Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

Malware Defense History

by Dr. Nikolai Bezroukov.

Copyright: Dr. Nikolai Bezroukov 1994-2013. Unpublished notes. Version 0.80.October, 2013

Contents : Foreword : Ch01 : Ch02 : Ch03  : Ch04 : Ch05 : Ch06 : Ch07 : Ch08 : Ch09 : Ch10 : Ch11 : Ch12 : Ch13


Chapter 7: Network worms

W32/HLLP.Philis Win32/Looked File Infecting Worm

McAfee Trend Micro Symantec CA  
 

Also known as W32/Downloader (F-Secure), W32/HLLP.Philis (McAfee), Win32.Looked, Win32/Looked!Dropped!Worm, W32.Looked.P (Symantec), W32/Looked-AV (Sophos), Worm.Win32.Viking (Kaspersky)

Based on your sample Phillis/Looked is a file-infecting worm that spreads via network shares. The size of executable is 72,316-bytes compressed Win32 executable. The worm also drops a 33,680-byte DLL which is used to download and execute binary executables.

When executed, Win32/Looked copies itself to the %Windows% directory using the following filenames:

  • C:\WinNT\uninstall\rundl132.exe      72,316  bytes 
    C:\WinNT\Logo1_.exe                  72,316  bytes
    C:\WINNT\RichDll.dll                 33,680  bytes
  • I can confirm that inoculation against this worm/virus can be achieved by setting the key

    key: HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWW

    subkey: auto

    value: "1"

    Virus does infects most or all .EXE file it finds on accessible partitions during the initial launch. Infected files are larger then original by 72/73K (72316 to be exact). The virus scans all the drives it can reach on startup. So if server has some network drives mapped, the results are predictable -- all EXE files on remote drives are infected. It looks like newly mounted partitions  (for example USB drives mounted after computer was infected) are unaffected

    I would like to stress it again:  all EXE files belonging to all installed applications on servers are affected: Notes, Oracle, Java, you name it. Microsoft patches are infected too ;-) If the server is infected with several worms executables like algore32.exe they are infected too :-).

    If the server is infected with several worms executables like algore.exe  they are infected too :-).

     

     

    McAfee

    W32/HLLP.Philis.gg is a file infecting virus. It searches for executable files on the infected machine to prepend its viral code.

    It is also responsible for dropping a DLL file, which downloads password stealing trojans.

    TrendMicro

    PE_LOOKED.DA - Technical details

    Upon execution, it drops and executes the files RUNDL132.EXE and LOGO1_.EXE, which are copies of PE_LOOKED.DA-O, in the Windows folder. It also drops the file DLL.DLL in the folder where it is executed. The said file is detected as TROJ_LOOKED.DZ.

    The said DLL file is injected into EXPLORER.EXE process and is responsible for this malware's network propagation routine.

    It creates the following registry entry on Windows 98 and ME systems to enable its automatic execution at every system startup:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
    Windows\CurrentVersion\Run
    Load = "%Windows%\rundl132.exe"

    (Note: %Windows% is the Windows folder, which is usually C:\Windows.)

    On Windows NT-based (Windows NT, 2000, XP, and Server 2003) systems, it modifies the following registry entry as its autostart technique:

    HKEY_CURRENT_USER\Software\Microsoft\
    Windows NT\CurrentVersion\Windows
    Load = "%Windows%\rundl132.exe"

    (Note: The default value of the said entry is Load = "".)

    It also creates the following registry key and entry as part of its installation routine:

    HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWW
    Auto = "1"

    Propagation via Network Shares and File Infection Routine

    This malware attempts to propagate via network shares. It attempts to open shared folders using administrator and guest as user names and blank as password to gain access to the following default shares:

    It searches for the following .EXE files in drives C to Z and prepends its code to the target file:

    In addition, it drops _DESKTOP.INI in every folder it traverses. The said file contains the date of system infection.

    Process Termination

    This malware terminates the following security-related processes:

    It also attempts to stop the service Kingsoft Antivirus Service if found running on the affected system.

    Other Details

    This file infector runs on Windows 98, ME, NT, 2000, XP, and Server 2003.

    Analysis By: Gus Vincent T. Dato
     

    Revision History:

    Sep 16, 2006 - Inserted Automatic Removal Instructions
    Sep 18, 2006 - Modified Virus Report

    Symantec

    Symantec Security Response - W32.Looked.P

    Discovered on: July 12, 2006 Last Updated on: November 01, 2006 11:24:38 AM W32.Looked.P is a worm that spreads through network shares and attempts to infect .exe files. It also lowers security settings and downloads and executes a remote file.
     

