SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Autoit.ABL
Autoit.ABL is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious way. Trojans do not replicate or spread to other computers.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Users\Admin\AppData\Local\Temp\bikini02.scr"
  • "c:\Windows\system\gHost.exe"
  • "c:\Users\Admin\Documents\My Videos.exe"
  • "c:\Users\Admin\AppData\Local\Temp\Nature.scr"
  • "c:\Users\Admin\Documents\My Music.exe"
  • "c:\Users\Admin\AppData\Local\Temp\Hacker.exe"
  • "c:\Windows\System32\KHATRA.exe"
  • "c:\Windows\Xplorer.exe"
  • "c:\Users\Admin\Documents\My Pictures.exe"
  • "c:\KHATRA.exe"
  • "c:\Windows\KHATARNAKH.exe"
  • "c:\Users\Admin\AppData\Local\Temp\kavSetup.exe"
  • "c:\Users\Admin\AppData\Local\Temp\clean.exe"
  • "c:\Users\Admin\AppData\Local\Temp\dmario.exe"
  • "c:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\(Empty).LNK"
  • "c:\Users\Admin\AppData\Local\Temp\fhset267.exe"
  • "c:\Users\Admin\AppData\Local\Temp\Admin.scr"
  • "c:\Users\Admin\AppData\Local\Temp\download.exe"
  • "c:\Users\Admin\AppData\Local\Temp\slideshow.exe"

It modifies the following additional file(s) on the system:
  • "c:\Windows\inf\Autoplay.inF"

    Process Related Changes
    It creates the following process(es):
    • C:\Windows\system32\makecab.exe [ MakeCab C:\Users\Admin\AppData\Local\Temp\kavSetup.exe C:\Users\Admin\AppData\Local\Temp\kma55833.tmp ]
    • C:\Windows\Xplorer.exe
    • C:\Windows\System\gHost.exe
    • C:\Windows\system32\makecab.exe [ MakeCab C:\Users\Admin\AppData\Local\Temp\fhset267.exe C:\Users\Admin\AppData\Local\Temp\kma46131.tmp ]
    • C:\Windows\system32\makecab.exe [ MakeCab C:\Users\Admin\AppData\Local\Temp\dmario.exe C:\Users\Admin\AppData\Local\Temp\kma62605.tmp ]
    • C:\Windows\system32\makecab.exe [ MakeCab C:\Users\Admin\AppData\Local\Temp\download.exe C:\Users\Admin\AppData\Local\Temp\kma31549.tmp ]
    • C:\Windows\system32\at.exe [ AT 09:00 /interactive /EVERY:mtwthfssu C:\Windows\system32\KHATRA.exe ]
    • C:\Windows\system32\KHATRA.exe
    • C:\Windows\system32\makecab.exe [ MakeCab C:\Users\Admin\AppData\Local\Temp\clean.exe C:\Users\Admin\AppData\Local\Temp\kma42512.tmp ]
    • C:\Windows\system32\netsh.exe [ netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System ]
    • C:\Windows\system32\makecab.exe [ MakeCab C:\Users\Admin\AppData\Local\Temp\Hacker.exe C:\Users\Admin\AppData\Local\Temp\kma88247.tmp ]
    • C:\Windows\system32\cmd.exe

        Registry Related Changes
        It makes the following registry modifications to ensure infection after system reboot:
        • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\xplorer = C:\Windows\Xplorer.exe/Windows
        • HKLM\software\microsoft\windowsnt\currentversion\winlogon\taskman = C:\Windows\system32\KHATRA.exe
        • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\adobearm = C:\Windows\Xplorer.exe


        Relevant Information