W32.Beagle.DZ

Printer Friendly Page

Discovered: March 23, 2006
Updated: March 23, 2006 8:56:12 PM
Also Known As: Bagle.HX [Panda Software], TROJ_MITGLIED.AI [Trend], Bagle.HZ [Panda Software], Bagle.IB [Panda Software], Bagle.GE [F-Secure], Trojan-Downloader.Win32.Bagle.aj [Kaspersky], TROJ_BAGLE.MM [Trend], W32/Bagle-WX [Sophos]
Systems Affected: Windows

W32.Beagle.DZ is a Trojan horse that downloads, and may subsequently execute, remote files. It also lowers security settings on the compromised computer by ending security-related processes and services.

Antivirus Protection Dates

  • Initial Rapid Release version March 23, 2006
  • Latest Rapid Release version August 08, 2016 revision 023
  • Initial Daily Certified version March 23, 2006
  • Latest Daily Certified version August 09, 2016 revision 001
  • Initial Weekly Certified release date March 29, 2006

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Discovered: March 23, 2006
Updated: March 23, 2006 8:56:12 PM
Also Known As: Bagle.HX [Panda Software], TROJ_MITGLIED.AI [Trend], Bagle.HZ [Panda Software], Bagle.IB [Panda Software], Bagle.GE [F-Secure], Trojan-Downloader.Win32.Bagle.aj [Kaspersky], TROJ_BAGLE.MM [Trend], W32/Bagle-WX [Sophos]
Systems Affected: Windows

W32.Beagle.DZ is Trojan horse that downloads, and may subsequently execute, remote files. It also lowers security settings on the compromised computer by ending security-related processes and services.

When the Trojan is executed, it copies itself as one of the following files:
%System%\wintems.exe
%UserProfiles%\Application Data\hidires\hidr.exe

The Trojan then drops the following file, a kernel mode driver which is the Trojan's rootkit component:
%UserProfile%\Application Data\hidires\m_hook.sys

Next, the Trojan registers this file as the following Windows service:
m_hook

In registering this file, the threat creates the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\m_hook

The Trojan uses this rootkit component to hide files, processes, and registry entries.

The Trojan then creates the following registry entries so that it is executed every time Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"drvsyskit" = "%Userprofiles%\Application Data\hidires\hidr.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"german.exe" = "%System%\wintems.exe"

The Trojan also creates the following registry entries:
HKEY_CURRENT_USER\Software\DateTime4\"port" = "5B7E"
HKEY_CURRENT_USER\Software\DateTime4\"uid" = "[RANDOM]"
HKEY_CURRENT_USER\Software\DateTime4\"wdrn" = "1"