    Type: Worm Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP        

     
  • Virus Definitions (LiveUpdate™ Plus)
  • July 12, 2006

  • Virus Definitions (LiveUpdate™ Daily)
  • July 12, 2006

  • Virus Definitions (LiveUpdate™ Weekly)
  • July 12, 2006

  • Virus Definitions (Intelligent Updater)
  • July 12, 2006

    threat assessment

    Wild

    Damage

    Distribution

    When W32.Looked.P is executed, it performs the following actions:

    1. Creates the following files:
       
      • %Windir%\rundl132.exe - a copy of W32.Looked.P
      • %Windir%\logo1_.exe - a copy of W32.Looked.P
      • %Windir%\dll.dll - a copy of Downloader
      • %CurrentFolder%\vDll.dll - a copy of Downloader

        Note:
         
      • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
         
      • %CurrentFolder% is a variable that refers to the folder where the risk was originally executed.

         
    2. Checks for the value:

      "auto" = "1"

      to the registry subkey:

      HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWW

      and either creates the infection marker or exits if it is found.

       
    3. Adds the value:

      "load" = "%Windir%\rundl132.exe"

      to the registry subkeys:

      HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

      so that it runs every time Windows starts.

       
    4. Attempts to stop the following service:

      Kingsoft AntiVirus Service

       
    5. Injects its DLL component, dll1.dll, into either iexplorer.exe or explorer.exe.

       
    6. Ends the following processes, some of which are security-related:

       
      • Eghost.exe
      • Mailmon.exe
      • Kavpfw.exe
      • Iparmor.exe
      • Ravmond.exe
      • Regsvc.exe
      • Mcshield.exe

         
    7. Closes the following windows:

       
      • Ravmon.exe
      • RavMonClass

         
    8. Using the DLL component, attempts to download a file from the following location:

      [http://]www.wowchian.com/dl[2 LETTERS[REMOVED]

       
    9. Searches for .exe files to infect in all the drives from C to Y.

       
    10. Prepends itself to any .exe files that it locates on the computer.

       
    11. The worm creates the file _desktop.ini in any any directory it has searched for executable files in. This file has the hidden and system attributes set and it stores the date the worm was executed.

       
    12. Does not infect .exe files in folders with the following names:

       
      • system
      • system32
      • windows
      • Documents and Settings
      • System Volume Information
      • Recycled
      • winnt
      • Program Files
      • Windows NT
      • WindowsUpdate
      • Windows Media Player
      • Outlook Express
      • Internet Explorer
      • ComPlus Applications
      • NetMeeting
      • Common Files
      • Messenger
      • Microsoft Office
      • InstallShield Installation Information
      • MSN
      • Microsoft Frontpage
      • Movie Maker
      • MSN Gaming Zone

         
    13. May send ICMP packets containing the string "Hello,World" to the following IP addresses:

       
      • 192.168.0.30
      • 192.168.8.1

         
    14. May also send ICMP packets to IP addresses in the same range as the IP address of the compromised computer.
       
    15. Attempts to open shared folders with the following names, if any computer responds to the ICMP packet:
       
      • \\ipc$
      • \\admin$
         
    16. Tries to open the shared folder using administrator as the username and a blank password. It copies itself to that folder, if it succeeds in opening the shared folder.
       
    17. Enumerates all the computers and shared folders in the local network. The worm uses a blank username and a blank password to open the shared folders.
       
    18. Searches for and infects .exe files in the shared folders.

    recommendations

    Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

    removal instructions

    The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
     

    1. Disable System Restore (Windows Me/XP).
    2. Update the virus definitions.
    3. Run a full system scan.
    4. Delete any values added to the registry.
       
    For specific details on each of these steps, read the following instructions.

    1. To disable System Restore (Windows Me/XP)
    If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.

    Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.

    Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.

    For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
    Note:
    When you are completely finished with the removal procedure and are satisfied that the threat has been removed, reenable System Restore by following the instructions in the aforementioned documents.

    For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article: Antivirus Tools Cannot Clean Infected Files in the _Restore Folder (Article ID: Q263455).

    2. To update the virus definitions
    Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
    3. To run a full system scan
    1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
    2. Run a full system scan.
    3. If any files are detected, follow the instructions displayed by your antivirus program.

    Important: If you are unable to start your Symantec antivirus product or the product reports that it cannot delete a detected file, you may need to stop the risk from running in order to remove it. To do this, run the scan in Safe mode. For instructions, read the document, How to start the computer in Safe Mode. Once you have restarted in Safe mode, run the scan again.

    After the files are deleted, restart the computer in Normal mode and proceed with the next section.

    Warning messages may be displayed when the computer is restarted, since the threat may not be fully removed at this point. You can ignore these messages and click OK. These messages will not appear when the computer is restarted after the removal instructions have been fully completed. The messages displayed may be similar to the following:

    Title: [FILE PATH]
    Message body: Windows cannot find [FILE NAME]. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.

    4. To delete the value from the registry
    Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only. For instructions refer to the document: How to make a backup of the Windows registry.
     
    1. Click Start > Run.
    2. Type regedit
    3. Click OK.

      Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. Security Response has developed a tool to resolve this problem. Download and run this tool, and then continue with the removal.

