Virus Profile: W32/Zafi.b@MM

Threat Search
Virus Profile information details
Risk Assessment: Home Low-Profiled | Corporate Low-Profiled
Date Discovered: 6/11/2004
Date Added: 6/11/2004
Origin: Unknown
Length: 12,800 bytes
Type: Virus
Subtype: Email
DAT Required: 4366
Removal Instructions


This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection


When executed, the worm copies itself twice to the %windir%\system32 folder using a random name and .EXE and .DLL extension.


It creates a registry key, so the file gets executed every time the machine starts:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "_Hazafibb" = %windir%\System32\jrbtgmqi.exe

Other symptoms include:

  • Security software fails to work
  • Network traffic 
  • System slowdown

Methods of Infection

This worm does not use any exploit code in order to execute the mail attachment automatically. A user has to doubleclick on an infected attachment or a file shared via P2P to infect the machine.

For machines where the worm has overwritten binaries associated with AV or firewall software, it would be very easy for a user to mistakenly execute the worm.


I-Worm.Zafi.b (Kaspersky), PE_ZAFI.B (Trend), W32.Erkez.B@mm (Symantec), Win32.Hazafi.30720 (Dialogue Science)

Virus Characteristics

-- Update August 16th, 2004 --
The risk assessment of this threat has been lowered to Low-Profiled due to decreased prevalence.

-- Update June 14th, 2004 03:01 PST --
The risk assessment of this threat has been raised to Medium due to increased prevalence.

If you think that you may be infected with this threat, and are unsure how to check your system, you may download the Stinger tool to scan your system and remove the virus if present.  This is not required for McAfee users as McAfee products are capable of detecting and removing the virus with the latest update. (see the removal instructions below for more information).

Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.


-- Update June 14, 2004 --
The risk assessment of this threat has been updated to Low-Profiled due to media attention at:

This is a mass-mailing worm that constructs messages using its own SMTP engine and spoofing the From: address.  It also attempts to propagate via P2P, via copying itself to folders on the local system (containing 'share' or 'upload' in the folder name).

Mail Propagation

The worm constructs messages using its own SMTP engine, spoofing the From: address.

The worm searches for email addresses on the local hard disk, harvesting addresses from files with the following extensions:

  • htm
  • wab
  • txt
  • dbx
  • tbb
  • asp
  • php
  • sht
  • adb
  • mbx
  • eml
  • pmr

Harvested addresses are stored in five files in the system32 folder using random names and the file extension .DLL


References to these files are stored within the following key, which is also created by the worm:

  •   HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\_Hazafibb

The worm avoids sending itself to certain email addresses, those containing any of the following strings:

  • admi
  • cafee
  • google
  • help
  • hotm
  • info
  • kasper
  • micro
  • msn
  • panda
  • sopho
  • suppor
  • syma
  • trend
  • use
  • vir
  • webm
  • win
  • yaho

The worm sends itself out in different languages depending on the Top Level Doamin (TLD) of the recipients address. For example, a user with a .COM Mail address, will receive the English mail body, while someone with an .DE Mail address will receive the German body.

Below are some of the formats. The email "From" email address is spoofed. The mail server to use is concatenated using various strings in the virus body. (Eg: 

To: anita 
Subject: Ingyen SMS!
Attachment: "regiszt.php?3124freesms.index777.pif"
------------------------ hirdet=E9s ----------------------------- A sikeres =E9s az t=E1mogat=E1s=E1val =FAjra indul az ingyenes sms k=FCld=F5 szolg=E1ltat=E1s! Jelenleg ugyan korl=E1tozott sz=E1mban, napi 20 ingyen smst lehet felhaszn=E1lni. K=FCldj te is SMST! Neh=E1ny kattint=E1s =E9s a mell=E9kelt regisztr=E1ci=F3s lap kit=F6lt=E9se ut=E1n azonnal ig=E9nybevehet=F5! B=F5vebb inform=E1ci=F3t a oldalon tal=E1lsz, de siess, mert az els=F5 ezer felhaszn=E1l=F3 k=F6z=F6tt =E9rt=E9kes nyerem=E9nyeket sorsolunk ki! ------------------------ ---------------------------

To: claudia
Subject: Importante!
Attachment: "link.informacion.phpV23.text.message.pif"
Informacion importante que debes conocer, -

To: katya
Subject: Katya
Attachment: ""

To: eva
Subject: E-Kort!
Attachment: "link.ekort.index.phpV7ab4.kort.pif"
Mit hjerte banker for dig!

To: marica
Subject: Ecard!
Attachment: "link.showcard.index.phpAv23.ritm.pif"
De cand te-am cunoscut inima mea are un nou ritm!

To: anna
Subject: E-vykort!
Attachment: "link.vykort.showcard.index.phpBn23.pif"
Till min Alskade...

To: erica
Subject: E-Postkort!
Attachment: "link.postkort.showcard.index.phpAe67.pif"
Vakre roser jeg sammenligner med deg...

