TROJ_VB.JOX
Windows 98, ME, NT, 2000, XP, Server 2003
Threat Type:
Destructiveness: No
Encrypted:
In the wild: Yes
TECHNICAL DETAILS
237568 bytes
Yes
17 Dec 2009
Other System Modifications
This Trojan adds the following registry keys:
Other Details
This Trojan adds the following lines or registry entries as part of its routine:
SOLUTION
Step 1
Terminate the malware/grayware/spyware process:
Step 2
Delete this registry value
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer"s registry.
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}
- (Default)=Microsoft WinSock Control, version 6.0
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32
- (Default)=%System%\MSWINSCK.OCX
- ThreadingModel=Apartment
- HKEY_CLASSES_ROOT\MSWinsock.Winsock
- (Default)=Microsoft WinSock Control, version 6.0
- HKEY_CLASSES_ROOT\MSWinsock.Winsock\CurVer
- (Default)=MSWinsock.Winsock.1
- HKEY_CLASSES_ROOT\MSWinsock.Winsock.1
- (Default)=Microsoft WinSock Control, version 6.0
- HKEY_CLASSES_ROOT\MSWinsock.Winsock.1\CLSID
- (Default)={248DD896-BB45-11CF-9ABC-0080C7E7B78D}
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID
- (Default)=MSWinsock.Winsock
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID
- (Default)=MSWinsock.Winsock.1
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
- (Default)={248DD890-BB45-11CF-9ABC-0080C7E7B78D}
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus
- (Default)=0
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1
- (Default)=132497
- HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32
- (Default)=%System%\MSWINSCK.OCX, 1
- HKEY_CLASSES_ROOT\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}
- (Default)=Winsock General Property Page Object
- HKEY_CLASSES_ROOT\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32
- (Default)=%System%\MSWINSCK.OCX
- HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0
- (Default)=Microsoft Winsock Control 6.0
- HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS
- (Default)=2
- HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\win32
- (Default)=%System%\MSWINSCK.OCX
- HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR
- (Default)=
- HKEY_CLASSES_ROOT\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}
- (Default)=IMSWinsockControl
- HKEY_CLASSES_ROOT\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid
- (Default)={00020424-0000-0000-C000-000000000046}
- HKEY_CLASSES_ROOT\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32
- (Default)={00020424-0000-0000-C000-000000000046}
- HKEY_CLASSES_ROOT\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
- (Default)={248DD890-BB45-11CF-9ABC-0080C7E7B78D}
- Version=1.0
- HKEY_CLASSES_ROOT\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}
- (Default)=DMSWinsockControlEvents
- HKEY_CLASSES_ROOT\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid
- (Default)={00020420-0000-0000-C000-000000000046}
- HKEY_CLASSES_ROOT\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32
- (Default)={00020420-0000-0000-C000-000000000046}
- HKEY_CLASSES_ROOT\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
- (Default)={248DD890-BB45-11CF-9ABC-0080C7E7B78D}
- Version=1.0
- HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\Explorer\Advanced\Folder\Hidden\NOHIDORSYS
- CheckedValue=0
- HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Internet Explorer\Main
- Use FormSuggest=yes
- HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\Internet Explorer\Main
- Use FormSuggest=yes
Step 3
Restore this modified registry value
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer"s registry.
- HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\Windows
- From: load=%Fonts%\services.exe
+ To: load=
- From: load=%Fonts%\services.exe
- HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\Explorer\Advanced\Folder\Hidden\SHOWALL
- From: CheckedValue=0
+ To: CheckedValue=1
- From: CheckedValue=0
- HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\Internet Settings\Zones\3
- From: 1601=0
+ To: 1601=1
- From: 1601=0
Step 4
Scan your computer with your Trend Micro product to delete files detected as
TROJ_VB.JOX
*Note: If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.