       
    4. Navigate to the subkeys:

      HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

       
    5. In the right pane, delete the value:

      "load" = "%Windir%\rundl132.exe"

       
    6. Exit the Registry Editor.


    CA

    Win32-Looked.S

    Category: Win32 Also known as PE_LOOKED.AH (Trend), W32.Looked.J (Symantec), Win32.Looked.S, Win32/Looked.S!DLL!Worm, Worm.Win32.Viking.j (Kaspersky)
    eTrust Antivirus v7/8* 12.6.2279 View Removal Instructions
    eTrust Antivirus v7/8* (InoculateIT Engine) 23.72.52 View Removal Instructions
    eTrust EZ Antivirus 6.x 6.x/9851 View Removal Instructions
    eTrust EZ Antivirus 7.x 7.x/2279 View Removal Instructions
    Vet 7 12.6.2279 View Removal Instructions
    Vet Anti-Virus 10.6x 10.6x/9851 View Removal Instructions

    * Includes updates for InoculateIT and eTrust InoculateIT 6.0.
       
    Description Method of Infection Method of Distribution Payload

    Description
    Win32/Looked.S is a file-infecting worm that spreads via network shares. It has been distributed as a 27,075-byte, Upack compressed, Win32 executable. It also drops a 23,040-byte DLL which is used to download and execute binary executables.

    Method of Infection
    When executed, Win32/Looked.S copies itself to the %Windows% directory using the following filenames:

    rundl132.exe
    Logo1_.exe

    Note: '%Windows%' is a variable location. The malware determines the location of the current Windows folder by querying the operating system. The default installation location for the Windows directory for Windows 2000 and NT is C:\Winnt; for 95,98 and ME is C:\Windows; and for XP is C:\Windows.

    It then modifies the registry so that the file "rundl123.exe" is executed at each Windows start:
                                 
    HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load = "%Windows%\rundl132.exe"

    The worm then drops the DLL "vDll.dll" in the current directory. This is injected into the Explorer process and is used to download and launch processes inside Explorer's process space.

    The worm also creates the semaphore "SemaphoreMe" to ensure it runs only one instance of itself.

    Return to top

     


    Method of Distribution

    Via File Infection

    Looked.S recursively traverses directories of fixed drives from C:\ to Z:\. It starts from the root of the drive and infects files with an .exe extension.

    The worm prepends itself to a targeted file, increasing the file size by 27,075 bytes. The worm does not infect files greater then 10,485,760 bytes in length, or files located in subfolders with the following names:

    system
    system32
    windows
    Documents and Settings
    System Volume Information
    Recycled
    Winnt
    \Program Files\Windows NT
    \Program Files\WindowsUpdate
    \Program Files\Windows Media Player
    \Program Files\Outlook Express
    \Program Files\Internet Explorer
    \Program Files\ComPlus Applications
    \Program Files\NetMeeting
    \Program Files\Common Files
    \Program Files\Messenger
    \Program Files\Microsoft Office
    \Program Files\Install Shield Installation Information
    \Program Files\MSN
    \Program Files\Microsoft Frontpage
    \Program Files\Movie Maker
    \Program Files\MSN Gaming Zone

    The worm also creates a file called "_desktop.ini" in each directory it traverses. This file is a harmless text file containing the system date.

    Via Network Shares

    The worm tries to spread through network shares IPC$ and admin$ using the username 'administrator' and an empty password. It also tries a number of common username and password combinations which it carries with it, including an empty username and password.

    The worm probes for potential targets by sending ICMP packets containing the data "Hello,World" to local IP addresses in the class C network range.

    Return to top

     

    Payload

    Downloads and Executes Arbitrary Files

    The worm downloads a number of arbitrary files from the domain "17dk.com". It attempts to download a total of two text files and two executables. The binary executables are downloaded to the %Windows% directory and then executed.

    Terminates Processes

    Looked.S terminates the following running processes:

    EGHOST.EXE
    MAILMON.EXE
    KAVPFW.EXE
    IPARMORE.EXE
    Ravmond.EXE
    RavMon.exe
     

    Stops Service

    The worm stops the following service if it is running on the system:

    Kingsoft AntiVirus Service

    Closes Window

    Looked.S searches for a window with the title "Ravmon.exe" and the class name "RavMonClass". If found, it closes this window.

    Analysis by Amir Fouda



    Etc

    Society

    Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers :   Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism  : The Iron Law of Oligarchy : Libertarian Philosophy

    Quotes

    War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda  : SE quotes : Language Design and Programming Quotes : Random IT-related quotesSomerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose BierceBernard Shaw : Mark Twain Quotes

    Bulletin:

    Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 :  Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method  : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

    History:

    Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds  : Larry Wall  : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOSProgramming Languages History : PL/1 : Simula 67 : C : History of GCC developmentScripting Languages : Perl history   : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history

    Classic books:

    The Peter Principle : Parkinson Law : 1984 : The Mythical Man-MonthHow to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite

    Most popular humor pages:

    Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

    The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D


    Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

    FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

    This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

    You can use PayPal to to buy a cup of coffee for authors of this site

    Disclaimer:

    The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

    Last modified: March 12, 2019