Home / malware Virus:Win32/Quervar.B
First posted on 09 August 2012.
Source: MicrosoftAliases :
There are no other names known for Virus:Win32/Quervar.B.
Explanation :
Virus:Win32/Quervar.B is a virus that infects specific Microsoft Office document files and executable files. In the wild, we have observed the virus infecting files with the following file extensions:
- .DOC
- .EXE
- .XLS
Installation
Virus:Win32/Quervar.B drops the virus body as the following:
%AppData%\<random>\<random>.exe (for example, %AppData%\KA7YQ0\A1S09G.exe)
The virus also drops a shortcut file as <dropped virus body path>.lnk, for example, %AppData%>\KA7YQ0\A1S09G.exe.lnk which points to the virus body with the following parameter:
"-launcher"
Virus:Win32/Quervar.B makes the following changes to the registry to ensure its execution each time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows
Sets value: "Load"
With data: <dropped LNK file>
It will then launch the dropped LNK file immediately.
Virus:Win32/Quervar.B creates an event "SayHellotomyLittleFriend" and an atom "BreakingBad" to make sure that only one payload is running at any given time.
Spreads via...
File infection
The virus tries to infect files with the following extensions:
- .DOC
- .EXE
- .XLS
It does this by encrypting the original file, and prepending itself before it on all drives (except unknown devices), CDROM, and drives that have a "System Volume Information" folder in the root.
An infected DOC file will be named as <original file name><unicode right-to-left mark>cod.scr, and infected XLS files will be named as <original file name><unicode right-to-left mark>slx.scr.
When the infected file runs, the original file is dropped and opened under the same directory with a random name, for example Z3NTZ8. This randomly-named file will have "hidden" and "system" attributes.
Payload
Contacts remote hosts
Virus:Win32/Quervar.B contacts remote hosts to report infection and retrieve commands; in the wild, we have observed it contacting the following server for this purpose:
hxxp://reslove-dns.com/bl/in.php
Note: At the time of analysis, this server returned empty commands.
The virus may contact a remote host for any number of purposes, commonly to:
- Update itself
- Download additional files
Terminates system processes
Virus:Win32/Quervar.B attempts to close Windows Task Manager periodically.
Analysis by Shawn Wang
Last update 09 August 2012