Worm:Win32/Autorun.ABO is a worm - a self-propagating program that can spread itself from one computer to another. Worms may spread themselves via a variety of different channels in order to compromise new computers. Variants of Worm:Win32/Autorun usually spread using methods that include, but may not be limited to, copying themselves to removable or network drives, and placing an autorun.inf file in the root directory of each affected drive in an attempt to ensure that the worm is run when the removable drive is attached, or the network drive is visited from a remote system supporting the Autorun feature.
Installation
When executed, Worm:Win32/Autorun.ABO copies itself to <system folder>\svrwsc.exe.
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
The malware creates the following files on an affected computer:
-
%windir%\debug\usermode\userenv.log
-
<system folder>\config\sysevent.evt
-
<system folder>\wbem\logs\wbemess.log
-
c:\documents and settings\administrator\local settings\temp\low805e.tmp.bat
The malware utilizes code injection in order to hinder detection and removal. When Worm:Win32/Autorun.ABO executes, it may inject code into running processes, including the following, for example:
- explorer.exe
- services.exe
- svchost.exe
- winlogon.exe
Spreads via…
Removable drives
Worm:Win32/Autorun.ABO copies itself to the following locations on removable drives:
- <targeted drive>:\wqdfho\isnkqm.exe
It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system, so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.
Note: This worm was observed to write an executable and create an autorun.inf file on a targeted drive in our automated testing environment. This is particularly common malware behavior, generally utilized in order to spread malware from computer to computer.
It should also be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
Removable and network drives
The malware copies itself to the following location on all accessible network or removable drives:
- <targeted drive>:\wqdfho\isnkqm.exe
It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system, so that When the drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.
Note: This worm was observed to write an executable and create an autorun.inf file on a targeted drive in our automated testing environment. This is particularly common malware behavior, generally utilized in order to spread malware from computer to computer.
It should also be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
Payload
Terminates processes
Worm:Win32/Autorun.ABO terminates the following processes should they be running on an affected computer:
- explorer.exe
- services.exe
- svchost.exe
- winlogon.exe
Contacts remote host
The malware may contact a remote host at cnewsus.ru using port 80. Commonly, malware may contact a remote host for the following purposes:
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 028a554ca93425193d108caa91b9dc07efbc7397.