Threat Description

Yaha.J

Details

Aliases: W32/Lentin.G@mm, I-Worm.Lentin.H, Lentin.H, Yaha.H
Category: Malware
Type: Virus
Platform: W32

Summary



The Yaha.J worm was sent to over 50 different yahoogroups.com mailing lists on Friday the 13th of December 2002.



Removal



Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.

Eliminating a Local Network Outbreak

If the infection is in a local network, please follow the instructions on this webpage:



Technical Details



The Yaha.J worm was sent to over 50 different yahoogroups.com mailing lists on Friday the 13th of December 2002.

The initial e-mails looked like this:

From: HotGal4U2Fuk@Hotmail.Com 
 To: member-of-one-of-the-yahoogroups-mailing-list 
 Subject: joke 
 
 look attach very gooooode 
 bye 
 
 Attachment: love.gif .scr 
 

This Yaha worm variant installs itself to system 3 times, creates a startup key for one of its files in the Registry and also modifies EXE file startup key so its other file could be started every time a user runs an EXE file. When run for the first time, Yaha.J displays a fake error message.

Yaha.J speads itself in e-mail messages with different subjects. It also spams numerous e-mail addresses by sending a message without its attachment there.

When Yaha.J is run for the first time, it displays a fake error message:

Error 
 Application initilisation error 
 

Then Yaha.J installs itself to system. It copies itself 3 times to Windows System directory with the following names:

  • MSNMSG32.EXE
  • NAV32.EXE
  • WINREG.EXE

Yaha.J sets hidden attribute to all these files, so they are not seen in Windows Explorer with default settings.

Then Yaha.J creates 2 startup keys for the WINREG.EXE file in the System Registry:

  • [HKLM\Software\Microsoft\Windows\CurrentVersion\Run] "winReg" = "%WinSysDir%\winReg.exe"
  • [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices "winReg" = "%WinSysDir%\winReg.exe"

The %WinSysDir% represents Windows System directory name. Also Yaha.J modifies the default EXE file startup key:

  • [HKCR\exefile\shell\open\command] @ = "%WinSysDir%\Nav32.exe "%1"%*"

This way Yaha.J's files are started not only during Windows startup, but also when a user runs any EXE file.

Yaha.J creates several threads that refresh its Registry keys and continuously restore Yaha.J's files if they are deleted from a hard drive. One of the threads kills processes with the following names:

  • ANTIVIR
  • APACHE.EXE
  • LOCKDOWNADVANCED
  • WEBSCANX
  • SAFEWEB
  • ICMON
  • CFINET
  • CFINET32
  • AVP.EXE
  • LOCKDOWN2000
  • AVP32
  • ZONEALARM
  • ALERTSVC
  • AMON.EXE
  • AVPCC.EXE
  • AVPM.EXE
  • ESAFE.EXE
  • PCCIOMON
  • CCMAIN
  • POP3TRAP
  • WEBTRAP
  • AVCONSOL
  • AVSYNMGR
  • VSHWIN32
  • VSSTAT
  • NAVAPW32
  • NAVW32
  • NMAIN
  • LUALL
  • LUCOMSERVER
  • IAMAPP
  • ATRACK
  • MCAFEE
  • FRW.EXE
  • IAMSERV.EXE
  • NSCHED32
  • PCFWALLICON
  • SCAN32
  • TDS2-98
  • TDS2-NT
  • VETTRAY
  • VSECOMR
  • NISSERV
  • RESCUE32
  • SYMPROXYSVC
  • NISUM
  • NAVAPSVC
  • NAVLU32
  • NAVRUNR
  • NAVWNT
  • PVIEW95
  • F-STOPW
  • F-PROT95
  • PCCWIN98
  • IOMON98
  • FP-WIN
  • NVC95
  • NORTON

Yaha.J looks for e-mail addresses in Windows Address Book, cache folders of NET and MSN messengers and in Yahoo Messenger profile folders.

When Yaha.J locates an e-mail address, it browses the domain name, then connects to a DNS server at address 12.127.17.71 and attempts to locate an anonymous SMTP server for that domain.

