Analysis by: Jemimah Mae Molina

ALIASES:

Trojan.Win32.Zonidel.dbn (KASPERSKY); Worm.Win32.Phorpiex (IKARUS)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Worm

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Infection Channel: Dropped by other malware, Downloaded from the Internet, Via email

This Worm arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It deletes the initially executed copy of itself.

  TECHNICAL DETAILS

File Size: 30,208 bytes
File Type: EXE
Memory Resident: Yes
Initial Samples Received Date: 11 Jun 2018
Payload: Creates entries to bypass firewall, Deletes initial copy of itself

Arrival Details

This Worm arrives as attachment to mass-mailed email messages.

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Worm drops and executes the following files:

  • %Windows%\T-26207508265082650820840\windrv.exe

(Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.)

It creates the following folders:

  • %Windows%\T-26207508265082650820840

(Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.)

It adds the following mutexes to ensure that only one of its copies runs at any one time:

  • [::::_TMLR_::::]

It terminates the execution of the copy it initially executed and executes the copy it drops instead.

Autostart Technique

This Worm adds the following registry entries to enable its automatic execution at every system startup:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
Microsoft Windows Driver = %Windows%\T-26207508265082650820840\windrv.exe

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
Microsoft Windows Driver = %Windows%\T-26207508265082650820840\windrv.exe

Other System Modifications

This Worm creates the following registry entry(ies) to bypass Windows Firewall:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications\
List
%Windows%\T-26207508265082650820840\windrv.exe:*:Enabled:Microsoft Windows Driver = %Windows%\T-26207508265082650820840\windrv.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows Defender
DisableAntiSpyware = 1

Other Details

This Worm deletes the initially executed copy of itself

NOTES:
This worm sends email messages containing a copy of itself as an attachment. This worm queries the following mail server to harvest email addresses:

