Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Threats » W32/Netsky.C@mm

Overview

Threat Risk MEDIUM MEDIUM
Destructivity LOW LOW
Payload Plays sound
Detection files published
Description created 25 Feb 2004 12:48:00
Description updated 25 Feb 2004 01:47:00
Malware type WORM
Alias I-Worm.Moodown.c
Spreading mechanism EMAIL
NETWORK
OTHER
Summary None

W32/Netsky.C@mm

Spreading

When run, the worm avoids being installed twice in memory by creating a mutex called "[SkyNet.cz]SystemsMutex".It copies itself to the Windows directory using the name WINLOGON.EXE, and creates a run key in registry so that it is started from bootup.Registry key(s) created by the worm: HKLM\Software\Microsoft\Windows\CurrentVersion\Run ICQ Net"="[WINDIR]\winlogon.exe -stealthRegistry key(s) deleted by the worm: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Taskmon HKCU\Software\Microsoft\Windows\CurrentVersion\Run Taskmon HKLM\Software\Microsoft\Windows\CurrentVersion\Run Explorer HKCU\Software\Microsoft\Windows\CurrentVersion\Run Explorer HKCR\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 HKLM\Software\Microsoft\Windows\CurrentVersion\Run KasperskyAv HKCU\Software\Microsoft\Windows\CurrentVersion\Run KasperskyAv HKLM\Software\Microsoft\Windows\CurrentVersion\Run System_ HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices System_ HKLM\Software\Microsoft\Windows\CurrentVersion\Run msgsvr32 HKLM\Software\Microsoft\Windows\CurrentVersion\Run DELETE ME HKCU\Software\Microsoft\Windows\CurrentVersion\Run d3dupdate.exe HKCU\Software\Microsoft\Windows\CurrentVersion\Run au.exe HKLM\Software\Microsoft\Windows\CurrentVersion\Run service HKCU\Software\Microsoft\Windows\CurrentVersion\Run OLE HKLM\Software\Microsoft\Windows\CurrentVersion\Run Sentry HKCU\Software\Microsoft\Windows\CurrentVersion\ExplorerPINF HKLM\System\CurrentControlSet\Services\WksPatch HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows Services Host HKLM\Software\Microsoft\Windows\CurrentVersion\Run Windows Services HostThe worm traverses folders on all drives C: to Z: (if not CD drive), harvesting email addresses from files of types found in word list 2.In addition it copies itself to folders containing the string "shar". The file names used are listed in word list 1. Folders containing this string will often be peer-to-peer file sharing folders, so the worm spreads using this vector as well.Mail are composed using subjects, body texts and attachment names from word lists. This worm varies between an enormous amount of mail body texts, subjects and attachment names, attempting to lure the user to click on the attachment.Note: Mails may have fake FROM: addresses. "You have sent a virus" warnings from mail scanners are usually not correct. Word list 1: names used when copying to share folders:Microsoft WinXP Crack.exe Teen Porn 16.jpg.pif Adobe Premiere 9.exe Adobe Photoshop 9 full.exe Best Matrix Screensaver.scr Porno Screensaver.scr Dark Angels.pif XXX hardcore pic.jpg.exe Microsoft Office 2003 Crack.exe Serials.txt.exe Screensaver.scr Full album.mp3.pif Ahead Nero 7.exe Virii Sourcecode.scr E-Book Archive.rtf.exe Doom 3 Beta.exe How to hack.doc.exe Learn Programming.doc.exe WinXP eBook.doc.exe Win Longhorn Beta.exe Dictionary English - France.doc.exe RFC Basics Full Edition.doc.exe 1000 Sex and more.rtf.exe 3D Studio Max 3dsmax.exe Keygen 4 all appz.exe Windows Sourcecode.doc.exe Norton Antivirus 2004.exe Gimp 1.5 Full with Key.exe Partitionsmagic 9.0.exe Star Office 8.exe Magix Video Deluxe 4.exe Clone DVD 5.exe MS Service Pack 5.exe ACDSee 9.exe Visual Studio Net Crack.exe Cracks & Warez Archive.exe WinAmp 12 full.exe DivX 7.0 final.exe Opera.exe IE58.1 full setup.exe Smashing the stack.rtf.exe Ulead Keygen.exe Lightwave SE Update.exe The Sims 3 crack.exeWord list 2: Files searched for email addresses:.eml .txt .php .pl .htm .html .vbs .rtf .uin .asp .wab .doc .adb .tbb .dbx .sht .oft .msg .shtm .cgi .dhtmWord list 3: Email addresses containing the following strings are avoided:icrosoft antivi ymantec spam avp f-secur itdefender orman cafee aspersky f-pro orton fbi abuseWord list 4: Possible email subjects:Delivery Failed Status report question trust me hey Re: excuse me read it immediatelly hi Re: does it? Yep important hello dear Re: unknown fake? warning moin what’s up? info Re: information Here is it stolen private? good morning illegal... error take it re: Re: Re: Re: Re: you? something for you exception Re: hey excuse me Re: hi Re: does it? Re: important Re: hello believe me Question denied! notification Re: lol last chance! I’m back! its me notice! ohWord list 5: Possible mail bodies: what means that? help attached ok... that is interesting... i wait for your comment about it. such as yours? read the details. gonna? here is the document. *lol* read it immediately! i found that about you! your hero in the picture? yours? here is it. illegal st. of you? is that true? account? is that your name? picture? message? is that your account? pwd? I wait for an answer! abuse? is that yours? you are a bad writer I don’t know your document! I have your password! you won the rk! something about you! classroom test of you? kill the writer of this document! old photos about you? i hope