Worm:W32/VB.KQ
Summary
A standalone malicious program which uses computer or network resources to make complete copies of itself.
Removal
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
- Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
- Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
- Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Technical Details
Execution
Upon execution VB.KQ creates a copy of itself as the following:
- %Systemdir%\2008.exe
It also drops two files into available removable, fixed, and shared drives:
- 2008.exe
- autorun.inf
The 2008.exe file is actually a copy of the worm itself.
The autorun.inf file is an autorun file of 2008.exe and contains the following strings:
- [AUTORUN] open=2008.e ;shell\open=Open(&O) shell\open\Command=2008.exe shell\open\Default=1 ;shell\explore=Manager(&X) shell\explore\Command=2008.exe
It also attempts to drop a copy of itself using an .EXE extension to all shared folders on the infected system. It then creates a kernel service driver file named %systemdir%\drivers\hideproc.sys, which is detected as Rootkit:W32/Agent.TZ.
After using the hideproc.sys file to hide itself in the process list, the worm uninstalls the driver.
Registry
The HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon entry is created for automatic execution when Windows starts.
Downloads
The worm attempts to download a DLL and OCX file and register them using the command "cmd /c regsvr32/s [%OSSMTP library files%]".
The DLL file is registered as as %systemdir%\OSSMTP.dll. The OCX file is registered as %systemdir%\OSSMTP.ocx.
Propagation
This mass mailing worm attempts to send copies of itself to email addresses harvested from the infected system.
The emails are compiled by gathering them from the path C:\. Additionally, the worm searches through files with HTM and HTML file extensions and looks for the text string "@yahoo.com". On finding the text string, the email address is added to its list of harvested addresses.
To propagate itself, the worm downloads and installs normal component libraries which assist it in sending emails via SMTP through Yahoo! Mail Exchange Servers.
The email messages sent via the Mail Exchange Servers appear as follows:
- From: Videos@bestfilm.net Subject: Film Attachment: 2008.exe Message Body: Welcome to our cinema
In addition to propagating itself, the worm also contains a keylogger program that it installs and uses to log the input typed on the keyboard. This information is logged in the file %systemdir%\2008.txt, which records the following data:
- Started: %Date And Time Stamp of Infection% User Name: %username of infected system%' Computer Name: %computername of infected system% [%Time Stamp%][[%Program Window Text%]] %logs of Keyboard inputs%
It installs a "WH_KEYBOARD_LL" hook procedure to monitor low-level keyboard input events.
Once compiled, the worm attempts to send the gathered information to the email address "kelvilmitnick@yahoo.com".
The email appears as such:
From: [...] Subject: Information Attachment: 2008.txt Message Body: Information
Stealth
The worm uses rootkit stealth techniques to hide its presence on the infected machine, including deleting its own installation file once the installation has been completed.
File System Changes
Creates these files:
- %Systemdir%\2008.exe
Network Connections
Attempts to download files from:
- http://www.sakarahisaki.googlepages.com/[...]MTP.dll
- http://www.sakarahisaki.googlepages.com/[...]MTP.ocx
Registry Modifications
Sets these values:
- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = "Explorer.exe %Systemdir%\2008.exe"
Creates these keys:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\hideproc "Type"=dword:00000001 "Start"=dword:00000003 "ErrorControl"=dword:00000001 "ImagePath"="\??\%systemdir%\Drivers\hideproc.sys" "DisplayName"="hideproc"
- HKEY_CURRENT_USER\Software\VB and VBA Program Settings\2008\Registered started = "True"
More Support
Community
Ask questions in our Community.
User guides
Check the user guide for instructions.
Contact Support
Chat with with or call an agent.
Submit a Sample
Submit a file or URL for analysis.