Yes....yes it is
-----Original Message-----
From: Q-LABS TechLists [mailto:[EMAIL PROTECTED]]
Sent: Friday, August 31, 2001 1:00 PM
To: NT System Admin Issues
Subject: Re: W32.Sircam.Worm@mm
> >
> > W32.Sircam.Worm@mm
> > Discovered on: July 17, 2001
> > Last Updated on: August 21, 2001 at 03:13:03 PM PDT
> >
> > Due to an increased rate of virus submissions, The Symantec
> AntiVirus
> > Research Center (SARC) has upgraded W32.Sircam.Worm@mm from a level
> > 3 to
a
> > level 4 virus threat.
> >
> > W32.Sircam.Worm@mm contains its own SMTP engine, and
> > propagates in
a
> > manner similar to the W32.Magistr.Worm.
> > Due to what appears to be a bug, this worm does not replicate
under
> > Windows NT or 2000.
> >
> > SARC has created a tool to remove this worm.
> >
> > CAUTION: In some cases, if you have had NAV quarantine or
> > delete infected files, you will not be able to run .exe files,
> > however you will still be able to run the removal tool.
> >
> > To obtain the W32.Sircam.Worm@mm removal tool, please click
> > here.
> >
> >
> > Also Known As: W32/SirCam@mm, Backdoor.SirCam
> >
> > Type: Worm
> >
> > Virus Definitions: July 17, 2001
> >
> > Threat Assessment:
> >
> >
> > Wild:
> > High Damage:
> > Medium Distribution:
> > High
> >
> >
> > Wild:
> >
> > a.. Number of infections: More than 1000
> > b.. Number of sites: More than 10
> > c.. Geographical distribution: Medium
> > d.. Threat containment: Moderate
> > e.. Removal: Moderate
> > Damage:
> >
> > a.. Payload Trigger: 1) October 16th, or some attached file
> > contents, triggers file deletion payload. 2) If the file deletion
occured,
> > or after 8000 executions, triggers the space filler payload.
> > b.. Payload:
> > a.. Large scale e-mailing: The worm appends a random
> > document
> from
> > the infected PC to itself and sends this new file via email
> > b.. Deletes files: 1 in 20 chance of deleting all files
> > and directories on C:. Only occurs on systems where the date is
> > October 16
and
> > which are using D/M/Y as the date format. Always occurs if attached
> > file contains "FA2" not followed by "sc".
> > c.. Degrades performance: 1 in 50 chance of filling all
> remaining
> > space on the C: drive by adding text to the file
c:\recycled\sircam.sys
> > d.. Releases confidential info: It will export a random
document
> > from the hard drive by appending it to the body of the worm
> > Distribution:
> >
> > a.. Subject of email: Random subject - the filename of the
> > attachment
> > b.. Name of attachment: A file from the sender's computer
> > with
the
> > extension .bat, .com, .lnk, or .pif added to it.
> > c.. Size of attachment: at least 134kb long
> > d.. Shared drives: searchs for shared drives and copies
> > itself
to
> > those it finds
> >
> > Technical description:
> >
> > This worm arrives as an email message with the following
> > content:
> >
> > Subject: The subject of the email will be random, and will be
> > the
> same
> > as the file name of the email attachment.
> > Attachment: The attachment is a file taken from the sender's
> computer
> > and will have the extension .bat, .com, .lnk or .pif added to it.
> > Message: The message body will be semi-random, but will always
> contain
> > one of the following two lines (either English or Spanish) as the
> > first
> and
> > last sentences of the message.
> >
> > Spanish Version:
> > First line: Hola como estas ?
> > Last line: Nos vemos pronto, gracias.
> >
> > English Version:
> > First line: Hi! How are you?
> > Last line: See you later. Thanks
> >
> > Between these two sentences, some of the following text may
appear:
> >
> > Spanish Version:
> > Te mando este archivo para que me des tu punto de vista
> > Espero me puedas ayudar con el archivo que te mando
> > Espero te guste este archivo que te mando
> > Este es el archivo con la informaci=n que me pediste
> >
> > English Version:
> > I send you this file in order to have your advice
> > I hope you can help me with this file that I send
> > I hope you like the file that I sendo you
> > This is the file with the information that you ask for
> >
> > When run, the worm performs the following actions:
> >
> >
> > 1. It creates copies of itself as %TEMP%\<File name> and
> > C:\Recycled\<file name>, which contain the attached document. This
> document
> > is then run using the program registered to handle the specific file
type.
> > For example, if it is saved as a file with the .doc extension, it
> > will
run
> > using Microsoft Word or Wordpad. A file with the .xls extension will
open
> in
> > Excel, and one with the .zip extension will open in your default zip
> > program, such as WinZip.
> >
> > NOTE: The term %TEMP% is the Temp variable, and means that
> > the
> worm
> > will save itself to the Windows Temp folder, whatever its location.
> > The default is C:\Windows\Temp.
> >
> > 2. It copies itself to C:\Recycled\Sirc32.exe and
> > %System%\Scam32.exe.
