Home / malware Worm:Win32/Chupik.A
First posted on 09 October 2012.
Source: MicrosoftAliases :
There are no other names known for Worm:Win32/Chupik.A.
Explanation :
Worm:Win32/Chupik.A is a Visual Basic-compiled worm that propagates via fixed media; for example, a hard disk drive or flash drive. It may also download files, possibly malicious, onto your computer.
Installation
When executed, the worm drops its copy to the following:
- %windir%\h2s.exe
- %windir%\nacl.exe
- %windir%\system\lsass.exe
- %windir%\userinit.exe
Note that %windir% and is a hard-coded path on the malware.
It then creates and opens a folder in the current directory where the malware has been executed, with a folder using the same name as the executable file.
For example, if the file name of the executable is "Tools.exe" then it will create a folder named "Tools" and open it. It may do this to trick you into thinking that this is just a normal folder, as the malware uses a folder icon.
It makes the following changes to the registry to ensure it runs at each Windows start:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "pikachu"
With data: "C:\WINDOWS\nacl.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Modifies value: "Userinit"
With data: "C:\WINDOWS\system32\userinit.exe,"
To value: "Userinit"
With data: "C:\WINDOWS\userinit.exe"
Spreads via...
Fixed and removable drives
Worm:Win32/Chupik.A drops a copy of itself to any available fixed or removable drive.
On a hard disk drive, the worm enumerates all the drives on the computer except for the root drive (usually C:\).
Once a drive has been found, it will search for all the folders in that drive, and then drop its copy as an executable file with the same name as the folder. It then changes the attributes of the folder to be hidden.
For example, if there is a folder named "Games" in the drive, then the malware will drop its copy as "Game.exe" and so on.
It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system, so that when the network and/or removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically. This is particularly common malware behavior, generally utilized in order to spread malware from computer to computer. It should also be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
On a flash drive, Worm:Win32/Chupik.A drops its copy as "h2o.exe" together with an Autorun.inf file, so that the malware will be executed when Autorun is enabled.
Payload
Modifies system settings
Worm:Win32/Chupik.A modifies the affected computer system's settings by making the following changes to the registry:
It disables the system utility Task Manager by making the following registry modification:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableTaskMgr"
With data: "dword:00000001"
It disables registry editing tools by making the following registry modification:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableRegistryTools"
With data: "dword:00000001"
It restricts the use of Microsoft Management Console (MMC) snap-ins.
In subkey: HKCU\Software\Policies\Microsoft\MMC
Sets value: "RestrictToPermittedSnapins"
With data: "dword:00000001"
It disables Command Prompt by making the following registry modification:
In subkey: HKCU\Software\Policies\Microsoft\Windows\System
Sets value: "DisableCMD"
With data: "dword:00000001"
It removes the Folder Options item from all Explorer menus and the Control Panel by making the following registry modification:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
Sets value: "NoFolderOptions"
With data: "dword:00000000"
It removes the "Run" command from the Start menu:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
Sets value: "NoRun"
With data: "dword:00000000"
It overrides the display settings so files with the 'hidden' attribute are not displayed; it does this by making the following registry modification:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "Hidden"
With data: "dword:00000000"
It stops the display of files that have 'system' and 'hidden' attributes by making the following registry modification:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "SuperHidden"
With data: "dword:00000000"
