Home / malwarePDF  

Win32.Bagle.CZ@mm


First posted on 21 November 2011.
Source: BitDefender

Aliases :

There are no other names known for Win32.Bagle.CZ@mm.

Explanation :

Win32.Bagle.CZ@mm is a downloader part of a mass mailing worm Bagle.

Usually it comes as an archive of 16,830 bytes, containing a file named "price_list.exe", with size of 35,146 bytes, with icon of a .txt file.
When runned, the worm copies itself as %WINSYS%winshost.exe, drops %WINSYS%wiwshost.exe file with size of 8,302 bytes, and injects it's code in "Explorer.exe" process.

Also the worm creates registry keys:
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,winshost.exe = "winshost.exe" ,
HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun,winshost.exe = "winshost.exe" ,
in order to be executed at startup.

Worm deletes all the entries from file "%WinSys%driversetchosts" , leaving there one single line,
127.0.0.1 localhost

It stops antivirus service processes from the list below:
wuauserv
PAVSRV
PAVFNSVR
PSIMSVC
Pavkre
PavProt
PREVSRV
PavPrSrv
SharedAccess
navapsvc
NPFMntor
Outpost Firewall
SAVScan
SBService
Symantec Core LC
ccEvtMgr
SNDSrvc
ccPwdSvc
ccSetMgr.exe
SPBBCSvc
KLBLMain
avg7alrt
avg7updsvc
vsmon
CAISafe
avpcc
fsbwsys
backweb client - 4476822
backweb client-4476822
fsdfwd
F-Secure Gatekeeper Handler Starter
FSMA
KAVMonitorService
navapsvc
NProtectService
Norton Antivirus Server
VexiraAntivirus
dvpinit
dvpapi
schscnt
BackWeb Client - 7681197
F-Secure Gatekeeper Handler Starter
FSMA
AVPCC
KAVMonitorService
Norman NJeeves
NVCScheduler
nvcoas
Norman ZANDA
PASSRV
SweepNet
SWEEPSRV.SYS
NOD32ControlCenter
NOD32Service
PCCPFW
Tmntsrv
AvxIni
XCOMM
ravmon8
SmcService
BlackICE
PersFW
McAfee Firewall
OutpostFirewall
NWService
alerter
sharedaccess
NISUM
NISSERV
vsmon
nwclnth
nwclntg
nwclnte
nwclntf
nwclntd
nwclntc
wuauserv
navapsvc
Symantec Core LC
SAVScan
kavsvc
DefWatch
Symantec AntiVirus Client
NSCTOP
Symantec Core LC
SAVScan
SAVFMSE
ccEvtMgr
navapsvc
ccSetMgr
VisNetic AntiVirus Plug-in
McShield
AlertManger
McAfeeFramework
AVExch32Service
AVUPDService
McTaskManager
Network Associates Log Service
Outbreak Manager
MCVSRte
mcupdmgr.exe
AvgServ
AvgCore
AvgFsh
awhost32
Ahnlab task Scheduler
MonSvcNT
V3MonNT
V3MonSvc
FSDFWD

It continuously checks the following registry keys and deletes them if they are present:
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,Symantec NetDriver Monitor
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,ccApp
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,NAV CfgWiz
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,SSC_UserPrompt
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,McAfee Guardian
HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun,McAfee.InstantUpdate.Monitor
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,APVXDWIN
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,KAV50
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,avg7_cc
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,avg7_emc
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun,Zone Labs Client
HKLMSOFTWARESymantec HKLMSOFTWAREMcAfee
HKLMSOFTWAREKasperskyLab
HKLMSOFTWAREAgnitum HKLMSOFTWAREPanda Software
HKLMSOFTWAREone Labs

It looks on all the hard drives on the system for files named:
CCSETMGR.EXE
CCEVTMGR.EXE
NAVAPSVC.EXE
NPFMNTOR.EXE
symlcsvc.exe
SPBBCSvc.exe
SNDSrvc.exe
ccApp.exe
ccl30.dll
ccvrtrst.dll
LUALL.EXE
AUPDATE.EXE
Luupdate.exe
LUINSDLL.DLL
RuLaunch.exe
CMGrdian.exe
Mcshield.exe
outpost.exe
Avconsol.exe
Vshwin32.exe
VsStat.exe
Avsynmgr.exe
kavmm.exe
Up2Date.exe
KAV.exe
avgcc.exe
avgemc.exe
zonealarm.exe
zatutor.exe
zlavscan.dll
zlclient.exe
isafe.exe
cafix.exe
vsvault.dll
av.dll
vetredir.dll

and marks them to be renamed at startup to:
C1CSETMGR.EXE
CC1EVTMGR.EXE
NAV1APSVC.EXE
NPFM1NTOR.EXE
s1ymlcsvc.exe
SP1BBCSvc.exe
SND1Srvc.exe
ccA1pp.exe
cc1l30.dll
ccv1rtrst.dll
LUAL1L.EXE
AUPD1ATE.EXE
Luup1date.exe
LUI1NSDLL.DLL
RuLa1unch.exe
CM1Grdian.exe
Mcsh1ield.exe
outp1ost.exe
Avc1onsol.exe
Vshw1in32.exe
Vs1Stat.exe
Av1synmgr.exe
kav12mm.exe
Up222Date.exe
K2A2V.exe
avgc3c.exe
avg23emc.exe
zonealarm.exe
zatutor.exe
zlavscan.dll
zo3nealarm.exe
zatu6tor.exe
zl5avscan.dll
zlcli6ent.exe
is5a6fe.exe
c6a5fix.exe
vs6va5ult.dll
a5v.dll
ve6tre5dir.dll

also, if it finds file named "mysuperprog.exe" it deletes it.

it stops windows firewall service and terminates the following processes:
NUPGRADE.EXE
MCUPDATE.EXE
ATUPDATER.EXE
AUPDATE.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
FIREWALL.EXE
ATUPDATER.EXE
LUALL.EXE
DRWEBUPW.EXE
AUTODOWN.EXE
NUPGRADE.EXE
OUTPOST.EXE
ICSSUPPNT.EXE
ICSUPP95.EXE
ESCANH95.EXE
AVXQUAR.EXE
ESCANHNT.EXE
UPGRADER.EXE
AVXQUAR.EXE
AVWUPD32.EXE
AVPUPD.EXE
CFIAUDIT.EXE
UPDATE.EXE

When runned for the first time the worm creates registry key
HKCUSoftwareFirstRunFirstRunRR = 1
and opens a "Notepad.exe".

In any other cases it waits until the computer is connected to the internet and then downloads the main component of the worm, decripts it, saves it as %Windir%\_re_file.exe and then run it.

Last update 21 November 2011

 

TOP