|
|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
| (slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix | |||||||
Copyright: Dr. Nikolai Bezroukov 1994-2013. Unpublished notes. Version 0.80.October, 2013
Contents : Foreword : Ch01 : Ch02 : Ch03 : Ch04 : Ch05 : Ch06 : Ch07 : Ch08 : Ch09 : Ch10 : Ch11 : Ch12 : Ch13
Chapter 7: Network worms
| McAfee | Trend Micro | Symantec | CA |
Also known as W32/Downloader (F-Secure), W32/HLLP.Philis (McAfee), Win32.Looked, Win32/Looked!Dropped!Worm, W32.Looked.P (Symantec), W32/Looked-AV (Sophos), Worm.Win32.Viking (Kaspersky)
Based on your sample Phillis/Looked is a file-infecting worm that spreads via network shares. The size of executable is 72,316-bytes compressed Win32 executable. The worm also drops a 33,680-byte DLL which is used to download and execute binary executables.
When executed, Win32/Looked copies itself to the %Windows% directory using the following filenames:
I can confirm that inoculation against this worm/virus can be achieved by setting the key
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWWsubkey:
autovalue:
"1"Virus does infects most or all .EXE file it finds on accessible partitions during the initial launch.
Infected files are larger then original by 72/73K (72316 to be exact). The virus scans all the drives it can reach on startup. So if server has some network drives mapped, the results are predictable -- all EXE files on remote drives are infected. It looks like newly mounted partitions (for example USB drives mounted after computer was infected) are unaffectedI would like to stress it again: all EXE files belonging to all installed applications on servers are affected: Notes, Oracle, Java, you name it. Microsoft patches are infected too ;-) If the server is infected with several worms executables like algore32.exe they are infected too :-).
If the server is infected with several worms executables like algore.exe they are infected too :-).
W32/HLLP.Philis.gg is a file infecting virus. It searches for executable files on the infected machine to prepend its viral code.
It is also responsible for dropping a DLL file, which downloads password stealing trojans.
Upon execution, it drops and executes the files RUNDL132.EXE and LOGO1_.EXE, which are copies of PE_LOOKED.DA-O, in the Windows folder. It also drops the file DLL.DLL in the folder where it is executed. The said file is detected as TROJ_LOOKED.DZ.
The said DLL file is injected into EXPLORER.EXE process and is responsible for this malware's network propagation routine.
It creates the following registry entry on Windows 98 and ME systems to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
Load = "%Windows%\rundl132.exe"(Note: %Windows% is the Windows folder, which is usually C:\Windows.)
On Windows NT-based (Windows NT, 2000, XP, and Server 2003) systems, it modifies the following registry entry as its autostart technique:
HKEY_CURRENT_USER\Software\Microsoft\
Windows NT\CurrentVersion\Windows
Load = "%Windows%\rundl132.exe"(Note: The default value of the said entry is Load = "".)
It also creates the following registry key and entry as part of its installation routine:
HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWW
Auto = "1"Propagation via Network Shares and File Infection Routine
This malware attempts to propagate via network shares. It attempts to open shared folders using administrator and guest as user names and blank as password to gain access to the following default shares:
- ADMIN$
- IPC$
It searches for the following .EXE files in drives C to Z and prepends its code to the target file:
- ACDSee4.exe
- ACDSee5.exe
- ACDSee6.exe
- AgzNew.exe
- Archlord.exe
- AutoUpdate.exe
- BNUpdate.exe
- Datang.exe
- editplus.exe
- EXCEL.EXE
- flashget.exe
- foxmail.exe
- FSOnline.exe
- GameClient.exe
- jxonline_t.exe
- launcher.exe
- lineage.exe
- LineageII.exe
- MHAutoPatch.exe
- msimn.exe
- msnmsgr.exe
- Mu.exe
- NATEON.exe
- NSStarter.exe
- Patcher.exe
- patchupdate.exe
- QQ.exe
- Ragnarok.exe
- realplay.exe
- run.exe.
- Silkroad.exe
- Thunder.exe
- ThunderShell.exe
- TTPlayer.exe
- Uedit32.exe
- Winrar.exe
- WINWORD.EXE
- woool.exe
- zfs.exe
In addition, it drops _DESKTOP.INI in every folder it traverses. The said file contains the date of system infection.
Process Termination
This malware terminates the following security-related processes:
- MCSHIELD.EXE
- REGSVC.EXE
It also attempts to stop the service Kingsoft Antivirus Service if found running on the affected system.
Other Details
This file infector runs on Windows 98, ME, NT, 2000, XP, and Server 2003.
