Trojan.dropper.cutwail.b - Description And Cleaning Instruction
Hello,
Four days ago, Bitdefender has detected a threat in the computer of one of my clients:
C:\WINDOWS\system32\WLCtrl32.dll infected with Trojan.Dropper.Cutwail.B .
Trojan.Dropper.Cutwail.B has no description on Bitdefender Virus Enciclopedia.
The infected file (WLCtrl32.dll) cannot be deleded using plain method ( running safe mode, etc..).
Also, after the deleting of WLCtrl32.dll using Windows Recovery Console, after restart, the file reappears in the same location (C:\WINDOWS\system32\WLCtrl32.dll).
I have submited in the same day a ticket to bitdefender support with infected file and scanlog.
I have waited three days a solution from tehnical support in response to my ticket, and then i decided to explore myself the issue.
Here are my conclusions (maybe someone else have same issue and search for a solution) :
_______
Trojan.Dropper.Cutwail.B
1. SYMPTOMS:
1.1 Existence of
%system%\wlctrl32.dll
with the following value in your registry :
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wlctrl32
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wlctrl32 asynchronous
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wlctrl32 dllname
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wlctrl32 impersonate
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wlctrl32 startshell
1.2 Apperance of:
%system%\drivers\random_name.sys ( UNDETECTED AS THREAT BY BITDEFENDER!!!)
- random_name have the format: <capital letter><two lowercase letters><two digits>
- in my case random_name.sys was Oua40.sys
with the following value in your registry :
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\random_name.sys
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\random_name.sys
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_random_name
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\random_name
note:
- %system% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.
__________
2. MANUAL REMOVAL:
Solution:
2.1. ( for Windows XP) disable System Restore (use the manual method from http://support.microsoft.com/kb/310405 )
2.2. Deleting files:
Restarts the system using the Windows Recovery Console (you can see a tutorial here: http://forum.bitdefender.com/index.php?showtopic=1054 )
- In the input box, type
del %System%\WLCtrl32.dll
and then press Enter
- In the input box, type
del %System%\drivers\random_name.sys
and then press Enter
- Type Exit and then press Enter in order to restart the system normally.
note:
- %system% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or
C:\Windows\System32 on Windows XP and Server 2003.
- random_name.sys is the generic name from above point 1.2
2.3. Deleting registry entries added by this trojan:
Click Start>Run, type REGEDIT, then press Enter.
Detete the keys:
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows NT>CurrentVersion>Winlogon>Notify>WLCtrl32.dll
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\random_name.sys
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\random_name.sys
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\random_name
Close Registry Editor.
note:
- random_name.sys is the generic name from above point 1.2
2.4. Restart Windows and then enable System Restore ( see point 2.1)