Win32:Swen

Win32:Swen

is a worm, spreading through e-mail, shared folders, Kazaa P2P network and IRC. It switches off antiviral and personal firewall software on the infected computers.

It fakes the "From:" field in the infected e-mails. The worm length is 106496 bytes. Being runned, the worm copies oneself to the %WINDIR% folder (%WINDIR% is a system variable containing the name of the Windows folder. Usually C:\Windows or C:\WinNT.) as a randomly named file. It creates files named germs0.dbv, swen1.dat and %COMPUTERNAME%.bat (%COMPUTERNAME% is a system variable containing the computer name.) in the %WINDIR% folder. It searches for a number of antiviral and personal firewall programs on the infected computer and tries to stop the found programs. It does changes to the registry database:

  • It creates randomly named item in the key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, with a value referring to the worm file in the % WINDIR %. This item ensures the worm is started with the Windows.

  • It sets the value of the DisableRegistryTools item in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System key to the ”1”. Thus, Windows registry database editing is disabled.
  • The “default” item in the HKEY_LOCAL_MACHINE\Software\CLASSES\ key subkeys
    • batfile\shell\open\command
    • comfile\shell\open\command
    • exefile\shell\open\command
    • piffile\shell\open\command
    • regfile\shell\open\command
    • scrfile\shell\open\command
    is modified so, that before running any file with bat, com, exe, pif, reg or scr extension the worm is always runned.
  • It creates randomly named subkey in the key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\. In the subkey these items are always created:
    • CacheBox Outfit="yes"
    • Installed="...by Begbie"
    • Install Item=the item from the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run key
    • Unfile=randomly generated name of a file, containing the reference to the %ComputerName%.bat file
    These items might exist:
    • Email Address=the user e-mail address, obtained from the registry database
    • Mirc Install Folder=the folder where the MIRC system resides
    • Server=the SMTP server IP address obtained from the registry database
    • ZipName
  • It the Kazaa P2P system is installed, the worm adds items
    • Dir99= 012345:”the Kazaa shared folder name”
    • DisableSharing="0"

    to the key HKEY_CURRENT_USER\Software\Kazaa\LocalContent.

The running worm checks, if a registry database editor is runned. If so, the worm displays an error message and disables the editor. Periodically, "MAPI32 Exception Error" window is displayed. The window demands input of the mail account parameters - SMTP and POP3 server address, account name and password, user’s nickname. This is the MAPI32 Exception Error window:

MAPI32 Exception Error

The worm sends oneself on the mail addresses found on the infected computer. The message parameters (“From:”, “Subject:”, message body, attachment name) are variable. The worm masks itself as security patch from Microsoft or as a returned undeliverable message. Only the attachment size is always same. The worm can use specially crafted creates MIME header, that on the MS Outlook Express versions with the MS01-020 bug enable it is runned automatically when the message is read.

The worm copies oneself to the Startup folders on the shared disks. The worm searches for the folder with a IRC client on the infected computer and changes the file script.ini so the IRC client sends the worm copies to the users in the same IRC channel.

If the Kazaa system is installed on the infected computer, the worm creates randomly named folder in the %TEMP% (%TEMP% is a system variable containing the name of the folder for temporary files store) folder and creates there multiple copies of itself with a different names. It shares the folder.

Removal:
To remove this virus please use free avast! Virus Cleaner.

avast! with VPS file dated on or after 18th September 2003 is able to detect this worm.

Refer: Avast



Copyright © 2004-2004 All rights reserved.
Valid HTML 4.01! Click here to validate current page. Best viewed with ANY browser! Valid CSS! Click here to validate current CSS.