Symantec United States
global sites
products
purchase
service and support
security response
downloads
about symantec
search
feedback


© 1995-2001 Symantec Corporation.
All rights reserved.
Legal Notices
Privacy Policy

security response
Category 4

W32.Badtrans.B@mm

Discovered on: November 24, 2001
Last Updated on: November 27, 2001 at 10:49:03 PM ZE8

Printer-friendly versionPrinter-friendly version Tell a Friend

Due to the increased rate of submissions, Symantec Security Response has upgraded the threat level of this worm from level 3 to level 4 as of November 26, 2001.

W32.Badtrans.B@mm is a MAPI worm that emails itself out using different file names. It also creates the file \Windows\System\Kdll.dll. It uses functions from this file to log keystrokes.

Type: Worm

Infection Length: 29,020 bytes

Virus Definitions: November 24, 2001

Threat Assessment:

High Low High
Wild:
High
Damage:
Low
Distribution:
High

Wild:

Damage:

Distribution:

Technical description:

This worm arrives as an email with one of several attachment names and a combination of two appended extensions. It contains a set of bits that control its behavior:

001 Log every window text
002 Encrypt keylog
004 Send log file to one of its addresses
008 Send cached passwords
010 Shut down at specified time
020 Use copyname as registry name (else kernel32)
040 Use kernel32.exe as copyname
080 Use current filename as copypath (skips 100 check)
100 Copy to %system% (else copy to %windows%)

When it is first executed, it copies itself to %System% or %Windows% as Kernel32.exe, based on the control bits. Then it registers itself as a service process (Windows 9x/Me only). It creates the key log file %System%\Cp_25389.nls and drops %System%\Kdll.dll which contains the key logging code.

NOTE: %Windows% and %System% are variables. The worm locates the \Windows folder (by default this is C:\Windows or C:\Winnt) or the \System folder (by default this is C:\Windows\System or C:\Winnt\System32) and copies itself to that location.

A timer is used to examine the currently open window once per second, and to check for a window title that contains any of the following as the first three characters:

  • LOG
  • PAS
  • REM
  • CON
  • TER
  • NET

These texts form the start of the words LOGon, PASsword, REMote, CONnection, TERminal, NETwork. There are also Russian versions of these same words in the list. If any of these words are found, then the key logging is enabled for 60 seconds. Every 30 seconds, the log file and the cached passwords are sent to one of these addresses or some others which are currently not operational:
  • ZVDOHYIK@yahoo.com
  • udtzqccc@yahoo.com
  • DTCELACB@yahoo.com
  • I1MCH2TH@yahoo.com
  • WPADJQ12@yahoo.com
  • smr@eurosport.com
  • bgnd2@canada.com
  • muwripa@fairesuivre.com
  • eccles@ballsy.net
  • S_Mentis@mail-x-change.com
  • YJPFJTGZ@excite.com
  • JGQZCD@excite.com
  • XHZJ3@excite.com
  • OZUNYLRL@excite.com
  • tsnlqd@excite.com
  • cxkawog@krovatka.net
  • ssdn@myrealbox.com

After 20 seconds, the worm will shut down if the appropriate control bit is set.

If RAS support is present on the computer, then the worm will wait for an active RAS connection. When one is made, with a 33% chance, the worm will search for email addresses in *.ht* and *.asp in %Personal% and Internet Explorer %Cache%. If it finds addresses in these files, then it will send mail to those addresses using the victim's SMTP server. If this server is unavailable the worm will choose from a list of its own. The attachment name will be one of the following:
  • Pics
  • images
  • README
  • New_Napster_Site
  • news_doc
  • HAMSTER
  • YOU_are_FAT!
  • stuff
  • SETUP
  • Card
  • Me_nude
  • Sorry_about_yesterday
  • info
  • docs
  • Humor
  • fun

In all cases, MAPI will also be used to find unread mail to which the worm will reply. The subject will be "Re:". In that case, the attachment name will be one of the following:
  • PICS
  • IMAGES
  • README
  • New_Napster_Site
  • NEWS_DOC
  • HAMSTER
  • YOU_ARE_FAT!
  • SEARCHURL
  • SETUP
  • CARD
  • ME_NUDE
  • Sorry_about_yesterday
  • S3MSONG
  • DOCS
  • HUMOR
  • FUN

In all cases, the worm will append two extensions. The first will be one of the following:
  • .doc
  • .mp3
  • .zip

The second extension that is appended to the file name is one of the following:
  • .pif
  • .scr

The resulting file name would look similar to CARD.Doc.pif or NEWS_DOC.mp3.scr.