The message composition routine of this Yaha variant is quite complex. Yaha.J randomly selects fake reply-to addresses, fake names of senders, subjects and attachment names. Here's an example:

A subject of an infected e-mail can be one of the following:

  • Friendship Screensaver Inc.
  • Microsoft Screensavers
  • IBM Screensavers
  • Lover's Scnreensaver
  • Valentine Screensaver
  • Sunrise Screensavers
  • Marcos D'Costa
  • Kevin Mitnick
  • Bill Gates
  • Sexy Screensavers
  • Hardcore Screensavers
  • Accoustic Screensavers
  • Electric Screensavers
  • KOF Screensavers
  • Patriotic Screensavers
  • Enjoy the fragrance of Love
  • Pamela Anderson Screensavers
  • Devon Loves Bill Gates
  • Horny Britney Spears Screensavers
  • Are you in Love
  • You are my best friend
  • Who is your best friend
  • Happy Valentines Day
  • So Sweet
  • Dedicated to kYo-3
  • Leona and Ralph
  • Happy Cristmas
  • Do you love your wife
  • Good Luck
  • Mission Impossible
  • Are you In Love
  • Friendship ScreenSaver
  • Pamela 4 U
  • Still Dreaming..
  • Experience the smooooth music
  • Help someone..
  • Check this
  • Wanna be a hacker ?
  • mAtRiX
  • Missing your best friend ?

A fake sender's name can be one of the following:

  • Paul Smith
  • Bernard Lewis
  • Britney Johnson
  • Susan Sarandon
  • Zeus Gavinson
  • Kevin Mitnick
  • Friendship Screensaver Inc.
  • Passionate
  • Lover's Corner
  • Rick Stenquin
  • Amino Extolden
  • Sweetheart
  • Girl Friends
  • The Great Indians
  • Susy Aminot
  • Gavin Lawson
  • Viivi Josefiina Torronen
  • Carmen Vidal
  • Cathy Stevens
  • Zeusita
  • Love Inc.
  • Dead Man Inc.
  • Dreamz of Love Inc.

A fake sender's e-mail address can be one of the following:

  • paul@microsoft.com
  • gates@microsoft.com
  • britney@britneyspears.org
  • sussy@sussybaby.com
  • kk@alkk.com
  • kevin_m@freekevin.com
  • mentor@m.com
  • almst@strong.com
  • jennifer@lopez.com
  • rick@enrique.com
  • arnold@schwarzeneggar.com
  • sylvester@stallone.com
  • mick@foley.com
  • vince@wwe.com
  • vin@suckass.com
  • linus@use_secure_linux.com
  • g@guninski.com
  • peter@p.com
  • steve@wwe.com
  • hulk@hogan.com
  • lex@lugar.com
  • christina@aguilera.com
  • bryan@adams.com

A body of an infected message can look like that:

			
 <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> 
 This e-mail is never sent unsolicited. If you need to unsubscribe, 
 follow the instructions at the bottom of the message.  
 **************************************'********************* 
  Enjoy this friendship Screen Saver and Check ur friends circle...  
  Send this screensaver from www.truefriends.net to everyone you 
 consider a FRIEND, even if it means sending it back to the person 
 who sent it to you. If it comes back to you, then you'll know you 
 have a circle of friends.  
  * To remove yourself from this mailing list, point your browser to: 
 http://truefriends.net/remove?freescreensaver 
 * Enter your email address in the field provided and click "Unsubscribe 
  OR...  
  * Reply to this message with the word "REMOVE" in the subject line. 
  <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> 
 

An infected attachment can have one of the following names:

  • LoverScreenSaver.scr
  • ScreenSaver.scr
  • Honey.scr
  • HotShot.scr
  • NeverMind.scr
  • Escort.scr
  • Love.scr
  • EvilDaemon.scr
  • mAtRiX.scr
  • bestfriend.scr

Also an attachment can have double extension. An extension is selected by Yaha.J from the following list:

  • .pdf .scr
  • .gif .scr
  • .ppt .scr
  • .jpg .scr
  • .doc .scr

Note that there are 23 space characters between these 2 extensions. This is done to hide the second, executable extension.

Yaha.J sends numerous e-mail messages with the above listed body text, but without its attachment to the following addresses:

  • CE@pak.gov.pk
  • roxx@achayans.com
  • nhsboys@vsnl.net
  • admin@focusindia.com
  • info@microsoft.com
  • gates@micrsoft.com
  • GETADMIN@cyberexploits.com
  • method3411@aasp.net
  • rhytha@hotmail.com
  • evil_n_genious@hotmail.com
  • yeshodhank@rediffmail.com
  • sweta_18@hotmail.com
  • Admin@firewall.cx
  • c_doser@hotmail.com
  • deepu_the_king@yahoo.com
  • jack_king2002@hotmail.com
  • dharian25@hotmail.com
  • Lucky@lucky-web.net
  • hackermind@sify.com

Yaha.J does not use Iframe exploit in infected messages to start itself automatically. That limits its spreading.

Yaha.J can create zEsT.txt file in Windows directory and whites the following text there:

==================================================== 
 r^0^x~X pR3$@Nt$ @Y3rH$.@',0Ah 
  tHi$ i$ jU$t tH3 b3gInNiNg..  
 w3 ar3 tH3 gR3@t 1nD1@N$..  
  w3 k1cK pAk1 a$$..  
 ==================================================== 
 





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More