For Consumer

Virus Profile: VBS/Alphae

Threat Search
Print
   
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 4/25/2003
Date Added: 6/20/2003
Origin: Unknown
Length: 34,177 Bytes
Type: Virus
Subtype: VbScript
DAT Required: 4102
Removal Instructions
   
 
 
   

Description

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

The presence of the file EuroAlph@.html.vbs and EuroAlph@.html.scr.vbs. The above registry changes.

Methods of Infection

Executing the infected VBScript.
   

Virus Characteristics

This threat is detected as W97M/Pica.worm.gen. On executing the infected VBScript, the following message will be displayed:

PLEASE DO NOT DISTRIBUTE THIS SCREENSAVER

The following registry keys will be added:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
    Run "AlphA", c:\Program Files\EuroAlph@.html.vbs
  • HKEY_LOCAL_MACHINE\Infected\With "Author",EuroAlph@
  • HKEY_LOCAL_MACHINE\Infected\With "Name" ,ALPH@
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    Run"(Default)", c:\windows\system32\EuroAlph@.html.vbs
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    Run"Alpha", wscript.exe C:\WINDOWS\SYSTEM\EuroAlph@.html.vbs %
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    Run"Soundz", c:\windows\Profiles\Euro.mp3
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    RunServices" (Default)" c:\windows\EuroAlph@.html.scr.vbs
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    RunServices "Alpha" c:\windows\temp\EuroAlph@.html.vbs
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    RunServices "JotaPeg" C:\Windows\WinStart.batvbhide
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Start Page"
    http:\\www.angelfire.com\empire\2013\ergot.html
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
    "RegisteredOrganization", MOUSE
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
    "RegisteredOwner", Alph@
The virus will then copy itself as EuroAlph@.html.vbs into the following directories:
  • C:\
  • c:\Program Files
  • c:\windows\system32
  • c:\windows\temp
  • c:\windows\system
  • c:\my documents
  • c:\windows\desktop
  • c:\WINDOWS\Start Menu\Programs\StartUp
  • c:\windows\EuroAlph@.html.scr.vbs
The file !EURO!$!!!!!!!!!ALPHA!!!!!!!!!!.txt will be created in the following directories:
  • c:\
  • c:\windows\desktop
  • c:\my documents
The file is then displayed:

VBS/Alphae will also infect c:\mirc\script.ini to send itself through mIRC. This file is detected as IRC/Generic. The virus also attempts to email itself using Outlook to all in addresslist with the following information:

  • Subject: One Year Later>WTC
  • Body: World Trade Center>ScreenSaverMemoirs
  • Attachment: EuroAlph@.html.scr.vbs
Spreading through Outlook was not observed during testing in the VirusLab.

The virus will drop SystemCal.exe in the windows directory. This file is detected as Wobbling joke application.

On the 1st, 5th, 9th, 13th, 15th, 22nd or 31st of any month, the virus will display the following picture:

On the 1st of any month the following registry keys will be added:
  • "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    RegisteredOwner" "(MOTHERFUCKER)"
  • "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    RegisteredOrganization "EuroAlph@"
  • HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoClose,"1"
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Winlogon\
    DefaultPassword","alpha"
  • HKEY_USERS\.DEFAULT\Control Panel\Desktop\ScreenSaveUsePassword","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoInternetIcon,"1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoControlPanel","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoSMMyDocs","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoSMHelp","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoFavoritesMenu","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoRecentDocsMenu","1"
  • HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\
    Restrictions\NoBrowserClose","1"
  • HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\
    Restrictions\NoBrowserOptions","1"
  • HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\
    Restrictions\NoBrowserSaveAs","1"
  • HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\
    Restrictions\NoFileMenu","1"
  • HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\
    Restrictions\NoTheaterMode","1"
  • HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\
    Restrictions\NoBrowserContextMenu","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoSetFolders","1"
  • HKEY_LOCAL_MACHINE\Network\Logon\Username","EURO"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoNetHood","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\Clearrecentdocsonexit","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoDesktop","1"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
    Explorer\NoClose","1"
And executes the file SystemCal.exe.

If day is 25th of any month, the virus will create the file c:\Windows\WinStart.bat which is detected as Smog trojan, and the picture c:\ALPHA.JPG. The virus will edit the registry to display alpha.jpg as desktop wallpaper. The following registry keys will be modified:

  • HKEY_CURRENT_USER\Control Panel\Desktop "TileWallpaper", 1
  • HKEY_CURRENT_USER\Control Panel\Desktop "wallpaper",C:\AlphA.jpg
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\General
    "BackupWallpaper", C:\AlphA.jpg
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\General
    "Wallpaper" ,C:\AlphA.jpg

The following message will be displayed:

   
Use current engine and DAT files for detection and removal.

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

Additional Windows ME/XP removal considerations

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.