Upon execution VB.KQ creates a copy of itself as the following:
It also drops two files into available removable, fixed, and shared drives:
The 2008.exe file is actually a copy of the worm itself.
The autorun.inf file is an autorun file of 2008.exe and contains the following strings:
- [AUTORUN] open=2008.e ;shell\open=Open(&O) shell\open\Command=2008.exe shell\open\Default=1 ;shell\explore=Manager(&X) shell\explore\Command=2008.exe
It also attempts to drop a copy of itself using an .EXE extension to all shared folders on the infected system. It then creates a kernel service driver file named %systemdir%\drivers\hideproc.sys, which is detected as Rootkit:W32/Agent.TZ.
After using the hideproc.sys file to hide itself in the process list, the worm uninstalls the driver.
The HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon entry is created for automatic execution when Windows starts.
The worm attempts to download a DLL and OCX file and register them using the command "cmd /c regsvr32/s [%OSSMTP library files%]".
The DLL file is registered as as %systemdir%\OSSMTP.dll. The OCX file is registered as %systemdir%\OSSMTP.ocx.
This mass mailing worm attempts to send copies of itself to email addresses harvested from the infected system.
The emails are compiled by gathering them from the path C:\. Additionally, the worm searches through files with HTM and HTML file extensions and looks for the text string "@yahoo.com". On finding the text string, the email address is added to its list of harvested addresses.
To propagate itself, the worm downloads and installs normal component libraries which assist it in sending emails via SMTP through Yahoo! Mail Exchange Servers.
The email messages sent via the Mail Exchange Servers appear as follows:
- From: Videos@bestfilm.net Subject: Film Attachment: 2008.exe Message Body: Welcome to our cinema
In addition to propagating itself, the worm also contains a keylogger program that it installs and uses to log the input typed on the keyboard. This information is logged in the file %systemdir%\2008.txt, which records the following data:
- Started: %Date And Time Stamp of Infection% User Name: %username of infected system%' Computer Name: %computername of infected system% [%Time Stamp%][[%Program Window Text%]] %logs of Keyboard inputs%
It installs a "WH_KEYBOARD_LL" hook procedure to monitor low-level keyboard input events.
Once compiled, the worm attempts to send the gathered information to the email address "firstname.lastname@example.org".
The email appears as such:
From: [...] Subject: Information Attachment: 2008.txt Message Body: Information
The worm uses rootkit stealth techniques to hide its presence on the infected machine, including deleting its own installation file once the installation has been completed.
File System Changes
Creates these files:
Attempts to download files from:
Sets these values:
- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = "Explorer.exe %Systemdir%\2008.exe"
Creates these keys:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\hideproc "Type"=dword:00000001 "Start"=dword:00000003 "ErrorControl"=dword:00000001 "ImagePath"="\??\%systemdir%\Drivers\hideproc.sys" "DisplayName"="hideproc"
- HKEY_CURRENT_USER\Software\VB and VBA Program Settings\2008\Registered started = "True"