Home Malware Programs Worms W32.Menovit

W32.Menovit

Posted: June 6, 2012

Threat Metric

Threat Level: 5/10
Infected PCs: 92
First Seen: June 6, 2012
Last Seen: September 28, 2021
OS(es) Affected: Windows

W32.Menovit is a worm that tries to proliferate through fixed, mapped and removable drives. Once executed, W32.Menovit replicates itself. W32.Menovit then creates several registry keys so that it can run every time you start Windows. Even if the files are not executable, such as .txt files, the file will still be overwritten with components of W32.Menovit, but the file will have the same extension it initially had. W32.Menovit will also try to stop numerous processes.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%ProgramFiles%\eset\nod32kui.exe File name: %ProgramFiles%\eset\nod32kui.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%ProgramFiles%\eset\nod32krn.exe File name: %ProgramFiles%\eset\nod32krn.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\1096\[TROJAN FILENAME].exe File name: %System%\1096\[TROJAN FILENAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\pchealth\helpctr\binaries\msconfig.exe File name: %System%\pchealth\helpctr\binaries\msconfig.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%DriveLetter%\autorun.inf File name: %DriveLetter%\autorun.inf
Mime Type: unknown/inf
Group: Malware file
%DriveLetter%\[NAMES OF FOLDERS IT DETECTS].exe File name: %DriveLetter%\[NAMES OF FOLDERS IT DETECTS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%DriveLetter%\[TROJAN FILE NAME].exe File name: %DriveLetter%\[TROJAN FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%DriveLetter%\[FILE NAME] File name: %DriveLetter%\[FILE NAME]
Group: Malware file
%Windir%\apps\Microsoft\Applications\MS-Office\MS-Word\Networking\internet\system32\[TROJAN FILENAME].exe File name: %Windir%\apps\Microsoft\Applications\MS-Office\MS-Word\Networking\internet\system32\[TROJAN FILENAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%SystemDrive%\Documents and Settings\All Users\Start Menu\Programs\Startup\[TROJAN FILE NAME].exe File name: %SystemDrive%\Documents and Settings\All Users\Start Menu\Programs\Startup\[TROJAN FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"shell" = "explorer.exe %Windir%\apps\Microsoft\Applications\Ms-office\Ms-Word\Networking\internet\system32\[TROJAN FILENAME].exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"venom" = "%System%\1096\[TROJAN FILENAME].exe"

Additional Information

The following URL's were detected:
https://findinfo.us/search?term=
Loading...