Surfbar is a Visual Basic Script trojan that drops an executable file onto C: drive and executes it. It has been spammed in email messages that use a vulnerability in Internet Explorer to execute the script automatically.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Surfbar.A is drops the DRG.EXE file onto C: drive and runs it.
The DRG.EXE file attempts to download a file called SURFERBAR.DLL from Internet and puts it to 'C:\Program Files\' folder with WIN32.DLL name. Then this file is registered to Windows with the RegSrv32.exe utlility.
The WIN32.DLL file is an Internet Explorer plugin. It provides customized search capabilities and can be also classified as an adware. This adware drops the file called WINSRV32.EXE to 'C:\Program Files\' folder.
The WINSRV32.EXE file stays in memory and every 10 seconds does the following:
1. Refreshes ITBarLayout value in the following Registry key:
2. Changes the startup page of IE to: 'www.surferbar.com' website
3. Constantly creates the following Registry key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\runonce] "win32" = "c:\\program files\\winsrv32.exe"
These actions make it hard to remove the installed adware from a system, that is why the WINSRV32.EXE file is classified as a trojan.
The trojan has been spammed in messages that look as follows:
Hey, How have you been? What have you been doing lately? Ive just been at home doing nothing :( bored at uni etc. Anyway's lets catch up soon, Luv, You know who ;)
Why hello ;) Whats been happening on your side of the woods? We haven't been doing much at all really! Anyways seeya tommorow.
Hey, Want to go to the pub on Saturday? Last Saturday was a blast! Let me know!
The message is html formatted and contains a hidden link that is executed automatically. To do this it uses a vulnerability that could be fixed with an update available at:
Detection in F-Secure Anti-Virus was published on September 4th, 2003 in update:
Technical Details: Katrin Tocheva, Sami Rautiainen, Alexey Podrezov