Home / malware Worm:Win32/Vobfus.NI
First posted on 31 January 2013.
Source: MicrosoftAliases :
Worm:Win32/Vobfus.NI is also known as Worm/Win32.Vobfus (AhnLab), Worm.Win32.Vobfus.atgt (Kaspersky), W32/Vobfus.CILM (Norman), Worm/Vobfus.atgtan (Avira), Win32/VBObfus.JO trojan (ESET), W32/Autorun.worm.aaeh (McAfee), W32/VBNA-AM (Sophos), WORM_VOBFUS.SMIS (Trend Micro).
Explanation :
Installation
Worm:Win32/Vobfus.NI may drop several copies of itself as the following:
- %UserProfile%\passwords.exe
- %UserProfile%\porn.exe
- %UserProfile%\secret.exe
- %UserProfile%\sexy.exe
- %UserProfile%\vbxuin.exe
- %UserProfile%\rcx10.tmp
- %UserProfile%\rcx11.tmp
- %UserProfile%\rcx12.tmp
- %UserProfile%\rcx13.tmp
- %UserProfile%\rcx14.tmp
- %UserProfile%\rcx15.tmp
- %UserProfile%\rcx16.tmp
- %UserProfile%\rcx17.tmp
- %UserProfile%\rcx18.tmp
- %UserProfile%\rcx19.tmp
- %UserProfile%\rcx1a.tmp
- %UserProfile%\rcx1b.tmp
- %UserProfile%\rcx1c.tmp
- %UserProfile%\rcx1d.tmp
- %UserProfile%\rcx1e.tmp
- %UserProfile%\rcx7.tmp
- %UserProfile%\rcx8.tmp
- %UserProfile%\rcx9.tmp
- %UserProfile%\rcxa.tmp
- %UserProfile%\rcxb.tmp
- %UserProfile%\rcxc.tmp
- %UserProfile%\rcxd.tmp
- %UserProfile%\rcxe.tmp
- %UserProfile%\rcxf.tmp
Note: %USERPROFILE% refers to a variable location that is determined by the malware by querying the operating system. The default location for the User Profile folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\<user>" or "C:\Users\<user>". For Windows Vista, 7, and 8, the default location is "C:\Users\<user name>".
Worm:Win32/Vobfus.NI also creates the following registry entry so that it automatically runs every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "vbxuin"
With data: "%UserProfile%\vbxuin.exe /i"
Spreads via...
Removable drives
Worm:Win32/Vobfus.NI may create the following copies on available drives:
- <Drive>:\passwords.exe
- <Drive>:\porn.exe
- <Drive>:\qxfiah.exe
- <Drive>:\secret.exe
- <Drive>:\sexy.exe
- <Drive>:\subst.exe
It also places an "autorun.inf" file in the root folder of the drive, which allows the copies to run automatically whenever the drive is accessed and Autorun is enabled.
It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
Payload
Changes computer settings
Worm:Win32/Vobfus.NI makes the following changes in your computer:
It prevents Windows Explorer from showing hidden files:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "ShowSuperHidden"
With data: "0"
It also disables Automatic Updates:
In subkey: HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
Sets value: "NoAutoUpdate"
With data: "1"
Downloads and runs arbitrary files
Worm:Win32/Vobfus.NI may contact a remote server to check where it can download other files. In the wild, we've observed this worm connecting to "ns1.helpchecks.com".
Analysis by Jireh Sanico
Last update 31 January 2013