VBS/Zync

This page shows details and results of our analysis on the malware VBS/Zync

Overview

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.


Minimum Engine

5600.1067

File Length

6,446 Bytes

Description Added

2003-08-06

Description Modified

2003-08-07

Malware Proliferation

Characteristics

This threat is detected as VBS/Zync. When the infected VBScript is executed, the virus will copy itself as the following:

  • [windows SYSTEM directory]\Ddhelp.dll.vbs
  • [windows directory]\Win32.dll.vbs
  • [windows directory]\Application Data\Microsoft\Internet Explorer\
    Quick Launch\Silent Night.vbs
The virus will create the file c:\Backup.bat, which will display the message Silent Nights, Lonely Nights.. This file is detected as VBS/Zync.

The following registry keys will be added:

  • HKCU\Control Panel\Desktop\ScreenSaveUsePassword, 1, "REG_DWORD"
  • HKCU\Control Panel\Desktop\ScreenSaveTimeOut, 9999
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\Gue CreW\, ""
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\Gue CreW\DisplayName, "NightLife"
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\Gue CreW\UninstallString, dirw1&"\nLifeUninstall.dll"

On the 1, 5, 10, 13, 15, 20 or 25th day of any month, the following registry keys will be added:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    Version, "Silent Nights 2001"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    RegisteredOwner, "(iN)Zync"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    RegisteredOrganization, "GueSS CreW"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    URL\DefaultPrefix, "GueSSCreW://"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    URL\Prefixes\ftp", "GueSSCreWFTP://"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    URL\Prefixes\www", "GueSSCreW://"
On the 13th day of any month, the following registry keys will be added:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    Version, "04G3 2001"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    RegisteredOwner, "04G3^G"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    RegisteredOrganization, "Gue CreW"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    ProductKey, "043"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    ProductId, "NightLife is the only life i know"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    ProductName, "Windows 256 - GueSS Edition"
The following message will be displayed:

Symptoms

The above registry changes, files present and message displayed.

Method of Infection

Executing the infected VBScript.

Removal

Use current engine and DAT files for detection and removal.

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

Additional Windows ME/XP removal considerations

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.

Variants