![]() |
Virus FAQ From alt.comp.virus Newsgroup |
{ Program }After infection:
{ Virus }m }Non-overwriters, or appenders, are a lot better in that they don't destroy programs that they infect:
{ Program }After infection:
{ V rogram }{ irus P} ^----------------^As you see the virus replaces the first few bytes with a jump to the virus code. After the jump the virus replaces the original code in it's proper spot, ONLY in memory. Then the virus does it's stuff and jumps back to the beginning of the program and the program runs as nothing had happened. At least that's what supposed to happen. Some programs may cause problems, but that is the exception, not the rule.
First thing it should do is check for a previous installation. This can be accomplished by making up a value for AX and checking for it in your handler.
Next memory reservation is required, this involves freeing up some memory because .COM files get everything when run, then allocating some memory for your code. Changing the value in MCB:0001h to 0008h will make that memory resident. You can also decrease total conventional memory and put your code up there.
Next you must move your code to that segment, wherever it may be, in a MCB-controlled segment or top of memory.
Next you must point your interrupts that you are hooking to your code in the segment that you reserved.
Then restore control to the host program. The interrupt handler is pretty
straightforward, but for a better description, refer to another source.
{ Program }After:
{ Virus }{ Program }Another is to put the jump in another location, such as to search for one in the program:
{ Program }After:
{ ProgVam }{ irus R} ^-----------^
mov di,0101h ; If mov di,0100h TBSCAN detects it dec di push di ret ; (from VLAD) mov cx,word ptr [bp+old3] ; Alternate way of detecting .EXE files add cl,ch cmp cl,167 je close ; (from VLAD) lea si,[bp+old3] ; Combines move of original 3 bytes and the mov di,0101h ; jump back to 0100h dec di movsw movsb push di ret
Central Point Anti-Virus (CPAV) - Isn't very good, but at least is original, MSAV rips off most of it.
Microsoft Anti-Virus (MSAV) - Is horrible, besides the fact it rips off CPAV.
Norton Anti-Virus (NAV) - Not very good, though it gets good ratings from magazines and stuff because of it's user interface, all graphical.
McAfee ViruScan (SCAN) - An ok scanner, better than CPAV, MSAV, and NAV, but not the best.
ThunderByte Anti-Virus (TBAV) - An awesome scanner, it's capabilites with unknown viruses are astounding.
F-Protect (F-PROT) - I have never seen a better scanner, it combines heuristic capability (detecting unknown viruses) with an excellent scanning and removal facility.
Worm.ExploreZip(pack)
Detected as: Worm.ExploreZip(pack)
Aliases: W32/ExploreZip.worm.pak, MiniZip Worm, I-Worm.ZippedFiles, W32/ExplorezipB
Known Variants: Worm.ExploreZip
Infection Length: 120,495 bytes
Area of Infection: C:\Windows\System\
Likelihood: Common
Detected on: Nov 25, 1999
Region Reported: US, Eupore, Japan
Characteristics: Worm, Trojan Horse, packed
Description
Worm.ExploreZip(pack) was discovered on Nov 24, 1999. This worm is a variant of Worm.ExploreZip, which was discovered in Israel, on Jun 6, 1999. The only difference is Worm.ExploreZip(pack) has been packed by file compression, which still allows the worm to be executed normally and does not require any manual uncompressing. Because of the compression, the file size is about 40% smaller than the original Worm.ExploreZip.
Symptoms and Payload
The behavior of the worm is identical to Worm.ExploreZip. It can propagate itself very quickly through email automatically and also via the network. When the email is sent, it will have the following email content.
I received your email and I shall send you a reply ASAP. Till then, take a look at the attached zipped docs.
It will also contain a worm attachment named zipped_files.exe.
In addition, when Worm.ExploreZip(pack) is executed, it searches drives C through Z of your computer system and accessible network machines for particular files. The worm then destroys all files containing any of the following extensions: .h, .c, .cpp, .asm, .doc, .xls, .ppt. This is accomplished by calling CreateFile(), and making the file extensions 0 bytes long. One may notice extended hard drive activity when this occurs. This can result in non-recoverable data.
This payload routine continues to happen while the worm is active on the system. Thus, any newly created files matching the extensions list will be destroyed as well.
Technical Details
The worm utilizes MAPI-capable e-mail programs on Windows systems to propagate itself. The worm e-mails itself out as an attachment with the filename zipped_files.exe. The body of the e-mail message may appear to come from a known e-mail correspondent and contains the following text:
I received your email and I shall send you a reply ASAP. Till then, take a look at the attached zipped docs.
Once the attachment is executed, it will unpacked itself and execute the original Worm.ExploreZip routine. It may display an error message informing the user that the file is not a valid archive.
The worm proceeds to copy itself to the c:\windows\system directory with the filename explore.exe and then modifies the WIN.INI file so that the program is executed each time Windows is started. The worm then utilizes your e-mail client to harvest e-mail addresses in order to propagate itself. Users may notice that their e-mail client launches when this occurs.
The worm will continue to monitor the Inbox for new messages and respond accordingly.
The worm will also search the mapped drives and networked machines for Windows installations and copy itself to the Windows directory of the remote machine. It will then modify the WIN.INI accordingly.
Repair Notes
1.Remove the line
run=<Windows System Path>\Explore.exe
or
run=<Windows System Path>\_setup.exe
from the WIN.INI file for Windows 9x systems.
For Windows NT, remove the registry entry
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run
which will refer to Explore.exe or _setup.exe
2.Delete the file Explore.exe or _setup.exe. One may need to reboot first or kill the process using Task Manager or Process View (if the file is currently in use).
Norton AntiVirus users can protect themselves from this virus by downloading the current virus definitions either through LiveUpdate or from the Download Virus Definition Updates page.
Write-up by: Raul Elnitiarta and Motoaki Yamamura Nov 30, 1999