IndoVirus.A creates multiple copies of itself on all available drives. IndoVirus.A attempts to disguise its executable file(s) as Windows folders. It changes the attributes of the original root folders to "hidden" and makes copies of its file using those folder names. It displays a folder-like icon and adjusts the Folder Options/View to "Do not show hidden files and folders" and sets "Hide extensions for known file types". The result of this disguise are multiple files using folder-like icons lying in wait for the computer user to click on them.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More information on scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Upon execution, the virus drops a copy of itself with a random name to the Windows and Windows System directories:
It also drops the following files, which are copies of the virus:
- %userprofile%\My Documents\My Music.exe
- %userprofile%\My Documents\My Pictures.exe
The malware uses a folder icon for its executable file, it drops a copy of itself using the name of all existing folders into the root directory of all drives in an infected machine and then it hides the original folders by adjusting their attributes. So, this malware pretends to be a valid folder on a hard drive.
The virus disables the Windows Task Manager and modifies the following Registry entries:
- HKLM\SOFTWARE\Classes\exefile (default) = File Folder (the default value is "Application")
- HKLM\SOFTWARE\Classes\batfile (default) = Kabatia (the default value is "MS-DOS Batch file")
- HKLM\SOFTWARE\Classes\comfile (default) = Demi Allah Zul cinta kamu Anick (the default value is "MS-DOS Application") Translation in English: Swear to God, Zul loves you Anick
The virus modifies the Registry so that a user can not change Windows Explorer's option to "Show all hidden files or folders". To check for this modification, it is enough to open Windows Explorer, click on Tools menu, and choose Folder Options. Then click on View tab. The "Show all hidden files or folders" option is not available after the infection. The following Registry entries are modified:
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "Type" is set to blank (the normal value of this is the string "radio")
- HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced The "ShowSuperHidden" is set to 00000000
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt The "UncheckedValue" is set to 00000001
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "CheckedValue" is set to 00000000
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden The "UncheckedValue" is set to 00000001
The virus creates the following startup Registry entries for its files:
- HKCU\Software\Microsoft\Windows\CurrentVersion\Run Zul_Cinta_Anick = C:\WINDOWS\system32\[random].com
- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Run cintaku = C:\WINDOWS\[random].scr
- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Explorer.exe = C:\WINDOWS\[random].scr
- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Explorer.exe = C:\DOCUME~1\[user]\LOCALS~1\Temp\[random].bat
F-Secure Anti-Virus detects this malware with the following updates:[FSAV_Database_Version]
Description Created: 2007-06-04 14:09:07.0
Description Last Modified: 2010-07-13 05:30:27.0