To: katarina
Subject: E-postikorti!
Attachment: "link.postikorti.showcard.index.phpGz42.pif"
Iloista kesaa!

To: magdolina
Subject: Atviruka!
Attachment: "link.atviruka.showcard.index.phpGz42.pif"
Linksmo gimtadieno! ha

To: beate
Subject: E-Kartki!
Attachment: "link.kartki.showcard.index.phpVg42.pif"
W Dniu imienin...

Subject: Cartoe Virtuais!
Attachment: "link.cartoe.viewcard.index.phpYj39.pif"
Content: Te amo... ,

To: alice
Subject: Flashcard fuer Dich!
Attachment: ""
Hallo! hat dir eine elektronische Flashcard geschickt. Um die Flashcard ansehen zu koennen, benutze in deinem Browser einfach den nun folgenden link: Viel Spass beim Lesen wuenscht Ihnen ihr...

To: eva
Subject: Er staat een eCard voor u klaar!
Attachment: ""
Hallo! heeft u een eCard gestuurd via de website nederlandse taal in het basisonderwijs... U kunt de kaart ophalen door de volgende url aan te klikken of te kopiren in uw browser link: Met vriendelijke groet, De redactie taalsite primair onderwijs...

To: hanka
Subject: Elektronicka pohlednice!
Attachment: ""
Ahoj! Elektronick pohlednice ze serveru -

To: claudine
Subject: E-carte!
Attachment: ""
vous a envoye une E-carte partir du site Vous la trouverez, l'adresse suivante link:, plus de 3500 cartes virtuelles, vos pages web en 5 minutes, du dialogue en direct...

To: francesca
Subject: Ti e stata inviata una Cartolina Virtuale!
Attachment: ""
Ciao! ha visitato il nostro sito, e ha creato una cartolina virtuale per te! Per vederla devi fare click sul link sottostante: Attenzione, la cartolina sara visibile sui nostri server per 2 giorni e poi verra rimossa automaticamente.

To: jennifer
Subject: You`ve got 1 VoiceMessage!
Attachment: ""
Dear Customer! You`ve got 1 VoiceMessage from website! Sender: You can listen your Virtual VoiceMessage at the following link: or by clicking the attached link. Send VoiceMessage! Try our new virtual VoiceMessage Empire! Best regards: SNAF.Team (R).

To: anita
Subject: Tessek mosolyogni!!!
Attachment: "meztelen csajok fociznak.flash.jpg.pif"
Ha ez a k=E9p sem tud felviditani, akkor feladom! Sok puszi:

To: anita
Subject: Soxor Csok!
Attachment: "anita.image043.jpg.pif"
Szia! Aranyos vagy, j=F3 volt dumcsizni veled a neten! Rem=E9lem tetszem, =E9s szeretn=E9m ha te is k=FClden=E9l k=E9pet magadr=F3l, addig is cs=F3k: )l@

To: jennifer
Subject: Don`t worry, be happy!
Attachment: ""
Hi Honey! I`m in hurry, but i still love ya... (as you can see on the picture) Bye - Bye:

To: david
Subject: Check this out kid!!!
Attachment: "jennifer the wild girl xxx07.jpg.pif"
Send me back bro, when you`ll be done...(if you know what i mean...) See ya,

In addition to these messages, the worm may also arrive with a random attachment name using one of the following extensions:

  • .com
  • .exe
  • .pif

P2P Propagation

The worm copies itself to directories on the C: drive containing one of the following strings:

  • share
  • upload

The filename the worm copies itself with is:

  • Total Commander 7.0 full_install.exe
  • winamp 7.0 full_install.exe

File overwriting payload

The worm searches for directories of anti-virus and personal firewall software, and then overwrites the executables in there with a copy of itself. The worm may also overwrite other .exe files in folders within the Program Files folder.

Process termination payload

In an attempt to thwart manual identification and cleaning of an infected machine, the worm will attempt to terminate processes containing any of the following strings:

  • regedit
  • msconfig
  • task

All Users
Use the specified DAT files for detection and removal.

Additional Windows ME/XP removal considerations

Stinger  has been updated to assist in detecting and repairing this threat.

McAfee System Compliance Profiler
Create a rule that matches a registry key

  1. Select HKEY_LOCAL_MACHINE from the drop-down box
  2. In the next field, type in the path SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  3. In the next field, type in _Hazafibb
  4. In the next drop-down box, select "Registry value does not exist"

McAfee Threatscan
ThreatScan signatures that can detect the W32/Zafi.b@MM virus are available from:

ThreatScan Signature version: 2004-06-14

ThreatScan users can detect the virus by running a ThreatScan task using the following settings:

  • Select the "Remote Infection Detection" category and "Windows Virus Checks" template.
  • Select the "Other" category and "Scan All Vulnerabilities" template.

For additional information:

  • Run the "ThreatScan Template Report"
  • Look for module number #4075

PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!