Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

VBS.Lava

VBS.Lava

Discovered:
13 November 2002
Updated:
13 February 2007
Systems Affected:
Microsoft IIS, Windows

VBS.Lava is a script that is written in Visual Basic. It attempts to delete antivirus program files.

Antivirus Protection Dates

  • Initial Rapid Release version 14 November 2002
  • Latest Rapid Release version 28 September 2010 revision 054
  • Initial Daily Certified version 14 November 2002
  • Latest Daily Certified version 28 September 2010 revision 036
  • Initial Weekly Certified release date 20 November 2002
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

VBS.Lava must be downloaded and run to perform its actions. It has no wormlike attributes.

When it runs, it first copies itself to C:\Windows\Sooolazo.vbs and C:\WinNT\Sooolazo.vbs. These paths are hard-coded and are not determined by system configuration.

If any of the following folders is present on the system, the script attempts to delete all files in the folder:
  • C:\AntiViral Toolkit Pro
  • C:\Program Files\Command Software\F-PROT95
  • C:\Program Files\McAfee\VirusScan
  • C:\Program Files\Norton AntiVirus
  • C:\Toolkit\FindVirus
  • C:\Program Files\Panda Software\Panda Antivirus Titanium

Next, the script copies itself as the following files:
  • C:\Program Files\Morpheus\My Shared Folder\CristinaAguilera.Jpg.vbs
  • C:\Program Files\Morpheus\My Shared Folder\AVP-Spanish Patch.Zip.VBS
  • C:\Program Files\Morpheus\My Shared Folder\Norton Antivirus 2002 Crack.Zip.vbs
  • C:\Program Files\Morpheus\My Shared Folder\SilviaSaintDoubleAnalAction.jpg.vbs
  • C:\Program Files\Morpheus\My Shared Folder\Panda Titanium Crack.zip.vbs
  • C:\Program Files\Morpheus\My Shared Folder\LasKetChupXXX.jpg.vbs
  • C:\Archiv~1\Morpheus\My Shared Folder\CristinaAguilera.Jpg.vbs
  • C:\Archiv~1\Morpheus\My Shared Folder\AVP-Spanish Patch.Zip.VBS
  • C:\Archiv~1\Morpheus\My Shared Folder\Norton Antivirus 2002 Crack.Zip.vbs
  • C:\Archiv~1\Morpheus\My Shared Folder\SilviaSaintDoubleAnalAction.jpg.vbs
  • C:\Archiv~1\Morpheus\My Shared Folder\Panda Titanium Crack.zip.vbs
  • C:\Archiv~1\Morpheus\My Shared Folder\LasKetChupXXX.jpg.vbs
  • C:\Program Files\KaZaA\My Shared Folder\CristinaAguilera.Jpg.vbs
  • C:\Program Files\KaZaA\My Shared Folder\AVP-Spanish Patch.Zip.VBS
  • C:\Program Files\KaZaA\My Shared Folder\Norton Antivirus 2002 Crack.Zip.vbs
  • C:\Program Files\KaZaA\My Shared Folder\SilviaSaintDoubleAnalAction.jpg.vbs
  • C:\Program Files\KaZaA\My Shared Folder\Panda Titanium Crack.zip.vbs
  • C:\Program Files\KaZaA\My Shared Folder\LasKetChupXXX.jpg.vbs
  • C:\Archiv~1\KaZaA\My Shared Folder\CristinaAguilera.Jpg.vbs
  • C:\Archiv~1\KaZaA\My Shared Folder\AVP-Spanish Patch.Zip.VBS
  • C:\Archiv~1\KaZaA\My Shared Folder\Norton Antivirus 2002 Crack.Zip.vbs
  • C:\Archiv~1\KaZaA\My Shared Folder\SilviaSaintDoubleAnalAction.jpg.vbs
  • C:\Archiv~1\KaZaA\My Shared Folder\Panda Titanium Crack.zip.vbs
  • C:\Archiv~1\KaZaA\My Shared Folder\LasKetChupXXX.jpg.vbs

Finally, it adds the values

LARVA C:\Windows\sooolazo.vbs
x C:\WinNT\sooolazo.vbs

to the registry key

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run  

so that the script runs when you start Windows.

The script adds the following lines to Autoexec.bat:

@Start C:\windows\sooolazo.vbs>nul
@Start C:\winnt\sooolazo.vbs>nul
cls

After the script runs, it displays a message box with the title "LVG" and the text

Error 421 Kernel32.dll



NOTES:
  • These instructions are for all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
  • If your antivirus product has been deleted, reinstall it before you continue.
  1. Update the virus definitions.
  2. Run a full system scan, and delete all files that are detected as VBS.Lava.
  3. Delete the values

    LARVA C:\Windows\sooolazo.vbs
    x C:\WinNT\sooolazo.vbs

    from the registry key

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  4. (Windows 95/98/Me only) Remove the text that the script added to the Autoexec.bat file.
For details on how to do this, read the following instructions.

To update the virus definitions:
All virus definitions receive full quality assurance testing by Symantec Security Response before being posted to our servers. There are two ways to obtain the most recent virus definitions:
  • Run LiveUpdate, which is the easiest way to obtain virus definitions. These virus definitions are posted to the LiveUpdate servers once each week (usually Wednesdays) unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, look at the Virus Definitions (LiveUpdate) line at the top of this write-up.
  • Download the definitions using the Intelligent Updater. Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). They must be downloaded from the Symantec Security Response Web site and installed manually. To determine whether definitions for this threat are available by the Intelligent Updater, look at the Virus Definitions (Intelligent Updater) line at the top of this write-up.

    Intelligent Updater virus definitions are available here. For detailed instructions on how to download and install the Intelligent Updater virus definitions from the Symantec Security Response Web site, click here.

To scan for and delete the infected files:
  1. Start your Symantec antivirus program, and make sure that it is configured to scan all files.
  2. Run a full system scan.
  3. If any files are detected as infected with VBS.Lava, click Delete.

To delete the value from the registry:

CAUTION : Symantec strongly recommends that you back up the registry before you make any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify only the keys that are specified. Read the document How to make a backup of the Windows registry for instructions.
  1. Click Start, and click Run. The Run dialog box appears.
  2. Type regedit and then click OK. The Registry Editor opens.
  3. Navigate to the key

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  4. In the right pane, delete the value

    value
  5. Exit the Registry Editor.

To remove the text that the script added to the Autoexec.bat file:
This needs to be done only if you are running Windows 95/98/Me.

NOTE: (For Windows Me users only) Due to the file-protection process in Windows Me, a backup copy of the file that you are about to edit exists in the C:\Windows\Recent folder. Symantec recommends that you delete this file before you continue with the steps in this section. To do this using Windows Explorer, go to C:\Windows\Recent, and in the right pane select the Win.ini file and delete it. It will be regenerated as a copy of the file that you are about to edit when you save your changes to that file.
  1. Click Start, and click Run.
  2. Type the following, and then click OK.

    edit c:\autoexec.bat

    The MS-DOS Editor opens.
  3. Look for and delete these lines if you find them:

    @Start C:\windows\sooolazo.vbs>nul
    Start C:\winnt\sooolazo.vbs>nul
    cls
  4. Click File, and click Save.
  5. Click File, and click Exit.


Writeup By: Maryl Magee