W32/HLLP.Philis.av

This page shows details and results of our analysis on the malware W32/HLLP.Philis.av

Overview

W32/HLLP.Philis.av is a file infecting virus. It searches for executable files on the infected machine to prepend its viral code.
It is also responsible for dropping a dll file, which downloads password stealing trojans from various websites.


Minimum DAT

4850 (2006-09-12)

Updated DAT

5200 (2008-01-04)

Minimum Engine

5400.1158

File Length

45,147

Description Added

2006-09-12

Description Modified

2006-09-13

Malware Proliferation

Characteristics

W32/HLLP.Philis.av is a file infecting virus.

On execution, it copies itself in %Windir% as rundll32.exe and adds a load registry entry to activate itself on reboot. It also creates the following registry entries:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DownloadManager
  • HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWW\auto: "1"

It drops a file named Dll.dll (detected as W32/HLLP.Philis.dll) in C:\ directory. It then injects this dll in Explorer.exe process.
This dll is responsible for capturing account information of the online game called Lineage, and also downloading a file from the following location:

  • http://lele.0451.net/gua/[removed]

The download file was detected as W32/HLLP.Philis.av virus at the time of this writing.

W32/HLLP.Philis.av searches for executable files and prepends its viral code to target files.

It adds its 45KB code in front of the original file, so whenever that file is executed the virus is also executed. The prepending virus code is written using Borland Delphi.

It tends to infect files with the following file names:

  • ACDSee4.exe
  • ACDSee5.exe
  • ACDSee6.exe
  • AgzNew.exe
  • Archlord.exe
  • AutoUpdate.exe
  • autoupdate.exe
  • BNUpdate.exe
  • Datang.exe
  • editplus.exe
  • EXCEL.EXE
  • flashget.exe
  • foxmail.exe
  • FSOnline.exe
  • GameClient.exe
  • install.exe
  • jxonline_t.exe
  • launcher.exe
  • lineage.exe
  • LineageII.exe
  • MHAutoPatch.exe
  • Mir.exe
  • msnmsgr.exe
  • Mu.exe
  • my.exe
  • NATEON.exe
  • NSStarter.exe
  • Patcher.exe
  • patchupdate.exe
  • QQ.exe
  • Ragnarok.exe
  • realplay.exe
  • run.exe
  • setup.exe
  • Silkroad.exe
  • Thunder.exe
  • ThunderShell.exe
  • TTPlayer.exe
  • Uedit32.exe
  • Winrar.exe
  • WINWORD.EXE
  • woool.exe
  • zfs.exe

The virus terminates the following processes.

  • EGHOST.EXE
  • IPARMOR.EXE
  • KAVPFW.EXE
  • MAILMON.EXE
  • mcshield.exe
  • RavMon.exe
  • RavMonClass
  • Ravmond.EXE
  • regsvc.exe

It also stops the following service.

  • Kingsoft AntiVirus Service

The virus creates files with the name "_desktop.ini" in every folder that it visits while looking for executable files to infect.
This is created as a hidden system file and contains the date on which virus was executed to visit the folder in which the file resides.

The date is shown in yyyy/mm/dd format.

The virus tries to spread via existing network shares. It searches for all active machines within the subnet. When it find an active machine it sends an ICMP ping request and waits for a response. This ping request packet contains "Hello, World" string. After getting the ping response it tries to access the ADMIN$, IPC$ and any other shares that might exist on the machine. If the virus is able to access a shared resource, it first copies "_desktop.ini" to the root of the share to mark the share as visited and then infects executables present in the share. While infecting executables via a network share the virus does not limit itself to infecting specific file names as mentioned above.
In the case of a shared printer, the viruses' infection routine effectively creates printer job to print the date as contained in "_desktop.ini" file that the virus tries to copy.

Symptoms

  • Modified executable files (change in size of exe files)
  • Presence of C:\Dll.dll
  • Presence of registry entries as described
  • Presence of hidden system files named _desktop.ini in many folders.

Method of Infection

W32/HLLP.Philis.av is a file infecting virus. Infection starts with manual execution of the binary which may rely on improperly configured/protected (open) shared drives.

Removal

All Users:

Please use the following instructions for all supported versions of Windows to remove threats and other potential risks:

1.Disable System Restore .

2.Update to current engine and DAT files for detection and removal.

3.Run a complete system scan.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

1. Please go to the Microsoft Recovery Console and restore a clean MBR.

On windows XP:

Insert the Windows XP CD into the CD-ROM drive and restart the computer.
When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
Select the Windows installation that is compromised and provide the administrator password
Issue 'fixmbr' command to restore the Master Boot Record
Follow onscreen instructions
Reset and remove the CD from CD-ROM drive.


On Windows Vista and 7:

Insert the Windows CD into the CD-ROM drive and restart the computer.
Click on "Repair Your Computer"
When the System Recovery Options dialog comes up, choose the Command Prompt.
Issue 'bootrec /fixmbr' command to restore the Master Boot Record
Follow onscreen instructions
Reset and remove the CD from CD-ROM drive.

Variants