Classification

Category :

Malware

Type :

Worm

Aliases :

Aler, Worm.Win32.Aler.a, Backdoor.Win32.Small.bq, Golten, W32/Golten.worm, Exploit.Win32.MS04-032.a

Summary

Aler is a network worm that was widely mass-mailed with the subject "Latest News about Arafat!!!". The attachments contain a regular JPEG and and custom-crafted EMF file which exploits the EMF (MS04-032) vulnerability. The worm does not use the exploit for propagation. Aler propagates to hosts with weak user passwords.

The clean image looked like this:

The payload of the worm is a multi component TCP proxy trojan.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

System Infection

When the EMF attachment is opened the exploit triggers, which results in a chain-reaction of droppers. The following files are created in the Windows System directory:

  • SP00LSV.EXE - main dropper that drops the rest of the files
  • Alerter.exe - copy of the main dropper
  • Alerter16.exe - copied there during network infection
  • SPC.EXE - Backdoor dropper
  • SCardSer.exe - Backdoor injector
  • comsock.dll (renamed to comwsock.dll) - Backdoor injector
  • sockup.dll (renamd to dmsock.dll) - Main backdoor component
  • SPTRES.DLL - Network propagation routines

SPTRES.DLL is injected into EXPLORER.EXE, comsock.dll is injected into LSASS.EXE and dmsock.dll is injected into a number of other processes (eg. IEXPLORE.EXE, OUTLOOK.EXE, etc).

Network Propagation

The network propagation routine of Aler is very simple. It scans random IP addresses for Windows computers. If it finds one, the worm attempts to connect to it using user credentials from the infected computer as well as a list of predefined passwords (eg. 1234, pass, etc). If the connection is successful the Aler copies the main dropper to the remote computer as

  • ADMIN$\System32\Alerter.exe
  • ADMIN$\System32\Alerter16.exe

then starts them as a service.

Payload

The payload of Aler is a TCP proxy that allows the attacker to initiate network connections through the infected computer. This feature could be used to send SPAM, attack other computers, etc.

The backdoor components of Aler are detected as Backdoor.Win32.Small.bq.