Home / malware Worm:Win32/Vobfus.PE
First posted on 10 April 2013.
Source: MicrosoftAliases :
Worm:Win32/Vobfus.PE is also known as Worm/Win32.Vobfus (AhnLab), W32/Vobfus.GYSS (Norman), Win32.HLLW.Autoruner1.34772 (Dr.Web), Win32/Pronny.KV worm (ESET), Worm.Win32.Vobfus (Ikarus), W32/Autorun.worm.aaeh!heur (McAfee), WORM_VOBFUS.SMMC (Trend Micro).
Explanation :
Installation
Upon execution, Worm:Win32/Vobfus.PE creates a mutex named "A" to make sure that only one instance of its copy is running in the computer at any given time.
It copies itself in the %USERPROFILE% folder using a random file name, for example:
%USERPROFILE%\boiuzoq.exe
It creates the following registry entry so that this copy is run every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware file name>"
With data: "%USERPROFILE%\<malware file name> /<random parameter>"
For example:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "boiuzoq"
With data: "%USERPROFILE%\boiuzoq.exe /h"
Spreads via...
Network and removable drives
It drops copies of itself in the root folder of all available network and removable drives. It also uses a random file name. Some of the file names it's used are:
- passwords.exe
- porn.exe
- secret.exe
- sexy.exe
- subst.exe
It writes an Autorun configuration file named "autorun.inf", which points to the worm copy. If the drive is accessed from a computer that supports the Autorun feature, the worm is launched automatically.
Payload
changes computer settings
It changes the following registry entries to prevent your computer from showing hidden files and folders in Windows Explorer:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "ShowSuperHidden"
With data: "0"
It also changes the following registry entries to disable Automatic Updates on your computer:
In subkey: HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
Sets value: "NoAutoUpdate"
With data: "1">
Downloads arbitrary files
It tries to contact these servers using a TCP port such as 7005 to download arbitrary files:
ns1.datetoday1.org
Analysis by Wei Li
Last update 10 April 2013