Home / malware Worm:W32/VB.KQ
First posted on 10 September 2008.
Source: SecurityHomeAliases :
There are no other names known for Worm:W32/VB.KQ.
Explanation :
A standalone malicious program which uses computer or network resources to make complete copies of itself.
May include code or other malware to damage both the system and the network.
right]Execution
Upon execution VB.KQ creates a copy of itself as the following:
- %Systemdir%2008.exe
It also drops two files into available removable, fixed, and shared drives:
- 2008.exe
- autorun.inf
The 2008.exe file is actually a copy of the worm itself.
The autorun.inf file is an autorun file of 2008.exe and contains the following strings:
- [AUTORUN]
open=2008.e
;shellopen=Open(&O)
shellopenCommand=2008.exe
shellopenDefault=1
;shellexplore=Manager(&X)
shellexploreCommand=2008.exe
It also attempts to drop a copy of itself using an .EXE extension to all shared folders on the infected system.
It then creates a kernel service driver file named %systemdir%drivershideproc.sys, which is detected as Rootkit:W32/Agent.TZ.
After using the hideproc.sys file to hide itself in the process list, the worm uninstalls the driver.
Registry
The HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon entry is created for automatic execution when Windows starts.
Downloads
The worm attempts to download a DLL and OCX file and register them using the command "cmd /c regsvr32/s [%OSSMTP library files%]".
The DLL file is registered as as %systemdir%OSSMTP.dll. The OCX file is registered as %systemdir%OSSMTP.ocx.
Propagation
This mass mailing worm attempts to send copies of itself to e-mail addresses harvested from the infected system.
The e-mails are compiled by gathering them from the path C:. Additionally, the worm searches through files with HTM and HTML file extensions and looks for the text string "@yahoo.com". On finding the text string, the e-mail address is added to its list of harvested addresses.
To propagate itself, the worm downloads and installs normal component libraries which assist it in sending e-mails via SMTP through Yahoo! Mail Exchange Servers.
The e-mail messages sent via the Mail Exchange Servers appear as follows:
- From: Videos@bestfilm.net
Subject: Film
Attachment: 2008.exe
Message Body: Welcome to our cinema
In addition to propagating itself, the worm also contains a keylogger program that it installs and uses to log the input typed on the keyboard. This information is logged in the file %systemdir%2008.txt, which records the following data:
- Started: %Date And Time Stamp of Infection%
User Name: %username of infected system%'
Computer Name: %computername of infected system%
[<%Time Stamp%>]<<%Program Window Text%>> %logs of Keyboard inputs%
It installs a "WH_KEYBOARD_LL" hook procedure to monitor low-level keyboard input events.
Once compiled, the worm attempts to send the gathered information to the e-mail address "kelvilmitnick@yahoo.com".
The e-mail appears as such:
- From: [...]
Subject: Information
Attachment: 2008.txt
Message Body: Information
Stealth
The worm uses rootkit stealth techniques to hide its presence on the infected machine, including deleting its own installation file once the installation has been completed.Last update 10 September 2008