Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Dialer.Desire

Dialer.Desire

Updated:
13 February 2007
Risk Impact:
High
File Names:
desire.exe,Desire-uninstall.exe
Systems Affected:
Windows

Behavior


Dialer.Desire is a dialer program that can be used to access pornography, by dialing a high-cost number using a modem.

Symptoms


The files are detected as Dialer.Desire.

Behavior


The most common installation method of this dialer application is through various Web sites, mainly pornographic in nature.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 01 February 2015 revision 020
  • Initial Daily Certified version 14 October 2003
  • Latest Daily Certified version 17 January 2008 revision 033
  • Initial Weekly Certified release date 15 October 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

When Dialer.Desire runs, it does the following:
  1. Creates the following folder and subfolders:

    %ProgramFiles\dialers\dialers
    %ProgramFiles\dialers\dialers\desire
    %ProgramFiles\dialers\dialers\subcriptions


    Note: %ProgramFiles% is a variable that refers to the path of the program files folder. By default, this is C:\Program Files.

  2. Copies itself as the following:
    • %ProgramFiles%\dialers\desire\desire.exe
    • %System%\Desire-uninstall.exe


      Note: %System% is a variable. The dialer locates the System folder and copies itself to that location. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).


  3. Adds the value:

    "Desire"="%ProgramFiles%\dialers\desire\desire.exe /<option>"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

    so that the dialer runs when you restart Windows.


    Note: <option> can be "noconnect," "savestate," "menu," "uninstall," or "install."

  4. Creates the following new keys and sub keys:

    HKEY_CURRENT_USER\Software\SiteIcons
    HKEY_CURRENT_USER\Software\SiteIcons\Dialers
    HKEY_CURRENT_USER\Software\SiteIcons\Dialers\Desire
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    Uninstall\Desire
    HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/x-DESIRE
    HKEY_CLASSES_ROOT\.DESIRE
    HKEY_CLASSES_ROOT\DESIRE File
    HKEY_CLASSES_ROOT\DESIRE File\shell
    HKEY_CLASSES_ROOT\DESIRE File\shell\open
    HKEY_CLASSES_ROOT\DESIRE File\shell\open\command

  5. Adds the value:

    "Default" = "%ProgramFiles%\dialers\desire\desire.exe %1"

    to the registry key:

    HKEY_CLASSES_ROOT\DESIRE File\shell\open\command

  6. Adds the value:

    "application/x-DESIRE" = "%ProgramFiles%\dialers\desire\desire.exe %1"

    to the registry key:

    HKEY_USERS\.DEFAULT\Software\Netscape\Netscape Navigator\Viewers

  7. Creates a shortcut icon on the Windows Desktop and System Tray.

  8. Runs the file, %ProgramFiles\dialers\desire\desire.exe.

  9. Drops a subscription Web page as:

    %ProgramFiles%\dialers\subcriptions\SubsDone.html

  10. When the dialer runs, it opens Internet Explorer and displays the following page:





  1. Update the virus definitions.
  2. Close modem connections.
  3. Uninstall the dialer using the Add/Remove Programs utility.
  4. Run a full system scan and delete all the files detected as Dialer.Desire.
  5. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.

1. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
  • Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
  • Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

    The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.

2. To close modem connections
This risk uses available modems to create an Internet connection, sometimes without any visible signs. In order to successfully remove this threat, ensure that all modem-based Internet connections are disconnected before proceeding. For instructions on how to do this, consult the appropriate Internet service provider, computer manufacturer, or operating system documentation.

3. Uninstalling the Dialer
  1. Do one of the following:
    • Windows 98:
      1. Click Start > Settings > Control Panel.
      2. In the Control Panel window, double-click Add/Remove Programs.

    • Windows Me:
      1. Click Start > Settings > Control Panel.
      2. In the Control Panel window, double-click Add/Remove Programs.
        If you do not see the Add/Remove Programs icon, click "...view all Control Panel options."

    • Windows 2000:
      By default, Windows 2000 is set up the same way as Windows 98. In that case, follow the instructions for Windows 98. Otherwise, click Start, point to Settings, point to Control Panel, and then click Add/Remove Programs.

    • Windows XP:
      1. Click Start > Control Panel.
      2. In the Control Panel window, double-click Add or Remove Programs.

  2. Click the name of the dialer program, which can vary. If you do not know the name, skip to section 3.


    Note: You may need to use the scroll bar to view the whole list.

  3. Click Add/Remove, Change/Remove, or Remove (this varies with the operating system). Follow the prompts.

4. Scanning for and deleting the infected files
  1. Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information, read the document, "How to configure Norton AntiVirus to scan all files."
  2. Run a full system scan.
  3. If any files are detected as infected with Dialer.Desire, click Delete.

5. Deleting the values from the registry

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.


Note: This step is performed to ensure that all the keys that the dialer created are removed. The keys may not be there if the uninstaller removed them.

  1. Click Start, and then click Run. (The Run dialog box appears.)
  2. Type regedit

    Then click OK. (The Registry Editor opens.)

  3. Navigate to each of the following keys:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    HKEY_USERS\.DEFAULT\Software\Netscape\Netscape Navigator\Viewers

  4. In the right pane, delete the value corresponding to the dialer.
  5. Delete the following keys and their sub keys:

    HKEY_CURRENT_USER\Software\SiteIcons
    HKEY_CURRENT_USER\Software\SiteIcons\Dialers
    HKEY_CURRENT_USER\Software\SiteIcons\Dialers\Desire
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    Uninstall\Desire
    HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/x-DESIRE
    HKEY_CLASSES_ROOT\.DESIRE
    HKEY_CLASSES_ROOT\DESIRE File
    HKEY_CLASSES_ROOT\DESIRE File\shell
    HKEY_CLASSES_ROOT\DESIRE File\shell\open
    HKEY_CLASSES_ROOT\DESIRE File\shell\open\command

  6. Exit the Registry Editor.