Home > Threat descriptions >

Virus:W32/IndoVirus.A

Classification

Category: Malware

Type: Virus

Aliases: IndoVirus.a, Virus.Win32.IndoVirus.a

Summary


IndoVirus.A creates multiple copies of itself on all available drives. IndoVirus.A attempts to disguise its executable file(s) as Windows folders. It changes the attributes of the original root folders to "hidden" and makes copies of its file using those folder names. It displays a folder-like icon and adjusts the Folder Options/View to "Do not show hidden files and folders" and sets "Hide extensions for known file types". The result of this disguise are multiple files using folder-like icons lying in wait for the computer user to click on them.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


Installation

Upon execution, the virus drops a copy of itself with a random name to the Windows and Windows System directories:

  • %temp%\[random].bat
  • %windir%\[random].scr
  • %windir%\system32\[random].com

It also drops the following files, which are copies of the virus:

  • %userprofile%\My Documents\My Music.exe
  • %userprofile%\My Documents\My Pictures.exe

The malware uses a folder icon for its executable file, it drops a copy of itself using the name of all existing folders into the root directory of all drives in an infected machine and then it hides the original folders by adjusting their attributes. So, this malware pretends to be a valid folder on a hard drive.

Payload

The virus disables the Windows Task Manager and modifies the following Registry entries:

  • HKLM\SOFTWARE\Classes\exefile (default) = File Folder (the default value is "Application")
  • HKLM\SOFTWARE\Classes\batfile (default) = Kabatia (the default value is "MS-DOS Batch file")
  • HKLM\SOFTWARE\Classes\comfile (default) = Demi Allah Zul cinta kamu Anick (the default value is "MS-DOS Application") Translation in English: Swear to God, Zul loves you Anick
Registry Changes

The virus modifies the Registry so that a user can not change Windows Explorer's option to "Show all hidden files or folders". To check for this modification, it is enough to open Windows Explorer, click on Tools menu, and choose Folder Options. Then click on View tab. The "Show all hidden files or folders" option is not available after the infection. The following Registry entries are modified:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "Type" is set to blank (the normal value of this is the string "radio")
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced The "ShowSuperHidden" is set to 00000000
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt The "UncheckedValue" is set to 00000001
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "CheckedValue" is set to 00000000
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden The "UncheckedValue" is set to 00000001

The virus creates the following startup Registry entries for its files:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run Zul_Cinta_Anick = C:\WINDOWS\system32\[random].com
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Run cintaku = C:\WINDOWS\[random].scr
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Explorer.exe = C:\WINDOWS\[random].scr
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Explorer.exe = C:\DOCUME~1\[user]\LOCALS~1\Temp\[random].bat

Description Created: 2007-06-04 14:09:07.0

Description Last Modified: 2010-07-13 05:30:27.0