Home / malwarePDF  

Win32.Bagle.BJ@mm


First posted on 21 November 2011.
Source: BitDefender

Aliases :

Win32.Bagle.BJ@mm is also known as Email-Worm.Win32.Bagle.bj, (Kaspersky.

Explanation :

With signatures before 17 april 2005, the virus was detected as BehavesLike:Win32.SiteHijack because it disables the victim's computer to go to certain antivirus sites.

The virus arrives by mail, with various subjects and attachment names. The spreading was done manually, not by the worm itself.

When ran, the worm opens a notepad windows with the text: "Sorry." and drops two files in the Windows/System32 directory:

WINSHOST.EXE
WIWSHOST.EXE

The first file (WINSHOST.EXE) makes EXPLORER.EXE to load the second file (WIWSHOST.EXE) by creating a new thread in its address space. That is, the legitimate EXPLORER.EXE loads the infected file in memory and runs it, so you will not see any of the worm executables in task manager.

To run at each Windows session, the worm sets the following key:

Software\Microsoft\Windows\CurrentVersion\Run\"winshost.exe" = "%SYSTEMDIR%\winshost.exe"

in both HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER. (%SYSTEMDIR% is the Windows/System32 directory)

Some antivirus web sites are prevented from loading, by overwriting the Windows/System32/Drivers/Etc/hosts file resolving domain names as 127.0.0.1 (localhost). You can however access them by using their IP addresses instead of domain names.

The worm also deletes or renames antivirus/firewall registry keys and files, so as to disable their protection. For instance, the worm renames the file ZONEALARM.EXE to ZO3NEALARM.EXE and so disabled at system restart.

Also some antivirus/firewall process are terminated, as most of worms do.

The worm tries to update itself by trying to download the file OSA.GIF from certain web sites and save it to Windows directory under the name: ILE.EXE and execute it.

Last update 21 November 2011

 

TOP