Raze

This page shows details and results of our analysis on the malware Raze

Overview

This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.


Minimum Engine

5600.1067

File Length

Description Added

2005-09-15

Description Modified

2006-01-14

Malware Proliferation

Characteristics

Detection was added to cover a 32 bit PE file having a random 8 byte hexadecimal name (Example 987AA928.exe). The file is internally compressed with the FSG Packer and is usually around 8 KB in size.

Upon execution the Trojan adds a HTML page in %windir% as index.html (also detected as Raze Trojan). The HTML page is then installed as desktop wallpaper that displays a fake warning that system is infected with spyware, keyloggers and adult content. It prompts user to download Raze AntiSpyware to protect themselves against these threats.

So this is not a true warning message upon a virus/trojan intercept, it's html page filling the complete screen having the fake message painted in it

Registry Changes

  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\Source: "%windir%\index.html"
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\SubscribedURL: "%windir%\index.html"
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\FriendlyName: "Security"
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\Flags: 0x00006002
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\Position: DATA
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\CurrentState: 0x40000001
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\OriginalStateInfo: DATA
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0\RestoredStateInfo: DATA

Symptoms

  • Presence of aformentioned file and resgitry keys
  • Fake blinking "DANGER: SPYWARE" html page as desktop wallpaper.

Method of Infection

Manual execution of the binary starts the infection, there's no exploit associated with this file.

Removal

All Users :
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

Manual Removal Instructions

To delete the Warning wallpaper, please follow these steps
  • Goto Start -> Settings -> Control Panel -> Display
  • Choose the Desktop Tab
  • Click on "Customize Desktop" button.
  • On this new window click on "Web" tab.
  • In the list of "Web Pages" delete the item named "Security" and apply the new settings by clicking ok.
  • Delete c:\windows\index.html file. ( ~2161 Bytes file)

Additional Windows ME/XP removal considerations

Variants