Home Malware Programs Worms W32.Morto.B

W32.Morto.B

Posted: July 11, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 12
First Seen: July 11, 2012
OS(es) Affected: Windows

W32.Morto.B is a worm that circulates through removable drives and by using Remote Desktop Protocol (RDP) connections. W32.Morto.B attempts to open the Remote Desktop Protocol (RDP) connection on PCs in the local network by using common user name and password combinations. W32.Morto.B also affects executable files detected on the infected computer. Once executed, W32.Morto.B inserts itself into the svchost.exe service. W32.Morto.B may also affect other executable files on the targeted PC. W32.Morto.B then copies itself to the certain location. W32.Morto.B affects the certain file by inserting itself into the last section of the file. W32.Morto.B creates several registry entries to register itself as a system service and store data as well its copy. W32.Morto.B then modifies a few registry entries to disable certain system settings. W32.Morto.B also modifies the certain registry entries to disable security programs.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%System%\wmicuclt.exe File name: %System%\wmicuclt.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\wscript.exe File name: %System%\wscript.exe
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"Start" = "2"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"ErrorControl" = "0"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\Security\"Security" = "[WORM BODY IN HEXADECIMAL CHARACTERS]HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"WOW64" = "2"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"DisplayName" = "Remote Access Connection Service"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"ImagePath" = "%System%\wmicuclt.exe"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\wmicucltsvc\"(Default)" = "Service"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"Description" = "Stores security information for local user accounts."HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"Type" = "20"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wmicucltsvc\"ObjectName" = "Local System"HKEY_LOCAL_MACHINE\SYSTEM\Select\"pu" = "[DATA]"HKEY_LOCAL_MACHINE\SYSTEM\Select\"p" = "[DATA]"HKEY_LOCAL_MACHINE\SYSTEM\Select\"v" = "[WORM BODY]"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\"DontshowUI" = "1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows\"NoPopUpsOnBoot" = "1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\a2AntiMalware\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\FSORSPClient\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ekrn\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MsMpSvc\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\360rp\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\zhudongfangyu\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\V3 Service\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\AntiVirService\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\kxescore\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\kxesapp\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\FSMA\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\F-Secure Gatekeeper Handler Starter\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\AVGwd\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\AVGIDSAgent\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\vsserv\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\mcshield\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NIS\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\avast! Antivirus\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\mcods\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\amsp\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PavFnSvr\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pavsrv\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RsRavMon\"Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SavService\"Start" = "4"
Loading...