Worm:W32/VB.KQ

Classification

Category :

Malware

Type :

Worm

Aliases :

Worm:W32/VB.KQ, Trojan-Clicker.Win32.VB.big, TROJ_MALAGENT.HE (Trend Micro)

Summary

A standalone malicious program which uses computer or network resources to make complete copies of itself.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Execution

Upon execution VB.KQ creates a copy of itself as the following:

  • %Systemdir%\2008.exe

It also drops two files into available removable, fixed, and shared drives:

  • 2008.exe
  • autorun.inf

The 2008.exe file is actually a copy of the worm itself.

The autorun.inf file is an autorun file of 2008.exe and contains the following strings:

  • [AUTORUN] open=2008.e ;shell\open=Open(&O) shell\open\Command=2008.exe shell\open\Default=1 ;shell\explore=Manager(&X) shell\explore\Command=2008.exe

It also attempts to drop a copy of itself using an .EXE extension to all shared folders on the infected system. It then creates a kernel service driver file named %systemdir%\drivers\hideproc.sys, which is detected as Rootkit:W32/Agent.TZ.

After using the hideproc.sys file to hide itself in the process list, the worm uninstalls the driver.

Registry

The HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon entry is created for automatic execution when Windows starts.

Downloads

The worm attempts to download a DLL and OCX file and register them using the command "cmd /c regsvr32/s [%OSSMTP library files%]".

The DLL file is registered as as %systemdir%\OSSMTP.dll. The OCX file is registered as %systemdir%\OSSMTP.ocx.

Propagation

This mass mailing worm attempts to send copies of itself to email addresses harvested from the infected system.

The emails are compiled by gathering them from the path C:\. Additionally, the worm searches through files with HTM and HTML file extensions and looks for the text string "@yahoo.com". On finding the text string, the email address is added to its list of harvested addresses.

To propagate itself, the worm downloads and installs normal component libraries which assist it in sending emails via SMTP through Yahoo! Mail Exchange Servers.

The email messages sent via the Mail Exchange Servers appear as follows:

  • From: Videos@bestfilm.net Subject: Film Attachment: 2008.exe Message Body: Welcome to our cinema

In addition to propagating itself, the worm also contains a keylogger program that it installs and uses to log the input typed on the keyboard. This information is logged in the file %systemdir%\2008.txt, which records the following data:

  • Started: %Date And Time Stamp of Infection% User Name: %username of infected system%' Computer Name: %computername of infected system% [%Time Stamp%][[%Program Window Text%]] %logs of Keyboard inputs%

It installs a "WH_KEYBOARD_LL" hook procedure to monitor low-level keyboard input events.

Once compiled, the worm attempts to send the gathered information to the email address "kelvilmitnick@yahoo.com".

The email appears as such:

From: [...] Subject: Information Attachment: 2008.txt Message Body: Information

Stealth

The worm uses rootkit stealth techniques to hide its presence on the infected machine, including deleting its own installation file once the installation has been completed.

File System Changes

Creates these files:

  • %Systemdir%\2008.exe

Network Connections

Attempts to download files from:

  • http://www.sakarahisaki.googlepages.com/[...]MTP.dll
  • http://www.sakarahisaki.googlepages.com/[...]MTP.ocx

Registry Modifications

Sets these values:

  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = "Explorer.exe %Systemdir%\2008.exe"

Creates these keys:

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\hideproc "Type"=dword:00000001 "Start"=dword:00000003 "ErrorControl"=dword:00000001 "ImagePath"="\??\%systemdir%\Drivers\hideproc.sys" "DisplayName"="hideproc"
  • HKEY_CURRENT_USER\Software\VB and VBA Program Settings\2008\Registered started = "True"