The Trojan then attempts to download, and may subsequently execute, a remote file from the following Web sites:
http://avistrade.ru/prog/img/proizvod/news.php
http://mir-vesov.ru/p/lang/CVS/news.php
http://monomah-city.ru/vakans/news.php
http://pvcps.ru/images/news.php
http://roszvetmet.com/images/news.php
http://schiffsparty.de/bilder/uploads/news.php
http://service6.valuehost.ru/images/news.php
http://stroyindustry.ru/service/construction/news.php
http://vladzernoproduct.ru/control/sell/t/news.php
http://www.13tw22rigobert.de/_themes/kopie-von-fantasie-in-blau/news.php
http://www.deadlygames.de/DG/BF/BF-Links/clans/news.php
http://www.emil-zittau.de/karten/news.php
http://www.etype.hostingcity.net/mysql_admin_new/images/news.php
http://www.levada.ru/htmlarea/images/news.php
http://www.mirage.ru/sport/omega/pic/omega/news.php
http://www.ordendeslichts.de/intern/news.php
http://8marta.ru/img/path/news.php
http://asvt.ru/images/news.php
http://calimasurf.com/images/base/orig/news.php
http://celebrationsinspain.com/images/news.php
http://coral-adventures.com/images/news.php
http://dearruthie.com/images/news.php
http://dmax.ru/images/news.php
http://efpa-eg.net/images/news.php
http://ferrumcomp.ru/images/news.php
http://financialbusiness.ca/images/news.php
http://golden-ring.net/images/news.php
http://goodbathscents.com/images/news.php
http://jamminjo.com/images/news.php
http://kmold.biz/images/news.php
http://kokon.com/images/news.php
http://komt.ru/images/news.php
http://magian.ru/images/news.php
http://merkur-akademie.de/images/news.php
http://nakorable.ru/htdocs/img/news.php
http://optimsasia.com/images/news.php
http://raz-naraz.wz.cz/html/fanklub/news.php
http://redshop.ru/images/news.php
http://sdom.ru/images/news.php
http://spbso.ru/images/news.php
http://tarkan.ru/images/news.php
http://transaerotours.ru/img/news.php
http://www.ipromocionales.com/images/news.php
http://www.katjas-reisen.de/blog/images/colors/news.php
http://www.moscowapartments.ru/images/_vti_cnf/news.php
http://www.pechki.ru/images/news.php
http://www.rhone.ch/images/news.php
http://www.zdom.ru/images/news.php
http://avistrade.ru/prog/img/proizvod/blst.php
http://mir-vesov.ru/p/lang/CVS/blst.php
http://monomah-city.ru/vakans/blst.php
http://pvcps.ru/images/blst.php
http://service6.valuehost.ru/images/blst.php
http://www.13tw22rigobert.de/_themes/kopie-von-fantasie-in-blau/blst.php
http://trehrechie.ru/images/blst.php
http://turnstylesticketing.com/images/blst.php
http://twilightzone.cz/distro/blst.php
http://vniipo.ru/images/_notes/blst.php
http://voelckergmbh.de/images/blst.php
http://vserozetki.ru/images/blst.php
http://vtr-spb.ru/fp/mikrobus/gazel/blst.php
http://www.belteh.ru/images/ludi/blst.php
http://www.bmblawfirm.com/images/blst.php
http://www.enertelligence.com/playitsafe/images/blst.php
http://www.enkor.ru/images/blst.php
http://www.g-antssoft.com/images/icon/jpg/blog/blst.php

