random].com

It also drops the following files, which are copies of the virus:

  • %userprofile%\My Documents\My Music.exe
  • %userprofile%\My Documents\My Pictures.exe

The malware uses a folder icon for its executable file, it drops a copy of itself using the name of all existing folders into the root directory of all drives in an infected machine and then it hides the original folders by adjusting their attributes. So, this malware pretends to be a valid folder on a hard drive.


Payload

The virus disables the Windows Task Manager and modifies the following Registry entries:

  • HKLM\SOFTWARE\Classes\exefile (default) = File Folder (the default value is "Application")
  • HKLM\SOFTWARE\Classes\batfile (default) = Kabatia (the default value is "MS-DOS Batch file")
  • HKLM\SOFTWARE\Classes\comfile (default) = Demi Allah Zul cinta kamu Anick (the default value is "MS-DOS Application") Translation in English: Swear to God, Zul loves you Anick

Registry Changes

The virus modifies the Registry so that a user can not change Windows Explorer's option to "Show all hidden files or folders". To check for this modification, it is enough to open Windows Explorer, click on Tools menu, and choose Folder Options. Then click on View tab. The "Show all hidden files or folders" option is not available after the infection. The following Registry entries are modified:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "Type" is set to blank (the normal value of this is the string "radio")
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced The "ShowSuperHidden" is set to 00000000
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt The "UncheckedValue" is set to 00000001
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "CheckedValue" is set to 00000000
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden The "UncheckedValue" is set to 00000001

The virus creates the following startup Registry entries for its files:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run Zul_Cinta_Anick = C:\WINDOWS\system32\[random].com
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Run cintaku = C:\WINDOWS\[random].scr
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Explorer.exe = C:\WINDOWS\[random].scr
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Explorer.exe = C:\DOCUME~1\[user]\LOCALS~1\Temp\[random].bat


Detection

F-Secure Anti-Virus detects this malware with the following updates:[FSAV_Database_Version]
Database: 2007-01-21_01



Description Created: 2007-06-04 14:09:07.0
Description Last Modified: 2010-07-13 05:30:27.0



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.