W32/Zaflen.a

Profile

Risk Assessment
- Home Users: Low
- Corporate Users: Low
Date Discovered: 6/15/2007
Date Added: 6/15/2007
Origin: N/A
Length: 1,72,032 bytes
Type: Virus
SubType: Win32
DAT Required: 5054

Virus Characteristics

When this malware is executed, it creates the following folders.

  • %My Documents%\Rated R Pictures
  • %Windir%\gorgle
  • %Windir%\setup

This malware creates multiple copies of itself in several locations. Some of these are,

  • c:\CoolWorld.exe
  • c:\Documents and Settings\All Users\Desktop\Microsoft Word Document.scr
  • c:\Documents and Settings\All Users\Start Menu\New Microsoft Word Document.scr
  • c:\Documents and Settings\All Users\Start Menu\Programs\Microsoft Word Document.scr
  • c:\Documents and Settings\All Users\Start Menu\Programs\Startup\folderwiz.com
  • %userprofile%\My Documents\My Picture.com
  • %userprofile%\My Documents\Rated R Pictures.com
  • %userprofile%\My Documents\My Pictures\mskernel.exe
  • %userprofile%\NetHood\Hot Picture.com
  • %userprofile%\PrintHood\Printing Information.com
  • %userprofile%\SendTo\Image Editor.com
  • %userprofile%\Start Menu\Image Viewer.com
  • c:\Program Files\phil.constitution.scr
  • c:\WINDOWS\agila.scr
  • c:\WINDOWS\AutoRun.ini
  • c:\WINDOWS\lsass.exe
  • c:\WINDOWS\services.exe
  • c:\WINDOWS\gorgle\csrss.exe
  • c:\WINDOWS\setup\mskernel.exe
  • c:\WINDOWS\system32\mskernel.exe

It copies itself into multiple drives in the system.

It also creates the following file, for executing the malware when the drive is accessed.

  • C:\autorun.inf

This malware then searches for and infects the files with the following extensions

  • doc
  • rtf
  • jpg
  • gif
  • png

It infects the above files by prepending itself to these files.
It changes the icon of the infected files to M.S.Word icon and the extension to scr or exe.
It also appends 35 bytes to the end of file along with the extension of the original file.

This malware adds the follwing registry entries for loading at system startup

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "WinRun" Data - C:\WINDOWS\AutoRun.ini
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "(Default)" Data - \WINDOWS\lsass.exe

It adds the following registry entries to disable Run, folder options and to hide the file extensions.

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer "NoFolderOptions"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer "NoRun"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer "Run"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideFileExt "CheckedValue"

It also adds/modifies certain other registry entries for its functioning.

This malware also drops the file "email32.vbs" into the Windows directory, which is a mass mailer component detected as W32/PetTick.vbs.
This is used to send out copies of the file infector via e-mail using harvested e-mail addresses from the system.

Indications of Infection

Changing of the file icon for the file types - png, jpg, gif to M.S.Word icon.

Increase in file size by 172067 bytes for the infected files.

Presence of the files and registry entries mentioned.

Method of Infection

This parasitic file infector spreads by copying itself to multiple locations and to different drives in the system.
It also spreads by using the mass mailing component detected as W32/PetTick.vbs.
The files get infected when the user executes the malware which is disguised as being an M.S.Word document.

Removal Instructions

A combination of the latest DATs and the Engine will be able to detect and remove this threat. AVERT recommends users not to trust seemingly familiar or safe file icons, particularly when received via P2P clients, IRC, email or other media where users can share files.

Additional Windows ME/XP removal considerations