Next, the Trojan attempts to end the following security-related processes:
_AVP32.EXE
_AVPCC.EXE
_AVPM.EXE
a2guard.exe
aavshield.exe
AckWin32.exe
ADVCHK.EXE
AhnSD.exe
airdefense.exe
ALERTSVC.EXE
ALMon.exe
ALOGSERV.EXE
ALsvc.exe
amon.exe
Anti-Trojan.exe
AntiVirScheduler
AntiVirService
ANTS.EXE
APVXDWIN.EXE
Armor2net.exe
ashAvast.exe
ashDisp.exe
ashEnhcd.exe
ashMaiSv.exe
ashPopWz.exe
ashServ.exe
ashSimpl.exe
ashSkPck.exe
ashWebSv.exe
aswUpdSv.exe
ATCON.EXE
ATUPDATER.EXE
ATWATCH.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
avciman.exe
Avconsol.exe
AVENGINE.EXE
avgamsvr.exe
avgcc.exe
AVGCC32.EXE
AVGCTRL.EXE
avgemc.exe
avgfwsrv.exe
AVGNT.EXE
avgntmgr
AVGSERV.EXE
AVGUARD.EXE
avgupsvc.exe
avinitnt.exe
AvkServ.exe
AVKService.exe
AVKWCtl.exe
AVP32.EXE
avpcc.exe
avpm.exe
AVPUPD.EXE
AVSCHED32.EXE
avsynmgr.exe
AVWUPD32.EXE
AVWUPSRV.EXE
AVXMONITOR9X.EXE
AVXMONITORNT.EXE
AVXQUAR.EXE
BackWeb-4476822.exe
bdmcon.exe
bdnews.exe
bdoesrv.exe
bdss.exe
bdsubmit.exe
bdswitch.exe
blackd.exe
blackice.exe
cafix.exe
ccApp.exe
ccEvtMgr.exe
ccProxy.exe
ccSetMgr.exe
CFIAUDIT.EXE
ClamTray.exe
ClamWin.exe
Claw95.exe
Claw95cf.exe
cleaner.exe
cleaner3.exe
CliSvc.exe
CMGrdian.exe
DefWatch.exe
DOORS.EXE
DrVirus.exe
drwadins.exe
drweb32w.exe
drwebscd.exe
DRWEBUPW.EXE
ESCANH95.EXE
ESCANHNT.EXE
ewidoctrl.exe
EzAntivirusRegistrationCheck.exe
F-AGNT95.EXE
F-PROT95.EXE
F-Sched.exe
F-StopW.EXE
FAMEH32.EXE
FAST.EXE
FCH32.EXE
FireSvc.exe
FireTray.exe
FIREWALL.EXE
fpavupdm.exe
freshclam.exe
fsav32.exe
fsavgui.exe
fsbwsys.exe
fsdfwd.exe
FSGK32.EXE
fsgk32st.exe
fsguiexe.exe
FSM32.EXE
FSMA32.EXE
FSMB32.EXE
fspex.exe
fssm32.exe
gcasDtServ.exe
gcasServ.exe
GIANTAntiSpywareMain.exe
GIANTAntiSpywareUpdater.exe
GUARD.EXE
GUARDGUI.EXE
GuardNT.exe
HRegMon.exe
Hrres.exe
HSockPE.exe
HUpdate.EXE
iamapp.exe
iamserv.exe
ICLOAD95.EXE
ICLOADNT.EXE
ICMON.EXE
ICSSUPPNT.EXE
ICSUPP95.EXE
ICSUPPNT.EXE
IFACE.EXE
INETUPD.EXE
InocIT.exe
InoRpc.exe
InoRT.exe
InoTask.exe
InoUpTNG.exe
IOMON98.EXE
isafe.exe
ISATRAY.EXE
ISRV95.EXE
ISSVC.exe
JEDI.EXE
kavmm.exe
KAVPF.exe
KavPFW.exe
KAVStart.exe
KAVSvc.exe
KAVSvcUI.EXE
KMailMon.EXE
KPfwSvc.EXE
KWatch.EXE
livesrv.exe
LOCKDOWN2000.EXE
LogWatNT.exe
lpfw.exe
LUALL.EXE
LUCOMSERVER.EXE
Luupdate.exe
MCAGENT.EXE
mcmnhdlr.exe
mcregwiz.exe
Mcshield.exe
MCUPDATE.EXE
mcvsshld.exe
MINILOG.EXE
MONITOR.EXE
MonSysNT.exe
MOOLIVE.EXE
MpEng.exe
mpssvc.exe
MSMPSVC.exe
myAgtSvc.exe
myagttry.exe
navapsvc.exe
NAVAPW32.EXE
NavLu32.exe
NAVW32.EXE
NDD32.EXE
NeoWatchLog.exe
NeoWatchTray.exe
NISUM.EXE
NMAIN.EXE
nod32.exe
nod32krn.exe
nod32kui.exe
NORMIST.EXE
notstart.exe
npavtray.exe
NPFMNTOR.EXE
npfmsg.exe
NPROTECT.EXE
NSCHED32.EXE
NSMdtr.exe
NssServ.exe
NssTray.exe
ntrtscan.exe
NTXconfig.exe
NUPGRADE.EXE
NVC95.EXE
Nvcod.exe
Nvcte.exe
Nvcut.exe
NWService.exe
OfcPfwSvc.exe
OUTPOST.EXE
PavFires.exe
PavFnSvr.exe
Pavkre.exe
PavProt.exe
pavProxy.exe
pavprsrv.exe
pavsrv51.exe
PAVSS.EXE
pccguide.exe
PCCIOMON.EXE
pccntmon.exe
PCCPFW.exe
PcCtlCom.exe
PCTAV.exe
PERSFW.EXE
pertsk.exe
PERVAC.EXE
PNMSRV.EXE
POP3TRAP.EXE
POPROXY.EXE
prevsrv.exe
PsImSvc.exe
QHM32.EXE
QHONLINE.EXE
QHONSVC.EXE
QHPF.EXE
qhwscsvc.exe
RavMon.exe
RavTimer.exe
Realmon.exe
REALMON95.EXE
Rescue.exe
rfwmain.exe
Rtvscan.exe
RTVSCN95.EXE
RuLaunch.exe
SAVAdminService.exe
SAVMain.exe
savprogress.exe
SAVScan.exe
SCAN32.EXE
ScanningProcess.exe
sched.exe
sdhelp.exe
SERVIC~1.EXE
SHSTAT.EXE
SiteCli.exe
SNDSrvc.exe
SPBBCSvc.exe
SPHINX.EXE
spiderml.exe
spidernt.exe
Spiderui.exe
SpybotSD.exe
SPYXX.EXE
SS3EDIT.EXE
stopsignav.exe
swAgent.exe
swdoctor.exe
SWNETSUP.EXE
symlcsvc.exe
SymProxySvc.exe
SymSPort.exe
SymWSC.exe
SYNMGR.EXE
TAUMON.EXE
TBMon.exe
TDS-3.EXE
TeaTimer.exe
TFAK.EXE
THAV.EXE
THSM.EXE
Tmas.exe
tmlisten.exe
Tmntsrv.exe
TmPfw.exe
tmproxy.exe
TNBUtil.exe
TRJSCAN.EXE
Up2Date.exe
UPDATE.EXE
UpdaterUI.exe
upgrepl.exe
Vba32ECM.exe
Vba32ifs.exe
vba32ldr.exe
Vba32PP3.exe
VBSNTW.exe
vchk.exe
vcrmon.exe
VetTray.exe
VirusKeeper.exe
VPTRAY.EXE
vrfwsvc.exe
VRMONNT.EXE
vrmonsvc.exe
vrrw32.exe
VSECOMR.EXE
Vshwin32.exe
vsmon.exe
vsserv.exe
VsStat.exe
WATCHDOG.EXE
WebProxy.exe
Webscanx.exe
WEBTRAP.EXE
WGFE95.EXE
Winaw32.exe
winroute.exe
winss.exe
winssnotify.exe
WRADMIN.EXE
WRCTRL.EXE
xcommsvr.exe
zatutor.exe
ZAUINST.EXE
zlclient.exe
zonealarm.exe

