Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:18/05/2011
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:63.488 Bytes
MD5 checksum:65e3ebb134871266e4324a8a3f68f61e
VDF version:
IVDF version:

 General Method of propagation:
   • Autorun feature

   •  Kaspersky: Worm.Win32.AutoRun.cgqp
   •  F-Secure: Worm.Win32.AutoRun.cgqp
   •  Bitdefender: Gen:Trojan.Heur.GZ.dmW@bu5Yxpc
   •  Eset: Win32/AutoRun.Spy.Banker.G
   •  GData: Gen:Trojan.Heur.GZ.dmW@bu5Yxpc

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Drops malicious files
   • Lowers security settings
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\svrwsc.exe
   • %drive%\svrwsc.exe

It deletes the initially executed copy of itself.

It deletes the following file:
   • %TEMPDIR%\Low%random character string%.tmp.bat

The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%TEMPDIR%\Low%random character string%.tmp.bat Furthermore it gets executed after it was fully created. This batch file is used to delete a file.

It tries to execute the following file:

– Filename:
   • %SYSDIR%\cmd.exe" /c "%TEMPDIR%\Low%random character string%.tmp.bat

 Registry The following registry key is added in order to run the process after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "SvrWsc"=""

The following registry keys are added in order to load the service after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\SvrWsc]
   • "Description"="The service provides COM APIs for independent software vendors to register and record the state of their products to the Security Center service."
   • "DisplayName"="Windows Security Center Service"
   • "ErrorControl"=dword:0x00000000
   • "ImagePath"="%SYSDIR%\svrwsc.exe"
   • "ObjectName"="LocalSystem"
   • "Start"=dword:0x00000002
   • "Type"=dword:0x00000010

The following registry keys are added:

– [HKLM\Software\Microsoft\DirectX\MSB]
   • "X1"=hex:00

– [HKLM\Software\Microsoft\DirectX\MSA]
   • "X1"=hex:F7,2B,CC,01,C8,1F,70,89
   • "X2"=hex:00

 Miscellaneous Accesses internet resources:

It creates the following Mutexes:
   • PROCESS_MT_354
   • PROCESS_MI_354

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Thursday, June 16, 2011
Description updated by Petre Galan on Friday, June 17, 2011

Back . . . .