Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:13/09/2006
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:22.176 Bytes
MD5 checksum:0097a8ae129699bc8e1b28e039599405
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Trojan.LowZones
   •  Mcafee: QLowZones-14
   •  Kaspersky: Trojan-Downloader.Win32.Agent.awf
   •  F-Secure: Trojan-Downloader.Win32.Agent.awf
   •  Sophos: Troj/Agent-DFJ
   •  VirusBuster: Trojan.DL.Agent.EMS
   •  Bitdefender: Trojan.LowZones.DH

Platforms / OS:
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Disable security applications
   • Lowers security settings
   • Registry modification
   • Steals information
   • Third party control

 Files The following file is created:

%TEMPDIR%\ Contains parameters used by the malware.

 Registry The following registry key is added:

– HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   • ":Range"="Œé"
   • "*"=dword:00000002

The following registry key is changed:

Lower security settings from Internet Explorer:
– HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Old value:
   • "CurrentLevel"=dword:00000000
   • "Flags"=dword:00000047
   • "1004"=dword:00000001
   • "1201"=dword:00000001
   New value:
   • "CurrentLevel"=dword:00010000
   • "Flags"=dword:00000043
   • "1004"=dword:00000000
   • "1201"=dword:00000000
   • "1206"=dword:00000000
   • "1806"=dword:00000000
   • "1807"=dword:00000000
   • "1808"=dword:00000000
   • "1809"=dword:00000003
   • "2000"=dword:00000000
   • "2001"=dword:00000000
   • "2004"=dword:00000000
   • "2100"=dword:00000000
   • "2101"=dword:00000001
   • "2102"=dword:00000000
   • "2200"=dword:00000000
   • "2201"=dword:00000000
   • "2300"=dword:00000001

 Process termination List of processes that are terminated:
   • msascui.exe; fsguidll.exe; fsaw.exe; fspex.exe; fsm32.exe;
      tsantispy.exe; kavpf.exe; kav.exe; dpasnt.exe; msfwsvc.exe;
      msmpsvc.exe; mpeng.exe; mscorsvw.exe; winssnotify.exe; symlcsvc.exe;
      spbbcsvc.exe; sndsrvc.exe; nscsrvce.exe; navapsvc.exe; msmsgs.exe;
      ccsetmgr.exe; ccproxy.exe; ccetvmgr.exe; ccapp.exe;
      aluschedulersvc.exe; oasclnt.exe; msksrvr.exe; mskagent.exe;
      mscifapp.exe; mpftray.exe; mpfservice.exe; mpfagent.exe; mcvsshld.exe;
      mcvsescn.exe; mcupdate.exe; mcupdmgr.exe; mctskshd.exe; mcshield.exe;
      mcdetect.exe; mcagent.exe; zlclient.exe; vsmon.exe;
      webrootdesktopfirewall.exe; wdfdataservice.exe; ssu.exe;
      spysweeperui.exe; spysweeper.exe; firewallntservice.exe; vrmonsvc.exe;
      vrmonnt.exe; vrfwsvc.exe; hsockpe.exe; wmiprvse.exe; mxtask.exe;
      swdoctor.exe; sdhelp.exe; vir.exe; webproxy.exe; tpsrv.exe;
      srvload.exe; pskmssvc.exe; psimsvc.exe; pnmsrv.exe; pavsrv51.exe;
      pavprsrv.exe; pavfnsvr.exe; avengine.exe; avciman.exe; apvxdwin.exe;
      avp.exe; cavtray.exe; cavrid.exe; caissdt.exe; ca.exe; isafe.exe;

 Backdoor Contact server:
The following:

As a result it may send information and remote control could be provided. This is done via the HTTP GET request on a PHP script.

Remote control capabilities:
    • Download file

 Miscellaneous Mutex:
It creates the following Mutex:
   • {FA531CC1-1497-11d3-A180-3333052276C3E}

 File details Programming language:
The malware program was written in MS Visual C++.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Teodor Onisor on Wednesday, September 20, 2006
Description updated by Teodor Onisor on Wednesday, September 20, 2006

Back . . . .