The Trojan also stops the following services, some of which are security-related:
SharedAccess
wscsvc
wuauserv
Aavmker4
ADBLOCK.DLL
ADFirewall
Ahnlab task Scheduler
AlertManger
AntiVir Service
AntiyFirewall
aswUpdSv
Ati HotKey Poller
avast! Antivirus
avast! Mail Scanner
avast! Web Scanner
AVEService
AVExch32Service
Avg7Alrt
Avg7Core
Avg7RsXP
Avg7UpdSvc
AVGFwSrv
AvgFwSvr
AVIRAMailService
AVIRAService
AVUPDService
AVWUpSrv
awhost32
backweb client - 4476822
BackWeb Client - 7681197
backweb client-4476822
Bdfndisf
BlackICE
BsFileSpy
BsFirewall
BsMailProxy
ccEvtMgr
ccPwdSvc
ccSetMgr
ccSetMgr.exe
CONTENT.DLL
DefWatch
DNSCACHE.DLL
drwebnet
ewido security suite control
ewido security suite driver
ewido security suite guard
F-Prot Antivirus Update Monitor
F-Secure Gatekeeper Handler Starter
firewall
FTPFILT.DLL
FwcAgent
Guard NT
HTMLFILT.DLL
HTTPFILT.DLL
IMAPFILT.DLL
Ip6FwHlp
KAVMonitorService
KLBLMain
KWatchSvc
MAILFILT.DLL
McAfee Firewall
McAfeeFramework
McShield
McTaskManager
mcupdmgr.exe
Microsoft NetWork FireWall Services
MonSvcNT
MpfService
navapsvc
Network Associates Log Service
NNTPFILT.DLL
NOD32ControlCenter
NOD32krn
NOD32Service
Norman NJeeves
Norman Type-R
Norman ZANDA
Norton AntiVirus Server
NPDriver
NPFMntor
NProtectService
NVCScheduler
NWService
OfcPfwSvc
Outbreak Manager
Outpost Firewall
OutpostFirewall
PAVAGENTE
PavAtScheduler
PAVFIRES
PAVFNSVR
PavPrSrv
PavReport
Personal Firewall
POP3FILT.DLL
PROTECT.DLL
qhwscsvc
Quick Heal Online Protection
RfwService
SBService
SECRET.DLL
SharedAccess
SmcService
SPBBCSvc
SpiderNT
SweepNet
SWEEPSRV.SYS
Symantec AntiVirus Client
Symantec Core LC
The_Hacker_Antivirus
V3MonSvc
Vba32ECM
Vba32ifs
Vba32Ldr
Vba32PP3
VBCompManService
VexiraAntivirus
VisNetic AntiVirus Plug-in
WinAntivirus
WinRoute
wuauserv