Home / malware Worm:Win32/Phdet.A
First posted on 26 July 2012.
Source: MicrosoftAliases :
Worm:Win32/Phdet.A is also known as Trojan.Win32.Scar.dncv (Kaspersky), TR/Scar.djno (Avira), Mal/PHDet-DAA (Sophos), W32.Printlove (Symantec).
Explanation :
Worm:Win32/Phdet.A is a worm that spreads via removable drives and the software vulnerability described in CVE-2010-2729 and resolved with Microsoft Security Bulletin MS10-061. If it spreads unsuccessfully to network computers using the software vulnerability, it prints out garbage data instead on a network printer.
Worm:Win32/Phdet.A lowers the security settings in Microsoft Word and sends information about your computer to remote servers.
Installation
When run, Worm:Win32/Phdet.A drops the following files:
- %TEMP%\dll7.tmp.dll - also detected as Worm:Win32/Phdet.A
- %TEMP%\vbs8.tmp.vbs - script that calls %TEMP%\dll7.tmp.dll
It creates the mutex "Global\{66C44A83-3E94-438b-8278-812E2D8D603F}" to ensure that only one instance of itself is running at any given time.
Spreads via...
Mapped drives
Worm:Win32/Phdet.A enumerates all mapped drives. If any of these drives are writeable, Worm:Win32/Phdet.A drops the following files in them:
- <drive:>\thumbs.exe - copy of itself
- <drive:>\autorun.inf - file that automatically runs <drive:>\thumbs.exe when the drive is accessed and if Autorun is enabled
Software vulnerabilities
Worm:Win32/Phdet.A enumerates all network resources. It checks if a network printer exists. If it does, Worm:Win32/Phdet.A uses the vulnerability described in CVE-2010-2729 to copy itself into the Windows system folders of other computers in the network.
The vulnerability described in CVE-2010-2729 has been resolved with the release of Microsoft Security Bulletin MS10-061. If Worm:Win32/Phdet.A finds that the security bulletin has been applied to network computers, the network computers print garbled data through the network printers instead.
Payload
Lowers system security
Worm:Win32/Phdet.A sets the following registry entries, which enables the "Trust access to Visual Basic project" setting in Microsoft Word:
In subkeys:
HKCU\Software\Microsoft\Office\8.0\Word\Security
HKCU\Software\Microsoft\Office\10.0\Word\Security
HKCU\Software\Microsoft\Office\11.0\Word\Security
HKCU\Software\Microsoft\Office\12.0\Word\Security
Sets value: "AccessVBOM"
With data: "1"
This allows its dropped script "vbs8.tmp.vbs" to automatically run whenever you open Microsoft Word. This script, in turn, runs the DLL version of this worm.
Steals computer information
Worm:Win32/Phdet.A gets the volume serial number of C: and the computer name. It then sends this information to a remote server. Two of the servers it is known to connect to are:
- systemreboots.com
- respecto.co.cc
Analysis by Jaime Wong
Last update 26 July 2012