I just realize someone sent the virus attachment to this news
see below.......for more information......
source from www.mcafee.com .




Virus Profile

Virus Name
W32/Pretty.worm.unp

Date Added
2/17/00

Virus Characteristics
*March 2, 2000 Update: AVERT has received numerous samples of this Internet
worm. Many users reporting this worm are also users of Outlook Express. This
is the unpacked edition of the originally packed "W32/Pretty.worm" Internet
worm.*

This is an Internet worm that installs on Windows 9x/NT systems. It arrives
via email from affected users who have also run this Internet worm. It
appears as an icon of a character from the animated comedy series
"Southpark". Emails containing this Internet worm have this format:

-------------
Subject: C:\CoolProgs\Pretty Park.exe

Test: Pretty Park.exe :)
-------------

Attached is the file "Pretty park.exe" and in some cases "Pretty~1.exe".

This worm will try to email itself automatically every 30 minutes to all
email addresses listed in the Windows address book associated with Outlook
Express.

A second function of this worm is that it will also try to connect to an IRC
server and join a specific IRC channel. While connected, this worm tries to
stay connected by sending information to the IRC server, and will also
retrieve any commands from the IRC channel. While on the determined IRC
server, the author of this worm could use the connection as a remote access
trojan in order to get information such as the computer name, registered
owner, registered organization, system root path, and Dial Up Networking
username and passwords.

Users should download 4067 DAT set or above for detection and removal of
this Internet worm. To download the DAT files, follow this link .




----------------------------------------------------------------------------
----

Send This Virus Information To A Friend?

----------------------------------------------------------------------------
----

Indications Of Infection
Emails containing this Internet worm have this format:

-------------
Subject: C:\CoolProgs\Pretty Park.exe

Test: Pretty Park.exe :)


-------------

This program, when run will copy itself to FILES32.VXD in WINDOWS\SYSTEM
folder. It then modifies the registry key value "command" located in the
location:

HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open

from "%1" %* to FILES32.VXD "%1" %*. This in essence will cause the
FILES32.VXD to run during the execution of any exe file.

See this related description of W32/Pretty.worm.


Method Of Infection
Direct execution of the file "Pretty Park.exe" will install to the local
system as mentioned above.


Removal Instructions
The order to remove this trojan is complicated by the depth to which the
trojan hooks the operating system. The following procedure should remove the
Trojan. With Windows 95/98, the registry can be loaded and edited using the
program named REGEDIT while in Windows NT, you use REGEDT32

1) Identify and note the files associated with this trojan as detected by
the scanner - do not remove the trojan at this time. If you have already
removed the trojan, you will not be able to run REGEDIT steps below on the
affected system. Proceed instead to step 11 listed below.

2) Open an MS-DOS prompt via the menu or click on START|RUN and type COMMAND
and then

3) At the prompt, type START COMMAND and press and then start Regedit in
Windows 95/98 by typing REGEDIT or in Windows NT type REGEDT32 and press

4) Remove references to the trojan from these keys of the registry

HKEY_CLASSES_ROOT\exefile\shell\open\command\
HKEY_LOCAL_MACHINE\exefile\CLASSES\exefile\shell\open\command\
HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command

They should contain only the value not including brackets ["%1" %*].

5) If applicable, remove any keys that run the main trojan under

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\

And

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\

6) If applicable, delete the registry key if it exists

HKEY_CLASSES_ROOT\.dl

and exit Regedit

7) If applicable, edit WIN.INI and remove the reference to the trojan from
the run= line in the [windows] section.

8) If applicable, edit SYSTEM.INI and remove the reference to the trojan
from the shell= line in the [boot] section. It should just contain the file
EXPLORER.EXE.

9) Restart the system.

10) Delete the trojan program(s). If all is well the files should be deleted
OK. If you get an error message saying that windows is unable to delete the
file because it is in use, then you have made an error in the above
procedure. Repeat steps 1 to 9 and try again.

11) In the event that the trojan was deleted before making the registry
changes, it is still possible to repair the registry. You will need access
to another computer, or at a minimum, access to MS-DOS on the affected
system. Using MS-DOS edit, create a file called UNDO.REG with the following
content (you can cut and paste):

REGEDIT4

[HKEY_CLASSES_ROOT\exefile\shell\open\command]
@="\"%1\" %*"

[HKEY_LOCAL_MACHINE\exefile\CLASSES\exefile\shell\open\command]
@="\"%1\" %*"

[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command]
@="\"%1\" %*"


12) Save this file to the Windows folder of the affected system as the file
"UNDO.REG".

13) Click on START|RUN and type in UNDO.REG and press ENTER. The contents of
UNDO.REG should be now imported to the registry.






Virus Information
  Discovery Date: 2/15/00
  Length: 60,928
  Type: Trojan
  SubType: worm
  Risk Assessment: High


Variants
Name Type Sub Type Differences
Unknown

Aliases
I-Worm.Prettypark.unp, Pretty Park.exe, Southpark Trojan

Related Viruses
W32/Pretty.worm.unp



Reply via email to