Changes made to WinXP/SP0 _directly_ after running I-Worm.Torvil.d:
Only valid/interesting things mentioned
• Files added:
C:\WINDOWS\SMSStv.exe
C:\WINDOWS\svchost.exe
• CHANGES MADE TO C:\WINDOWS\SYSTEM.INI...
KEYS CHANGED IN C:\WINDOWS\SYSTEM.INI: (1)
[boot]shell=Explorer.exe to Explorer.exe SMSStv.exe
• CHANGES MADE TO C:\WINDOWS\WIN.INI...
KEYS CHANGED IN C:\WINDOWS\WIN.INI: (1)
[Winlogon]Shell=Explorer.exe to Explorer.exe SMSStv.exe
• REGISTRY KEYS ADDED:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TORVIL
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TORVIL\Enum
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TORVIL\Security
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TORVIL
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TORVIL\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TORVIL\Security
• REGISTRY KEY VALUES CHANGED:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\open\command
Value "@": from ""%1" %*" to "C:\WINDOWS\svchost.exe "%1" %*"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command
Value "@": from ""%1" %*" to "C:\WINDOWS\svchost.exe "%1" %*"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\comfile\shell\open\command
Value "@": from ""%1" %*" to "C:\WINDOWS\svchost.exe "%1" %*"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command
Value "@": from ""%1" %*" to "C:\WINDOWS\svchost.exe "%1" %*"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\piffile\shell\open\command
Value "@": from ""%1" %*" to "C:\WINDOWS\svchost.exe "%1" %*"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\scrfile\shell\open\command
Value "@": from ""%1" /S" to "C:\WINDOWS\svchost.exe "%1" /S"
• REGISTRY KEY VALUES ADDED:
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden="0"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools="1"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden="0"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools="1"
HKEY_USERS\S-1-5-21-515967899-1275210071-839522115-500\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools="1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\OneLevelDeeper\TorvilDB\TORVIL="SMSStv.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service Host="C:\WINDOWS\SMSStv.exe"
• C:\WINDOWS\message.dat Packed MIME.Broken
C:\WINDOWS\message.dat Packed ASPack
C:\WINDOWS\message.dat Infected I-Worm.Torvil.d
C:\WINDOWS\message.htm Infected TrojanDropper.JS.Mimail.b
C:\WINDOWS\msg.zip Archive ZIP
C:\WINDOWS\msg.zip/message.htm Infected TrojanDropper.JS.Mimail.b
C:\WINDOWS\SMSStv.exe Packed ASPack
C:\WINDOWS\SMSStv.exe Infected I-Worm.Torvil.d
C:\WINDOWS\svchost.exe Packed ASPack
C:\WINDOWS\svchost.exe Infected I-Worm.Torvil.d
* Other copies of malware sample not listed *
Will copy itself as being certain crack/keygen for certain programs
• Removal after just only having discovered the worm:
Run clrav util with /s switch -
ftp://ftp.kaspersky.ru/utils/clrav/clrav.com - in safemode
Running clrav with /s switch: use command prompt
- for example: "c:\clrav.com /s" when having saved clrav.com to "c:\"
Reboot
Remove possible leftover traces in the registry
Important note: Make sure to do a _full_ system scan with an updated AV even after having run clrav util.
• Removal/recovery of system after having removed exefiles and not being able to run certain filetypes:
Download clrav util:
ftp://ftp.kaspersky.ru/utils/clrav/clrav.com
Make a copy of clrav.com
- rename it to svchost.exe
- place it in "C:\WINDOWS" ( %windowsdir% )
Boot into safemode
Run clrav program - clrav will start when any file of given filetype will try to be run.
After first run, run it again, with /s switch
- use command prompt
-for example: "c:\clrav.com /s" when having saved clrav.com to "c:\"
Reboot
Remove possible leftover traces in the registry
Important note: Make sure to do a _full_ system scan with an updated AV even after having run clrav util.