Virus Profile: VBS/Jord.a

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 4/23/2002
Date Added: 4/24/2002
Origin: Unknown
Length: 3,666
Type: Virus
Subtype: VbScript
DAT Required: 4198
Removal Instructions


This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

The above message displayed and the list of files deleted. Also the presence of the following files in the Windows Font directory:

  • ORD.doc.vbs, ORD_photo.jpg.vbs and JERRY.vbs

Methods of Infection

Executing one of these files ORD.doc.vbs, ORD_photo.jpg.vbs or JERRY.vbs


Virus Characteristics

This threat is detected as W32/Trilisa.vbs. The virus copies itself as ORD.doc.vbs, ORD_photo.jpg.vbs and JERRY.vbs to the Windows Font directory. It then edits the following registry keys:

  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Please...,
    <WINDOWS font directory>\JERRY.vbs"
Checks to see if the value of
HKEY_CURRENT_USER\Control Panel\International\iCountry = 34
, and if not creates the key "HKEY_LOCAL_MACHINE\Software\Singapore","0". If the registry key does equal 34, then the virus creates the key "HKEY_LOCAL_MACHINE\Software\Singapore","1"

If the registry key "HKEY_LOCAL_MACHINE\Software\Singapore" does not equal 1, the virus then proceeds with the damaging payload routine. The following files are deleted from fixed, network, and RAM Disk drives:

  • *.ace
  • *.asf
  • *.asm
  • *.arj
  • *.avi
  • *.bmp
  • *.doc
  • *.gb
  • *.gba
  • *.gbc
  • *.gif
  • *.jpeg
  • *.jpg
  • *.js
  • *.lhz
  • *.log
  • *.mdb
  • *.mid
  • *.mod
  • *.mov
  • *.mp
  • *.mp2
  • *.mp3
  • *.mpeg
  • *.mpg
  • *.pdf
  • *.ppt
  • *.rar
  • *.rm
  • *.rtf
  • *.smc
  • *.txt
  • *.wav
  • *.wp
  • *.xls
  • *.zip
  • regedit.*
  • regedb32.*

If day is 12th of June, the following message will be displayed:

Use current engine and DAT files for detection and removal.

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

Additional Windows ME/XP removal considerations

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!