Analysis By: Gus Vincent T. Dato
Revision History:
Sep 16, 2006 - Inserted Automatic Removal Instructions
Sep 18, 2006 - Modified Virus Report
Discovered on: July 12, 2006 Last Updated on: November 01, 2006 11:24:38 AM W32.Looked.P is a worm that spreads through network shares and attempts to infect .exe files. It also lowers security settings and downloads and executes a remote file.When W32.Looked.P is executed, it performs the following actions:
Type: Worm Systems Affected:
Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Virus Definitions (LiveUpdate™ Plus) July 12, 2006
Virus Definitions (LiveUpdate™ Daily) July 12, 2006
Virus Definitions (LiveUpdate™ Weekly) July 12, 2006
Virus Definitions (Intelligent Updater) July 12, 2006
- Number of infections: 0 - 49
- Number of sites: 0 - 2
- Geographical distribution: Low
- Threat containment: Easy
- Removal: Moderate
- Payload Trigger: n/a
- Payload: n/a
- Large scale e-mailing: n/a
- Deletes files: n/a
- Modifies files: Searches for .exe files to infect in all the drives from C to Y.
- Degrades performance: n/a
- Causes system instability: n/a
- Releases confidential info: n/a
- Compromises security settings: n/a
- Subject of email: n/a
- Name of attachment: n/a
- Size of attachment: n/a
- Time stamp of attachment: n/a
- Ports: n/a
- Shared drives: n/a
- Target of infection: n/a
![]()
Symantec Security Response encourages all users and administrators to adhere to
the following basic security "best practices":
![]()
The following instructions pertain to all current and recent Symantec antivirus
products, including the Symantec AntiVirus and Norton AntiVirus product lines.
Category: Win32Also known as PE_LOOKED.AH (Trend), W32.Looked.J (Symantec), Win32.Looked.S, Win32/Looked.S!DLL!Worm, Worm.Win32.Viking.j (Kaspersky)
eTrust Antivirus v7/8* 12.6.2279 View Removal Instructions eTrust Antivirus v7/8* (InoculateIT Engine) 23.72.52 View Removal Instructions eTrust EZ Antivirus 6.x 6.x/9851 View Removal Instructions eTrust EZ Antivirus 7.x 7.x/2279 View Removal Instructions Vet 7 12.6.2279 View Removal Instructions Vet Anti-Virus 10.6x 10.6x/9851 View Removal Instructions
* Includes updates for InoculateIT and eTrust InoculateIT 6.0.
Description Method of Infection Method of Distribution Payload
Description
Win32/Looked.S is a file-infecting worm that spreads via network shares. It has been distributed as a 27,075-byte, Upack compressed, Win32 executable. It also drops a 23,040-byte DLL which is used to download and execute binary executables.
Method of Infection
When executed, Win32/Looked.S copies itself to the %Windows% directory using the following filenames: rundl132.exe
Logo1_.exeNote: '%Windows%' is a variable location. The malware determines the location of the current Windows folder by querying the operating system. The default installation location for the Windows directory for Windows 2000 and NT is C:\Winnt; for 95,98 and ME is C:\Windows; and for XP is C:\Windows.
It then modifies the registry so that the file "rundl123.exe" is executed at each Windows start:
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load = "%Windows%\rundl132.exe"The worm then drops the DLL "vDll.dll" in the current directory. This is injected into the Explorer process and is used to download and launch processes inside Explorer's process space.
The worm also creates the semaphore "SemaphoreMe" to ensure it runs only one instance of itself.
Method of Distribution
Via File Infection
Looked.S recursively traverses directories of fixed drives from C:\ to Z:\. It starts from the root of the drive and infects files with an .exe extension.
The worm prepends itself to a targeted file, increasing the file size by 27,075 bytes. The worm does not infect files greater then 10,485,760 bytes in length, or files located in subfolders with the following names:
system
system32
windows
Documents and Settings
System Volume Information
Recycled
Winnt
\Program Files\Windows NT
\Program Files\WindowsUpdate
\Program Files\Windows Media Player
\Program Files\Outlook Express
\Program Files\Internet Explorer
\Program Files\ComPlus Applications
\Program Files\NetMeeting
\Program Files\Common Files
\Program Files\Messenger
\Program Files\Microsoft Office
\Program Files\Install Shield Installation Information
\Program Files\MSN
\Program Files\Microsoft Frontpage
\Program Files\Movie Maker
\Program Files\MSN Gaming ZoneThe worm also creates a file called "_desktop.ini" in each directory it traverses. This file is a harmless text file containing the system date.
Via Network Shares
The worm tries to spread through network shares IPC$ and admin$ using the username 'administrator' and an empty password. It also tries a number of common username and password combinations which it carries with it, including an empty username and password.
The worm probes for potential targets by sending ICMP packets containing the data "Hello,World" to local IP addresses in the class C network range.
Payload
Downloads and Executes Arbitrary Files
The worm downloads a number of arbitrary files from the domain "17dk.com". It attempts to download a total of two text files and two executables. The binary executables are downloaded to the %Windows% directory and then executed.
Terminates Processes
Looked.S terminates the following running processes:
EGHOST.EXE
MAILMON.EXE
KAVPFW.EXE
IPARMORE.EXE
Ravmond.EXE
RavMon.exeStops Service
The worm stops the following service if it is running on the system:
Kingsoft AntiVirus Service
Closes Window
Looked.S searches for a window with the title "Ravmon.exe" and the class name "RavMonClass". If found, it closes this window.
Analysis by Amir Fouda
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 12, 2019