<<<
NEWS FROM THE LAB - Monday, January 19, 2009
>>>
 

 
Social Engineering Autoplay and Windows 7 Posted by Sean @ 16:44 GMT

The Downadup worm utilizes autorun.inf files to spread via removable devices such as USB drives.

Our January 7th post, When is AUTORUN.INF really an AUTORUN.INF?, provided analysis. The autorun.inf uses some tricks, such as variable size, to help avoid detection.

Bojan Zdrnja at SANS Internet Storm Center recently posted some additional analysis: Downadup attempts a social engineering trick in Windows Vista.

Downadup's autorun.inf file uses an action keyword and icon extracted from shell32.dll to produce the following:

Windows Vista, Open folder to view files

The category is "Install or run program" but the text and icon are for "Open folder to view files".

The first option will run Downadup, not good. The second "general" option is the choice that will safely open the USB drive.

Being curious, we tried this autorun.inf with Windows 7:

Windows 7, Downadup Autorun.inf

And the results for Windows 7 were the same as Vista's:

Windows 7, Open Folder to View Files

Downadup attempts to disguise the installation option as an open folder action.

We would utilize Windows 7's "Send Feedback" link, but the lab's Windows 7 system is not connected to the Internet. It's being used to test our Client Security 8 application. Client Security 8 (Internet Security 2009, and some other recent releases) can generically detect Downadup's autorun file as Worm:W32/Downaduprun.A.

Worm:w32/Downaduprun.A