thats not true! your name is wrong! does it match? i found this document about you. time to fear? really? do you know this???? i know your document! did you sent it to me? this file is bad! why should I? pages? her. another pic, have fun! ... :-> test it child porn? greetings xxx ? stuff about you? your document is not good something is going wrong! your photo is poor information about you? the information is wrong! doc about me? kill him on the picture! from the chatter (my photo!) from your lover ;-) love letter? here, the serials are you a teacherin the picture? here, the introduction is that criminal? here, the cheats i like your doc! what do you think about it? that’s a funny text. that’s not the truth? do you have? instruct me about this! i lost that i am speachless about your document! is that the reality? reply msg your design is not good! important? your TAN number? take it easy! why? you are naked in this document! thats wrong! your icq number? i am desperate modifications? your personal record? yes. misc. and so on. see you! your attachment? verify it. you earn money, see the attachment! is that your attachment? is that your website? you feel the same. meaning of that? possible? you have tried to steal! did you ask me for that? you are bad your job? (I found that!) is that possible? something is going ... something is not ok did you know from this document? wrong calculation! (see the attachment! never! poor quality! good work! excellent! great! i don’t think so. pretty pic about you? docs? schoolfriend? i want more... here is the next one! attachi# did you see her already? is that your wife? is that your creditcard? is that your photo? do you think so? do you have the bug also? already? forgotten? drugs? ... does it matter? i have received this. best? the truth? your body? your eyes? your face? File is self-decryting. File is damaged. File is bad. i saw you last week! xxx service your account is expired! you cannot hide yourself! (see photo) copyright? what still? who? how? only encrypted! personal message! my advice.... i’ve found it about you >> great xxx! man or women? child or adult? here is yours! a crazy doc about you xxx about you? i don’t want your xxx pics! doc? trial? what? ;-) i need you! correct it! see this! it’s a secret! this is nothing for kids! it’s so similar as yours! is that your car? do not give up! great job! here is the $%%454$ you are sexy in this doc! incest? let it! you look like an ape! you look like an rat? be mad? are you cranky? bob the builder did you know that? money? is that your car? is this information about you? is that your privacy? is that your TAN? is that your message? is that your cd? is that your finger? your are naked? is that your porn pic? is that your work? is that your family? is that your beast? is that your account? is that your slip? is that your domain? are you the naked one? are you the naked person! are you the one? does it belong to you? do you have sex in the picture? you have a sexy body in the pic! your lie is going around the world! lets talk about it! do you know the thief? are you a photographer? you have done a mistake in the document its private from me do not show this anyone! new patch is available! this is an attachment message! in your mind? Microsoft fast food... Your bill. try this patch! do you have an orgasm in the picture? Transaction failed. Show the doc! I ’ve found your bill! see your name! You are infected. Read the details! here is my advice. here is my photo! here is the feel free to use it. does it belong to you? Login required! Read the attachment! your document is silly! is the pic a fake? Antispam is turned off. See file! Authentification required. Read the attachment! solve the problem! do not use my document! do not use this creditcard! do not open the attachment! do not visit the pages on the list I sent! explain! tell me more about your document! Your provider will be disabled! Instant patches.Word list 6: Attachment file names:Sometimes (27% chance) files will have two such strings concatenated with an underscore between.associal msg yours doc wife talk message response creditcard description details attachment pic me trash card stuff poster posting portmoney textfile moonlight concert sexy information news note number_phone bill mydate swimmingpool class_photos product old_photos topseller ps important shower myaunt aboutyou yours nomoney birth found death story worker mails letter more website regards regid friend unfolds jokes doc_ang your_stuff location 454543403 final schock release webcam dinner intimate stuff sexual ranking object secrets mail2 attach2 part2 msg2 disco freaky visa party material misc nothing transfer auction warez undefinied violence update masturbation injection naked1 naked2 tear music paypal id privacy word_doc image incestWord list 7: Last extension:.exe .scr .com .pif .zipWord list 8: Middle extension:.txt .rtf .doc .htm

Payload Details

If the system time is between 6am and 9am on the morning of Feb 26th 2004, the worm plays beeps of semi-random pitch and duration until the time hits 09.00 (or the system time is manually changed in panic and frustration).

Analysis

n/a

Removal

n/a


Last Updated: 12 Nov 2015 11:06:10