SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  VB.CZ_9
VB.CZ_9 is a Worm. Worms are reproducing malicious programs that run independently and travel across network connections without human action. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities. The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Windows\SoftwareDistribution\Download\Windows Vista setup .scr"
  • "c:\Program Files\Windows Sidebar\Shared Gadgets\Norman virus Control 5.18 .exe"
  • "c:\Windows\ServiceProfiles\LocalService\Downloads\Windows Vista setup .scr"
  • "c:\Users\Default\Downloads\THe Best Ungu .scr"
  • "c:\ProgramData\Microsoft\Windows\Sqm\Upload\Windows Vista setup .scr"
  • "c:\Windows\System32\5165423741l.exe"
  • "c:\Windows\sa-643166.exe"
  • "c:\ProgramData\Microsoft\Network\Downloader\Norman virus Control 5.18 .exe"
  • "c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\TuxO42524Z.exe"
  • "c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sql.cmd"
  • "c:\Windows\ServiceProfiles\NetworkService\Downloads\RaHasIA .exe"
  • "c:\Windows\Ti423741ta.exe"
  • "c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\service.exe"
  • "c:\Windows\M81484\smss.exe"
  • "c:\Windows\Downloaded Program Files\New mp3 BaraT !! .exe"
  • "c:\Users\Public\Downloads\THe Best Ungu .scr"
  • "c:\Windows\M81484\EmangEloh.exe"
  • "c:\Users\Admin\Downloads\Norman virus Control 5.18 .exe"
  • "c:\Program Files\Common Files\microsoft shared\Gallery .scr"
  • "c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\winlogon.exe"
  • "c:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Windows Vista setup .scr"
  • "c:\Windows\System32\005165423741l.exe"
  • "c:\Windows\system\msvbvm60.dll"

It modifies the following additional file(s) on the system:
  • "c:\Windows\System32\X48123go\Z5165cie.cmd"
  • "c:\Windows\[TheMoonlight].txt"
  • "c:\Windows\M81484\Ja734618bLay.com"
  • "c:\Windows\System32\X48123go\Z005165cie.cmd"

    Process Related Changes
    It creates the following process(es):
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\service.exe
    • C:\Windows\M81484\smss.exe
    • C:\Windows\M81484\EmangEloh.exe
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\winlogon.exe

        Registry Related Changes
        It makes the following registry modifications to ensure infection after system reboot:
        • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\t24z165 = C:\Windows\sa-643166.exe
        • HKLM\software\microsoft\windowsnt\currentversion\winlogon\shell = explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\TuxO42524Z.exe
        • HKCU\Software\Microsoft\Windows\CurrentVersion\Run\t1814166tt4 = C:\Windows\system32\5165423741l.exe


        Relevant Information