病毒行为:
1、自制自身到%System%\explorer.exe
释放文件%System%\netsrv.dll
2、试图注入netsrv.dll系统进程,监控发送到消息队列的消息。
3、生成配置文件%System%\BOLE.INI和%System%\WIN.INI
并根据配置文件下载以下文件:
http://iii.*****.com/wm/1.exe (20,268 字节)
http://iii.*****.com/wm/2.exe (19,583 字节)
http://iii.*****.com/wm/3.exe (18,336 字节)
http://iii.*****.com/wm/4.exe (19,213 字节)
http://iii.*****.com/wm/5.exe (12,208 字节)
http://iii.*****.com/wm/6.exe (12,708 字节)
http://iii.*****.com/wm/7.exe (17,268 字节)
http://iii.*****.com/wm/8.exe (12,568 字节)
http://iii.*****.com/wm/9.exe (15,288 字节)
http://iii.*****.com/wm/10.exe (20,268 字节)
http://iii.*****.com/wm/11.exe (12,184 字节)
http://iii.*****.com/wm/12.exe (17,963 字节)
http://iii.*****.com/wm/13.exe (12,668 字节)
http://iii.*****.com/wm/14.exe (17,436 字节)
http://iii.*****.com/wm/15.exe (18,373 字节)
http://iii.*****.com/wm/16.exe (17,519 字节)
http://iii.*****.com/wm/17.exe (18,829 字节)
http://iii.*****.com/wm/18.exe (17,914 字节)
http://iii.*****.com/wm/19.exe (20,015 字节)
http://iii.*****.com/wm/20.exe (18,483 字节)
http://iii.*****.com/wm/21.exe (11,736 字节)
http://iii.*****.com/wm/22.exe (11,889 字节)
http://iii.*****.com/wm/23.exe (13,192 字节)
http://iii.*****.com/wm/24.exe (12,335 字节)
http://iii.*****.com/wm/25.exe (12,964 字节)
http://iii.*****.com/wm/26.exe (18,280 字节)
http://iii.*****.com/wm/27.exe (20,332 字节)
http://iii.*****.com/wm/28.exe (33,897 字节)
http://iii.*****.com/wm/29.exe (78,919 字节)
4、以上文件运行添加以下启动项,如图:
[/td][/tr][tr][td=1,4,4%]注: %System% 是一个可变路径,在windows95/98/me中该变量是指%Windir%\System,在WindowsNT/2000/XP/2003/VISTA中该变
量指%Windir%\System32。其它:
%SystemDrive% 系统安装的磁盘分区
%SystemRoot% = %Windir% WINDODWS系统目录
%ProgramFiles% 应用程序默认安装目录
%AppData% 应用程序数据目录
%CommonProgramFiles% 公用文件目录
%HomePath% 当前活动用户目录
%Temp% =%Tmp% 当前活动用户临时目录
%DriveLetter% 逻辑驱动器分区
%HomeDrive% 当前用户系统所在分区