Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Swisyn.algm
Date discovered:10/09/2010
Type:Worm
In the wild:Yes
Reported Infections:Medium to high
Distribution Potential:High
Damage Potential:Medium to high
Static file:Yes
File size:290.816 Bytes
MD5 checksum:2bde56d8fb2df4438192fb46cd0Cc9c9
IVDF version:7.10.11.124 - Friday, September 10, 2010

 General Methods of propagation:
   • Autorun feature
   • Email


Aliases:
   •  Symantec: W32.Imsolk.B@mm
   •  Mcafee: W32/VBMania@MM
   •  Kaspersky: Trojan.Win32.Swisyn.algm
   •  TrendMicro: WORM_MEYLME.B
   •  F-Secure: Worm:W32/VB.MDY
   •  Sophos: W32/Autorun-BHO
   •  Bitdefender: Trojan.Downloader.VB.WQE
   •  Microsoft: Worm:Win32/Visal.B
   •  Panda: Trj/CI.A
   •  PCTools: Email-Worm.Imsolk
   •  Eset: Win32/Visal.A
   •  GData: Trojan.Downloader.VB.WQE
   •  AhnLab: Trojan/Win32.Swisyn
   •  Authentium: W32/VB.CRJ
   •  DrWeb: WIN.WORM.Virus
   •  Ikarus: Trojan.Win32.Swisyn


Platforms / OS:
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Lowers security settings
   • Disable security applications
   • Downloads malicious files
   • Registry modification

 Files It copies itself to the following locations:
   • %WINDIR%\csrss.exe
   • %SYSDIR%\updates.exe



It deletes the initially executed copy of itself.




It tries to download some files:

– The location is the following:
   • http://**********/tryme.iq
It is saved on the local hard drive under: %WINDIR%\tryme.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/ff.iq
It is saved on the local hard drive under: %WINDIR%\ff.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/gc.iq
It is saved on the local hard drive under: %WINDIR%\gc.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/ie.iq
It is saved on the local hard drive under: %WINDIR%\ie.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/im.iq
It is saved on the local hard drive under: %WINDIR%\im.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/op.iq
It is saved on the local hard drive under: %WINDIR%\op.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/m.iq
It is saved on the local hard drive under: %WINDIR%\m.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/rd.iq
It is saved on the local hard drive under: %WINDIR%\rd.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/pspv.iq
It is saved on the local hard drive under: %WINDIR%\pspv.iq At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/SendEmail.iq
It is saved on the local hard drive under: %WINDIR%\SendEmail.ip At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********/hst.iq
It is saved on the local hard drive under: %WINDIR%\hst.ip It uses this content to modify the hosts file.

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Shell"="Explorer.exe %WINDIR%\csrss.exe"



The following registry keys are changed:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
   New value:
   • "EnableLUA"=dword:00000000
   • "PromptOnSecureDesktop"=dword:00000000
   • "EnableVirtualization"=dword:00000000

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\avp.com]
   Old value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\avp.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\avguard.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\avgupsvc.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\avnotify.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\system.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\drwebwcl.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\drwreg.exe]
   New value:
   • "Debugger"="%WINDIR%\csrss.exe"

 Email It uses the Messaging Application Programming Interface (MAPI) in order to send emails. The characteristics are further described:


To:
– Email addresses gathered from WAB (Windows Address Book)


Subject:
The following:
   • Here you have



Body:

   • Hello:
     
     This is The Document I told you about,you can find it
     Here.http://**********.multimania.co.uk/yahoophoto/PDF_Document21_025542010_pdf.scr
     
     Please check it and reply as soon as possible.



The email looks like the following:


 Process termination  Disallow run processes that contain one of the following strings in the filename:
   • USB Disk Security; AntiVir WebService; WinDefend; Avast! Antivir; AVG
      Security Toolbar Service; Panda Software Controller; wuauserv;
      McNaiAnn; aswUpdSv; avast! Mail Scanner; avast! Web Scanner;
      AntiVirService; AntiVirSchedulerService; AntiVirFirewallService; NIS;
      MSK80Service; mfefire; McNASvc; Mc0obeSv; McMPFSvc; McProxy; Mc0DS;
      mcmscsvc; mfevtp; Avgfws9; avg9wd; AVGIDSAgent; PAVFNSVR; Gwmsrv;
      PSHost; PSIMSVC; PAVSRV; PavPrSrv; PskSvcRetail; TPSrv; SfCtlCom;
      TmProxy; TMBMServer; Arrakis3; LIVESRV; VSSERV; sdAuxService;
      sdCoreService

 File details Programming language:
The malware program was written in Visual Basic.

Description inserted by Christoph Baumann on Friday, September 10, 2010
Description updated by Christoph Baumann on Monday, September 13, 2010

Back . . . .