Arrival Details
This worm arrives by connecting affected removable drives to a system.
It may be dropped by other malware.
Installation
This worm drops the following copies of itself into the affected system:
- %System%\{random name}.vbs
- %Windows%\{random name}.vbs
(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.. %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.)
Autostart Technique
This worm adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CLASSES_ROOT\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D}\
shell\explore\command
@ = "%System%\WScript.exe %WINDOWS%\{random name}.vbs EMC"
HKEY_CLASSES_ROOT\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D}\
shell\open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs EMC"
It modifies the following registry entry(ies) to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows NT\CurrentVersion\Windows
load = "%System%\{random name}.vbs"
(Note: The default value data of the said registry entry is blank.)
Other System Modifications
This worm modifies the following registry entries:
HKEY_CLASSES_ROOT\Applications\iexplore.exe\
shell\open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs OIE"
(Note: The default value data of the said registry entry is %Program Files%\Internet Explorer\iexplore.exe %1.)
HKEY_CLASSES_ROOT\batfile\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is %1 %*.)
HKEY_CLASSES_ROOT\chm.file\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is %WINDOWS%\hh.exe %1.)
HKEY_CLASSES_ROOT\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D}\
shell
@ = ""
(Note: The default value data of the said registry entry is .)
HKEY_CLASSES_ROOT\CLSID\ {871C5380-42A0-1069-A2EA-08002B30309D}\
shell\OpenHomePage\Command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs OIE"
(Note: The default value data of the said registry entry is %Program Files%\Internet Explorer\iexplore.exe.)
HKEY_CLASSES_ROOT\hlpfile\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is %System%\winhlp32.exe.)
HKEY_CLASSES_ROOT\inffile\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is %System%\NOTEPAD.EXE.)
HKEY_CLASSES_ROOT\inifile\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is %System%\NOTEPAD.EXE.)
HKEY_CLASSES_ROOT\regfile\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is regedit.exe %1.)
HKEY_CLASSES_ROOT\txtfile\shell\
open\command
@ = "%System%\WScript.exe %Windows%\{random name}.vbs %1 %*"
(Note: The default value data of the said registry entry is %System%\NOTEPAD.EXE.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer
NoDriveTypeAutoRun = "0"
(Note: The default value data of the said registry entry is 91.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Advanced\Folder\Hidden\
NOHIDDEN
CheckedValue = "3"
(Note: The default value data of the said registry entry is 2.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Advanced\Folder\Hidden\
SHOWALL
CheckedValue = "2"
(Note: The default value data of the said registry entry is 1.)
It deletes the following registry keys:
HKEY_CLASSES_ROOT\lnkfile
IsShortcut = ""
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
lnkfile
IsShortcut = ""
Propagation
This worm drops copies of itself in all removable and physical drives found in the system.
It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
Step 1
Restore this modified registry value
[ Learn More ]
[ back ]
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.
In HKEY_CLASSES_ROOT\Applications\iexplore.exe\
shell\open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs OIE
To: @ = %Program Files%\Internet Explorer\iexplore.exe %1
In HKEY_CLASSES_ROOT\batfile\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = %1 %*
In HKEY_CLASSES_ROOT\chm.file\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = %WINDOWS%\hh.exe %1
In HKEY_CLASSES_ROOT\CLSID\
{20D04FE0-3AEA-1069-A2D8-08002B30309D}\
shell
From: @ =
To: @ = none
In HKEY_CLASSES_ROOT\CLSID\
{871C5380-42A0-1069-A2EA-08002B30309D}\
shell\OpenHomePage\Command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs OIE
To: @ = %Program Files%\Internet Explorer\iexplore.exe
In HKEY_CLASSES_ROOT\hlpfile\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = %System%\winhlp32.exe
In HKEY_CLASSES_ROOT\inffile\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = %System%\NOTEPAD.EXE
In HKEY_CLASSES_ROOT\inifile\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = %System%\NOTEPAD.EXE
In HKEY_CLASSES_ROOT\regfile\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = regedit.exe %1
In HKEY_CLASSES_ROOT\txtfile\shell\
open\command
From: @ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %*
To: @ = %System%\NOTEPAD.EXE
In HKEY_CURRENT_USER\Software\Microsoft\
Windows NT\CurrentVersion\Windows
From: load = %System%\{random name}.vbs
To: load =
In HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer
From: NoDriveTypeAutoRun = 0
To: NoDriveTypeAutoRun = 91
In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Advanced\Folder\Hidden\
NOHIDDEN
From: CheckedValue = 3
To: CheckedValue = 2
In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Advanced\Folder\Hidden\
SHOWALL
From: CheckedValue = 2
To: CheckedValue = 1
To restore the registry value this malware/grayware/spyware modified:
- Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter.
- In the left panel, double-click the following:
HKEY_CURRENT_USER>Software>Microsoft>Windows NT>CurrentVersion>Windows - In the right panel, locate the registry value:
load = %System%\{random name}.vbs - Right-click on the value name and choose Modify. Change the value data of this entry to:
load = - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>Applications>iexplore.exe>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs OIE - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %Program Files%\Internet Explorer>iexplore.exe %1 - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>batfile>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %WINDOWS%\hh.exe %1 - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>chm.file>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %WINDOWS%\hh.exe %1 - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>CLSID>{20D04FE0-3AEA-1069-A2D8-08002B30309D}> - In the right panel, locate the registry value:
= - Right-click on the value name and choose Modify. Change the value data of this entry to:
= - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>CLSID>{871C5380-42A0-1069-A2EA-08002B30309D}> - In the right panel, locate the registry value:
= - Right-click on the value name and choose Modify. Change the value data of this entry to:
= %System%\WScript.exe %Windows%\{random name}.vbs OIE - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>hlpfile>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %System%\winhlp32.exe - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>inffile>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %System%\NOTEPAD.EXE - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>inifile>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %System%\NOTEPAD.EXE - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>regfile>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = regedit.exe %1 - In the left panel, double-click the following:
HKEY_CLASSES_ROOT>txtfile>shell>open>command - In the right panel, locate the registry value:
@ = %System%\WScript.exe %Windows%\{random name}.vbs %1 %* - Right-click on the value name and choose Modify. Change the value data of this entry to:
@ = %System%\NOTEPAD.EXE - In the left panel, double-click the following:
HKEY_CURRENT_USER>Software>Microsoft>Windows>CurrentVersion>Policies>Explorer - In the right panel, locate the registry value:
NoDriveTypeAutoRun = 0 - Right-click on the value name and choose Modify. Change the value data of this entry to:
NoDriveTypeAutoRun = 91 - In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Explorer>Advanced>Folder>Hidden>NOHIDDEN - In the right panel, locate the registry value:
CheckedValue = 3 - Right-click on the value name and choose Modify. Change the value data of this entry to:
CheckedValue = 2 - In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Explorer>Advanced>Folder>Hidden>SHOWALL - In the right panel, locate the registry value:
CheckedValue = 2 - Right-click on the value name and choose Modify. Change the value data of this entry to:
CheckedValue = 1 - Close Registry Editor.
Step 2
Scan your computer with your Trend Micro product to delete files detected as
*Note: If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.