Win32/Adware.HDDRescue [Threat Name] go to Threat

Win32/Adware.HDDRescue.AD [Threat Variant Name]

Category adware
Size 301568 B
Aliases Trojan-FakeAV.Win32.FakeSysDef.pit (Kaspersky)
  Win32:Malware-gen (Avast)
  Trojan:Win32/FakeSysdef (Microsoft)
Short description

Win32/Adware.HDDRescue.AD is a rogue system tool. The file is run-time compressed using UPX .

Installation

When executed, the adware copies itself into the following location:

  • %commonappdata%\­%variable%.exe

A string with variable content is used instead of %variable% .


In order to be executed on every system start, the adware sets the following Registry entry:

  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "DSMmqWNIvi.exe" = "%commonappdata%\­%variable%.exe"

The adware creates the following file:

  • %commonappdata%\­%variable%

The following Registry entries are set:

  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Explorer\­Advanced]
    • "Hidden" = 0
    • "ShowSuperHidden" = 0
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­System]
    • "DisableTaskMgr" = 1
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­System]
    • "DisableTaskMgr" = 1
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Internet Explorer\­Download]
    • "CheckExeSignatures" = "no"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­Attachments]
    • "SaveZoneInformation" = 1
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­Associations]
    • "LowRiskFileTypes" = ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;.scr;"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Internet Explorer\­Main]
    • "Use FormSuggest" = "Yes"
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings\­Zones\­3]
    • "1601" = 0
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings]
    • "WarnOnZoneCrossing" = 0
    • "WarnonBadCertRecving" = 0
    • "CertificateRevocation" = 0
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­WinTrust\­Trust Providers\­Software Publishing]
    • "State" = 146944
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Explorer\­Advanced]
    • "TaskbarGlomming" = 0
    • "TaskbarGlomLevel" = 2
    • "Start_ShowNetPlaces" = 0
    • "Start_ShowNetConn" = 0
    • "Start_ShowSetProgramAccessAndDefaults" = 0
    • "Start_ShowSearch" = 0
    • "Start_ShowRun" = 0
    • "Start_ShowRecentDocs" = 0
    • "Start_ShowPrinters" = 0
    • "Start_ShowMyPics" = 0
    • "Start_ShowMyGames" = 0
    • "Start_ShowMyMusic" = 0
    • "Start_ShowMyDocs" = 0
    • "Start_ShowMyComputer" = 0
    • "Start_ShowHelp" = 0
    • "Start_ShowControlPanel" = 0
    • "Start_ShowUser" = 0
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Explorer\­StartPage]
    • "Favorites" = 255
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Security Center]
    • "AntiVirusDisableNotify" = 1
    • "FirewallDisableNotify" = 1
    • "UpdatesDisableNotify" = 1
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Security Center]
    • "AntiVirusDisableNotify" = 1
    • "FirewallDisableNotify" = 1
    • "UpdatesDisableNotify" = 1
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Explorer\­HideDesktopIcons\­ClassicStartMenu]
    • "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" = 1
    • "{450D8FBA-AD25-11D0-98A8-0800361B1103}" = 1
    • "{645FF040-5081-101B-9F08-00AA002F954E}" = 1
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Explorer\­HideDesktopIcons\­NewStartPanel]
    • "{208D2C60-3AEA-1069-A2D7-08002B30309D}" = 1
    • "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" = 1
    • "{450D8FBA-AD25-11D0-98A8-0800361B1103}" = 1
    • "{645FF040-5081-101B-9F08-00AA002F954E}" = 1

The adware keeps various information in the following Registry key:

  • [HKEY_CURRENT_USER\­Software]

The adware terminates its execution if it detects that it's running in a specific virtual environment.


The adware quits immediately if it detects a running process containing one of the following strings in its name:

  • dumpcap.exe
  • frzstate.exe
  • http.exe
  • msvsmon.exe
  • procexp.exe
  • procmon.exe
  • tcpview.exe
  • tor.exe
  • win32_remote.exe
  • windbg.exe
  • wireshark.exe

The adware quits immediately if the computer name is one of the following:

  • ANDY-E20A8129T3
  • CCS
  • COMEBACKGMBH
  • CoreyWeiner-PC
  • HANUELE-BC60720
  • SNDBOX11
  • SNDBOX12
  • Vista64
  • Win7-x86-PC
  • XP32
  • XP32Q"

The adware quits immediately if the Windows user name is one of the following:

  • vmclient
  • 1046022
  • balser
  • Corey Weiner
  • sndbox
  • Tester
Other information

Win32/Adware.HDDRescue.AD is a rogue system tool.


The adware displays warnings about possible problems detected on the compromised computer that need to be fixed.


The problems/threats are fake.


Some examples follow.

The goal of the program is to persuade the user to purchase the product.


The adware connects to the following servers to obtain the current date and time:

  • time.windows.com:123

The adware acquires data and commands from a remote computer or the Internet.


The adware contains a list of (10) URLs. The HTTP protocol is used.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • shut down/restart the computer

The following programs are terminated:

  • chrome.exe
  • firefox.exe
  • iexplore.exe
  • mrt.exe
  • MSASCui.exe
  • msmpeng.exe
  • msseces.exe
  • opera.exe
  • procexp.exe
  • regedit.exe
  • safari.exe
  • taskmgr.exe

Please enable Javascript to ensure correct displaying of this content and refresh this page.