Home Malware Programs Worms W32.Stikpid

W32.Stikpid

Posted: July 27, 2012

Threat Metric

Threat Level: 1/10
Infected PCs: 143
First Seen: July 27, 2012
Last Seen: November 17, 2022
OS(es) Affected: Windows

W32.Stikpid is a worm that circulates through removable drives. W32.Stikpid also drops potentially infected files, steals computer system information, and opens a back door on the affected PC. W32.Stikpid may spread via malicious email attachments, hijacked removable drives, drive-by downloads, or can be dropped by other malware infections. Once executed, W32.Stikpid may replicate itself to the certain locations. W32.Stikpid may create the certain registry entries so that it can run automatically every time you start Windows. W32.Stikpid may insert itself into the processes called iexplore.exe or explorer.exe in order to connect to the Internet. W32.Stikpid may also create the certain file in order to run whenever the drive is used on another PC. W32.Stikpid may also gather personal information, such as OS version, successful installation, specific accessible permissions and CPU type.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%DriveLetter%\autorun.inf File name: %DriveLetter%\autorun.inf
Mime Type: unknown/inf
Group: Malware file
%DriveLetter%\[ALL EXISTING FOLDERS]\[SEVEN CHARACTERS]_l.exe File name: %DriveLetter%\[ALL EXISTING FOLDERS]\[SEVEN CHARACTERS]_l.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%DriveLetter%\[ALL EXISTING FOLDERS]\[SEVEN CHARACTERS]_a.exe File name: %DriveLetter%\[ALL EXISTING FOLDERS]\[SEVEN CHARACTERS]_a.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\Local Settings\Temp\[SEVEN CHARACTERS]_l.dat File name: %UserProfile%\Local Settings\Temp\[SEVEN CHARACTERS]_l.dat
File type: Data file
Mime Type: unknown/dat
Group: Malware file
%UserProfile%\Local Settings\Temp\[SEVEN CHARACTERS]_a.dat File name: %UserProfile%\Local Settings\Temp\[SEVEN CHARACTERS]_a.dat
File type: Data file
Mime Type: unknown/dat
Group: Malware file
%UserProfile%\Application Data\Microsoft\[SEVEN CHARACTERS].exe File name: %UserProfile%\Application Data\Microsoft\[SEVEN CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[SEVEN CHARACTERS]" = "[PATH TO WORMHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"[SEVEN CHARACTERS]" = "[PATH TO WORM]"

Additional Information

The following URL's were detected:
https://feed.prosearchconverters.com/
Loading...