If SMTP information can be found on the computer, then it will be used for the From: field. Otherwise, the From: field will be one of these:
  • "Mary L. Adams" <mary@c-com.net>
  • "Monika Prado" <monika@telia.com>
  • "Support" <support@cyberramp.net>
  • " Admin" <admin@gte.net>
  • " Administrator" <administrator@border.net>
  • "JESSICA BENAVIDES" <jessica@aol.com>
  • "Joanna" <joanna@mail.utexas.edu>
  • "Mon S" <spiderroll@hotmail.com>
  • "Linda" <lgonzal@hotmail.com>
  • " Andy" <andy@hweb-media.com>
  • "Kelly Andersen" <Gravity49@aol.com>
  • "Tina" <tina0828@yahoo.com>
  • "Rita Tulliani" <powerpuff@videotron.ca>
  • "JUDY" <JUJUB271@AOL.COM>
  • " Anna" <aizzo@home.com>

Email messages use the malformed MIME exploit to allow the attachment to execute in Microsoft Outlook without prompting. For information on this, go to:

http://www.microsoft.com/technet/security/bulletin/MS01-020.asp

The worm writes email addresses to the %System%\Protocol.dll file to prevent multiple emails to the same person. Additionally, the sender's email address will have the "_" character prepended to it, to prevent replying to infected mails to warn the sender (eg user@website.com becomes _user@website.com).

After sending mail, the worm adds the value

Kernel32   kernel32.exe

to the registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce

This will run the worm the next time that you start Windows.

Removal instructions:

To remove this worm, follow the instructions for your operating system.

Basic instructions

Windows 95/98/Me

    1. Restart Windows in Safe Mode
    2. Run Norton AntiVirus and delete all files that are detected as W32.Badtrans.B@mm.
    3. Remove the value that it added to the registry.


Windows NT/2000/XP
    1. Restart Windows in VGA mode.
    2. Run Norton AntiVirus and delete all files that are detected as W32.Badtrans.B@mm.
    3. Remove the value that it added to the registry.


To remove files that cannot be deleted by NAV:
Follow the instructions for your version of Windows only if NAV could not delete files that it detected as infected with W32.Badtrans.B@mm.
    • Windows 95/98/Me
      1. Restart the computer in Safe Mode. For instructions on how to restart in Safe Mode, see the document How to restart Windows 9x or Windows Me in Safe Mode.
      2. Run the scan again, and delete any files detected as W32.Badtrans.B@mm.
      3. When the scan is finished, go on to the section To edit the registry.
    • Windows NT/2000/XP
      1. Press Ctrl+Alt+Delete one time.
      2. Click Task Manager.
      3. Click the Processes tab.
      4. Click the "Image Name" column header two times to sort the processes alphabetically.
      5. Scroll through the list and look for kernel32.exe. If you find the file, click it and then click End Process.
      6. Close the Task Manager.
      7. Run the scan again, and delete any files detected as W32.Badtrans.B@mm.
      8. When the scan is finished, go on to the section To edit the registry.

To edit the registry:

CAUTION: We strongly recommend that you back up the system registry before you make any changes. Incorrect changes to the registry could result in permanent data loss or corrupted files. Please make sure that you modify only the keys that are specified. Please see the document How to back up the Windows registry before you proceed. This document is available from the Symantec Fax-on-Demand system. In the U.S. and Canada, call (541) 984-2490, select option 2, and then request document 927002.
    1. Click Start, and click Run. The Run dialog box appears.
    2. Type regedit and then click OK. The Registry Editor opens.
    3. Navigate to the following key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce

    4. In the right pane, delete the following value:

    Kernel32   kernel32.exe

    5. Click Registry, and then click Exit.

Additional information:

Prevention

  • Corporate email filtering systems should block all email that have attachments with the extensions .scr and .pif.
  • Home users should not open any email that has an attachment in which the second extension is .pif or .scr. Any email that has such an attachment should be deleted.


Write-up by: Peter Ferrie

 

GuestBook

Forum
Pagina realizzata da Fracassi Andrea