It modifies the 'Show hidden files and folders' options in the 'Folders Options' menu in Windows Explorer by making the following registry modification:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN
Sets value: "CheckedValue"
With data: "dword:00000002"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL
Sets value: "CheckedValue"
With data: "dword:00000000"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden
Sets value: "CheckedValue"
With data: "dword:00000000"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt
Sets value: "UncheckedValue"
With data: "dword:00000001"
Deletes the following registry entry to prevent you from being able to boot in safe-mode:
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}
Sets value: "@"
With data: "DiskDrive"
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}
Sets value: "@"
With data: "DiskDrive"
Drops files
Worm:Win32/Chupik.A creates the following shared folder on your computer:
C:\Documents and Settings\Temp
It does this by executing the following command:
"net share "phim_hai_hay=C:\Documents and Settings\Temp""
The worm then drops a copy of itself as the following file:
tuyen_tap_hai_2008.exe
It queries the shared folder list using the following registry key, then drops its file "phim hai cuc hay.exe" to any existing shared folders it finds:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\WorkgroupCrawler\Shares
Downloads arbitrary files
In the wild, we have observed the worm downloading arbitrary files onto infected computers. We have observed the worm downloading files from the following URLs:
- cmdcmdcmd.php0h.com/ {file}
- ewqscxz.fateback.com/ {file}
- qweszxc.50webs.com/ {file}
- www11.asphost4free.com/ewqscxz/ {file}
- www41.websamba.com/aibietdc/ {file}
Where {file} can be any of the following:
- a.jpg
- 1.jpg
- 2.jpg
- 3.jpg
- 4.jpg
- 5.jpg
- 6.jpg
For example, download links can be:
- cmdcmdcmd.php0h.com/1.jpg
- ewqscxz.fateback.com/5.jpg
- www41.websamba.com/aibietdc/3.jpg
The downloaded files maybe saved and executed on the following paths:
- c:\windows\system32\link.sys
- c:\windows\system32\MSINET.OCX
- c:\windows\system32\MSWINSCK.exe
- c:\windows\system32\rar.exe
- c:\windows\system32\svch0st.exe
- c:\windows\system32\w
- c:\windows\system32\y
- c:\windows\temp\per.exe
Terminates processes and deletes files
The worm may terminate processes that contain any of the following strings:
- avg
- bhome
- bit
- blupro
- bpro
- kav
- nod
Note that these strings are often associated with security-related processes.
It also deletes files with a .GHO file extension, as well as the following files:
- c:\$Persi0.sys
- c:\Persi0.sys
Modifies Hosts file
Worm:Win32/Chupik.A modifies the Windows Hosts file. The local Hosts file overrides the DNS resolution of a website URL to a particular IP address. Malware may make modifications to the Hosts file in order to redirect specified URLs to different IP addresses. Malware often modifies your computer's Hosts file in order to stop you from accessing websites associated with particular security-related applications (such as antivirus, for example).
The worm replaces the existing content of the Hosts file with the following content:
Additional information
- 127.0.0.1 9down<dot>com
- 127.0.0.1 bkav.com<dot>vn
- 127.0.0.1 download.avg<dot>com
- 127.0.0.1 download.com<dot>vn
- 127.0.0.1 download.eset<dot>com
- 127.0.0.1 download.f-secure<dot>com
- 127.0.0.1 download.softpedia<dot>com
- 127.0.0.1 download1us.softpedia<dot>com
- 127.0.0.1 free.avg<dot>com
- 127.0.0.1 mirror02.gdata<dot>de
- 127.0.0.1 spftrl.digitalriver<dot>com
- 127.0.0.1 www<dot>9down.com
- 127.0.0.1 www<dot>bitdefender.co.uk
- 127.0.0.1 www<dot>bitdefender.com
- 127.0.0.1 www<dot>bkav.com.vn
- 127.0.0.1 www<dot>download.com
- 127.0.0.1 www<dot>download.com.vn
- 127.0.0.1 www<dot>grisoft.cz
- 127.0.0.1 www<dot>kaspersky.com
- 127.0.0.1 www<dot>symantec.com
The following is a list of the contents of the Autorun.inf file:
[AutoRun]
ShElL\OpEn\coMMand = h2o.exe
sheLl\OPeN\DeFaULT=1
SHeLL\ExPLOrE\coMMAnD = h2o.exe
OpEN= h2o.exe
sHELl\AuToplaY\cOMMAnd=h2o.exe
Analysis by Ric Robielos
Last update 09 October 2012