FANDOM


Quizy
Type Mass mailer worm
Creator Gigabyte
Date Discovered 2003.12.22
Place of Origin Belgium
Source Language C++
Platform MS Windows
File Type(s) exe, scr, vbs
Infection Length 32,768 bytes

Quizy is a viral worm that makes the computer user answer ten questions in order for it to not infect files. It is yet another virus/worm to mention Graham Cluley, Gigabyte's nemisis.

BehaviorEdit

File:Quizyemail.gif

Quizy arrives in an email with a subject line of "Merry Christmas!". The body of the message says, "You've probably received enough e-cards. Here's a nice Christmas screensaver instead :)" and it comes with an attachment named xmas.scr.

When executed, Quizy drops the xmas.scr screensaver file as well as startup.exe (the quiz) in the C root directory. It also copies mail.vbs, which performs the mailing, and jbells.rtx, a ringtone that plays "Jingle Bells" to the system folder. It adds the value "(Default) = C:\startup.exe" to the Local Machine registry key that will cause startup.exe to run when the system starts up.

Quizybox

Quizy overwrites RTX files (ringtones) in My Documents with "Jingle Bells". Quizy then prepends its infectous code to all files in the Windows, My Documents and MIRC folders.

A window opens explaining the infection and the quiz. Next, a DOS window opens, which displays the questions. Every time a question is answered correctly, the quiz goes on to the next question. It will stay on the same question until it is answered correctly.

Quizyquiz1
Quizyquiz2

Once all of the questions have been answered correctly, it displays a URL, www.geocities.com/quiz_map, pointing to a webpage with instructions on how to disinfect the computer. The site displays the map of a town. The user is expected to go to a physical location where a "package" is hidden in underbrush.

The worm mails itself to up to 666 of the contacts in the user's Address Book (if the user has that many or more than that).

File InfectionEdit

To infect files, the worm checks the values of the Personal Shell Folders registry key (this usually points to the "My Documents" folder) and infects any .exe files found there. If mIRC is installed in C:\progra~1\mirc\mirc.exe, it will infect it (though the default mIRC installation is at C:\mirc\). If the system is any version of Windows, with the exception of Windows 9x or ME, it will infect any files it finds in the windows folder.

Quizy will probably avoid files that are already infected. It also avoids explorer.exe and soundman.exe. Quizy prepends its code to any .exe files it finds. Infected files can be identified with a "g" at offset 0x13h (the 20th place from the beginning of the file, in hexadecimal numbers). When an infected file is run, it extracts Quizy as origfile.exe and runs it. Origfile.exe is deleted after it is finished running.

NameEdit

The worm's creator intended the worm to be named "Quizy". However, many antivirus firms, and the CARO naming conventions have a policy against giving a virus or worm the name that the creator intended (this is one rule that the Virus Encyclopedia deliberately ignores, with the exception of when the intended name is already used), as it may boost the creator's ego. Most gave it a name similar to "Quiz", except for Symantec, which named it "Belzy", in reference to the "Jingle Bells" ringtone.

Antivirus AliasesEdit

  • AVG: Win32/Quis.A
  • AVP: I-Worm.Qizy
  • BitDefender: Win32.HLLP.Izuqy.A
  • CA: Win32.Quis.A
  • ClamAV: Worm.Quizy
  • Kaspersky Labs: Email-Worm.Win32.Qizy
  • McAfee: W32/Quis@MM
  • Panda: W32/Quiz.A
  • Sophos: W32/Qizy-A
  • Symantec: W32.HLLP.Belzy@mm
  • Trend Micro: PE_QUIS.A-O

SourcesEdit

Taras Malivanchuk, Matthew McCormack. CA, Win32.Quis.A. 2004.01.05-08

McAfee Antivirus, W32/Quis@MM.

Heather Shannon. Symantec.com, "W32.HLLP.Belzy@mm".

Sophos Threat Analysis. "W32/Qizy-A"

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.