  • aol.com
The email it sends out has the following characteristics:
  • Uses any of the following strings as subject:
    • Photo
    • Picture
    • My photo
    • My picture
    • Your photo
    • Your picture
    • Our photo
    • Our picture
    • Is this you?
    • Have you seen this photo?
    • Best picture
    • You should take a look
    • Do you know her?
    • Take a look at my new picture please
    • Rate my new photo please
    • My new photo just for you!
    • Keep them private
    • Don't show anyone!
    • She is hot right?
    • What you think about her new picture
    • Lol.. look at her new photo!
    • LOL seen this photo?
    • WOW the best picture!
    • Don't share this one!
    • Just for you!
    • My love for you
    • Please rate my picture
    • Is she hot? Take a look at her
    • Damn I can't get her out my head
    • Someone told me it's you???
    • Keep it secret!
    • Your opinion needed
    • What is your opinion about this?
    • Trumps private photo leaked!
    • Is this good enough for facebook?
    • They will like it?
    • I'm about to post this on facebook
    • Look what has happened last weekend
    • The last party was hardcore
    • How drunk I was last night?
    • And I was really that drunk???
    • WTF is this?! Explain?!
    • Why you took that picture?!
    • I'm about to publish your photo
    • Best photo
    • Best piture
    • My best photo
    • My best picture
    • Your best photo
    • Your best picture
    • Keep this photo private please
    • Please keep this picture private
    • My newest picture
    • I think that's your best photo
    • How can she be so hot???
    • Unbelivable photo
    • My top photo
    • Photo of the party last night
    • Your scan wasn't approved
    • The scan quality is poor
    • Your scan has been approved!
    • The ugliest person in the world?
    • Photo of my new girlfriend
    • Photo of my new boyfriend
    • Rate the new photo of my gf
    • Rate the photo of my new bf
    • In love after seeing your photo
    • Why you shoot photos like that??
    • Next time don't forget about this photo
    • I took this photo of you
    • I took this photo of us
    • I took this photo of your mother
    • You will be shoked!
    • My new look!
    • Time for a change
    • My new hair
    • I think she is clearly retarded
    • Why would someone take such photos?
    • Not even good enough for facebook?Can't be more ugly than that?
    • Ugly as f*!
    • Will you be mad if I upload this?
    • Someone takes photos from you
    • Took photo of you
    • Why you look so ugly here...
    • How you just look so good here?
    • I simply love this photo of you!
    • I love you
    • Took photo just for you
    • You are my new love
    • My new love
    • Check out this photo I took for you!
    • Take a look!
    • Explain this!
    • Why the f* you took such photo?!
  • Uses any of the following strings as first name:
    • Adolfo
    • Adolph
    • Adrian
    • Adrian
    • Adriana
    • Adrienne
    • Agnes
    • Agustin
    • Ahmad
    • Ahmed
    • Aida
    • Aileen
    • Aimee
    • Aisha
    • Beulah
    • Beverley
    • Beverly
    • Bianca
    • Bill
    • Billie
    • Billie
    • Billy
    • Blaine
    • Blair
    • Blake
    • Blanca
    • Blanche
    • Bobbi
    • Bobbie
    • Bobby
    • Bonita
    • Bonnie
    • Booker
    • Boris
    • Boyd
    • Brad
    • Bradford
    • Bradley
    • Bradly
    • Brady
    • Deann
    • Deanna
    • Deanne
    • Debbie
    • Debora
    • Deborah
    • Debra
    • Deena
    • Deidre
    • Deirdre
    • Delbert
    • Delia
    • Gilda
    • Gina
    • Ginger
    • Gino
    • Giovanni
    • Gladys
    • Glen
    • Glenda
    • Glenn
    • Glenna
    • Gloria
    • Goldie
    • Gonzalo
    • Gordon
    • Hugh
    • Hugo
    • Humberto
    • Hung
    • Hunter
    • Ignacio
    • Ilene
    • Imelda
    • Imogene
    • Ines
    • Tania
    • Tanisha
    • Tanner
    • Tanya
    • Tara
    • Tasha
    • Taylor
    • Taylor
    • Teddy
    • Terence
    • Teresa
    • Teri
    • Terra
  • Uses any of the following strings as last name:
    • Bailey
    • Rivera
    • Cooper
    • Richardson
    • Howard
    • Ward
    • Torres
    • Peterson
    • Gray
    • Ramirez
    • James
    • Baker
    • Gonzalez
    • Nelson
    • Carter
    • Mitchell
    • Perez
    • Roberts
    • Turner
    • Phillips
    • Campbell
    • Parker
    • Evans
    • Edwards
    • Collins
    • Stewart
    • Sanchez
    • Morris
    • Rogers
    • Reed
    • Cook
    • Morgan
    • Bell
    • Murphy
    • Jackson
    • White
    • Harris
    • Martin
    • Thompson
    • Garcia
    • Martinez
    • Robinson
    • Clark
    • Rodriguez
    • Lewis
    • Walker
    • Hall
    • Allen
    • Young
    • Hernandez
    • King
    • Wright
    • Lopez
    • Hill
    • Scott
    • Green
    • Adams
    • Smith
    • Johnson
    • Williams
    • Jones
    • Brown
    • Davis
    • Miller
    • Wilson
    • Moore
    • Taylor
    • Anderson
    • Thomas
    • Watson
    • Brooks
    • Kelly
    • Sanders
    • Price
    • Bennett
    • Wood
    • Barnes
    • Ross
    • Henderson
    • Coleman
    • Jenkins
  • Uses the following as attachment file name:
    • {random numbers}.zip

  SOLUTION

Minimum Scan Engine: 9.850
FIRST VSAPI PATTERN FILE: 14.850.01
FIRST VSAPI PATTERN DATE: 04 Mar 2019
VSAPI OPR PATTERN File: 14.851.00
VSAPI OPR PATTERN Date: 05 Mar 2019

Step 1

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 2

Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.

Step 3

Identify and terminate files detected as Worm.Win32.PHORPIEX.AZ

[ Learn More ]
  1. Windows Task Manager may not display all running processes. In this case, please use a third-party process viewer, preferably Process Explorer, to terminate the malware/grayware/spyware file. You may download the said tool here.
  2. If the detected file is displayed in either Windows Task Manager or Process Explorer but you cannot delete it, restart your computer in safe mode. To do this, refer to this link for the complete steps.
  3. If the detected file is not displayed in either Windows Task Manager or Process Explorer, continue doing the next steps.

Step 4

Delete this registry value

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.

  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    • Microsoft Windows Driver = %Windows%\T-26207508265082650820840\windrv.exe
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    • Microsoft Windows Driver = %Windows%\T-26207508265082650820840\windrv.exe
  • In HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
    • %Windows%\T-26207508265082650820840\windrv.exe:*:Enabled:Microsoft Windows Driver = %Windows%\T-26207508265082650820840\windrv.exe
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
    • DisableAntiSpyware = 1

Step 5

Search and delete this file

[ Learn More ]
There may be some files that are hidden. Please make sure you check the Search Hidden Files and Folders checkbox in the "More advanced options" option to include all hidden files and folders in the search result.
  • %Windows%\T-26207508265082650820840\windrv.exe

Step 6

Scan your computer with your Trend Micro product to clean files detected as Worm.Win32.PHORPIEX.AZ. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.