Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Winlock.JQ
Date discovered:28/01/2013
Type:Trojan
In the wild:Yes
Reported Infections:Medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:53.248 Bytes
MD5 checksum:9ED81996C4B43445E871F22FBFB8FE4A
VDF version:7.11.59.00 - Tuesday, January 29, 2013
IVDF version:7.11.59.00 - Tuesday, January 29, 2013

 General Method of propagation:
   • By visiting infected websites


Aliases:
   •  Sophos: Mal/EncPk-AGD
   •  Bitdefender: Trojan.Generic.KDV.841110
   •  Microsoft: Trojan:Win32/Tobfy.G
   •  AVG: Agent.7.BZ
   •  Panda: Trj/Dtcontx.A
   •  Eset: Win32/LockScreen.ANX
   •  DrWeb: Trojan.Winlock.7431


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Downloads files
   • Lowers security settings
   • Registry modification


Right after execution the following information is displayed:


 Files It tries to download some files:

– The location is the following:
   • orga**********s.php
It is saved on the local hard drive under: %temporary internet files%\Content.IE5\I1EFMT07\tds[1].htm

– The location is the following:
   • orga**********ry.js
It is saved on the local hard drive under: %temporary internet files%\Content.IE5\89ATUD5F\jquery[1].js

– The location is the following:
   • orga**********ook.otf
It is saved on the local hard drive under: %temporary internet files%\Content.IE5\PH912CMN\PFBeauSansPro-Bbook[1].otf

– The location is the following:
   • orga**********e.css
It is saved on the local hard drive under: %temporary internet files%\Content.IE5\89ATUD5F\style[1].css

– The location is the following:
   • orga**********old.otf
It is saved on the local hard drive under: %temporary internet files%\Content.IE5\PH912CMN\PFBeauSansPro-Bold[1].otf

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "sv\0x00F1h\0x00EEst"="%system drive root%\%random%\%random character string%.exe"



The following registry key including all values and subkeys is removed:
   • [HKLM\SYSTEM\ControlSet001\Control\SafeBoot]



The following registry keys are added:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
   Associations]
   • "LowRiskFileTypes"=".exe;"

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
   Attachments]
   • "SaveZoneInformation"=dword:00000001

Description inserted by Eric Burk on Thursday, January 31, 2013
Description updated by Alexander Vukcevic on Friday, February 1, 2013

Back . . . .