> >
> > NOTE: %System% is also a variable. The worm will locate the
> \System
> > folder (by default this is C:\Windows\System) and copy itself to
> > that location.
> >
> > 3. It adds the value
> >
> > Driver32=%System%\scam32.exe
> >
> > to the following registry key:
> >
> > HKEY_LOCAL_MACHINE\SOFTWARE\
> > Microsoft\Windows\CurrentVersion\RunServices
> >
> > 4. It creates the following registry key:
> >
> > HKEY_LOCAL_MACHINE\Software\SirCam
> >
> > with the following values:
> > a.. FB1B - Stores the file name of the worm as stored in
> > the Recycled directory.
> > b.. FB1BA - Stores the SMTP IP address.
> > c.. FB1BB - Stores the email address of the sender.
> > d.. FC0 - Stores the number of times the worm has
executed.
> > e.. FC1 - Stores what appears to be the version number of
> > the worm.
> > f.. FD1 - Stores the file name of worm that has been
> > executed, without the suffix.
> > g.. FD3 - Stores a value corresponding to the current
> > state of
> the
> > worm.
> > h.. FD7 - Stores the number of mails that have been sent
> > prior
> to
> > any interruption of this process.
> >
> > 5. The (Default) value of the registry key
> >
> > HKEY_CLASSES_ROOT\exefile\shell\open\command
> >
> > is set to
> >
> > C:\recycled\sirc32.exe "%1" %*"
> >
> > This enables the worm to execute itself any time that an
> > .exe
file
> > is run.
> >
> > 6. The worm is network aware, and it will enumerate the
> > network resources to infect shared systems. If any are found, it
> > will do the
> > following:
> > a.. Attempt to copy itself to
<Computer>\Recycled\Sirc32.exe
> > b.. Add the line "@win \recycled\sirc32.exe" to the file
> > <Computer>\Autoexec.bat
> > c.. Copy <Computer>\Windows\Rundll32.exe to
> > <Computer>\Windows\Run32.exe
> > d.. Replace <Computer>\Windows\rundll32.exe with
> > C:\Recycled\Sirc32.exe
> >
> > 7. There is a 1 in 33 chance that the following actions will
> occur:
> > a.. The worm copies itself from C:\Recycled\Sirc32.exe to
> > %Windows%\Scmx32.exe
> > b.. The worm copies itself as "Microsoft Internet
> > Office.exe"
to
> > the folder referred to by the registry key:
> >
> > HKEY_CURRENT_USER\Software\Microsoft\
> > Windows\CurrentVersion\Explorer\
> > Shell Folders\Startup
> >
> > 8. There is a 1 in 20 chance that on October 16th of any
> > year,
the
> > worm will recursively delete all files and folders on the C drive.
> > This payload functions only on computers which use the date
format
> > D/M/Y (as opposed to M/D/Y or similar formats).
> >
> > Additionally, the payload will always activate immediately,
> > regardless of date and date format, if the file attached to the worm
> > contains the sequence "FA2" without the letters "sc" following
> immediately.
> >
> > 9. If this payload activates, the file
> > C:\Recycled\Sircam.sys is created and filled with text until there
> > is no remaining disk space. The text is one of two strings:
> > a.. [SirCam_2rp_Ein_NoC_Rma_CuiTzeO_MicH_MeX]
> > or
> > b.. [SirCam Version 1.0 Copyright ¬ 2000 2rP Made in /
> > Hecho
> en -
> > Cuitzeo, Michoacan Mexico]
> >
> > 10. The worm contains its own SMTP engine which is used for
> > the email routine. It obtains email addresses through two different
> > methods:
> >
> > a.. It searches the folders that are referred to by the
registry
> > keys
> >
> > HKEY_CURRENT_USER\Software\Microsoft\
> > Windows\CurrentVersion\Explorer\
> > Shell Folders\Cache
> >
> > and
> >
> > HKEY_CURRENT_USER\Software\Microsoft\
> > Windows\CurrentVersion\Explorer\
> > Shell Folders\Personal
> >
> > for sho*., get*., hot*., *.htm files, and copies email
addresses
> > from there into the file %system%\sc?1.dll
> >
> > where ? is a different letter for each location, as
> > follows:
> >
> > a.. scy1.dll: addresses from %cache%\sho*., hot*., get*.
> > b.. sch1.dll: addresses from %personal%\sho*., hot*.,
get*.
> > c.. sci1.dll: addresses from %cache%\*.htm
> > d.. sct1.dll: addresses from %personal%\*.htm
> >
> > b.. It searches %system% and all subfolders for *.wab (all
> Windows
> > Address Books) and copies addresses from there into
> > %system%\scw1.dll.
> >
> > 11. It searches the folders referred to by the registry
> > keys:
> >
> > HKEY_CURRENT_USER\Software\Microsoft\
> > Windows\CurrentVersion\Explorer\
> > Shell Folders\Personal
> >
> > and
> >
> > HKEY_CURRENT_USER\Software\Microsoft\
> > Windows\CurrentVersion\Explorer\
> > Shell Folders\Desktop
> >
> > for files of type .doc, .xls, and .zip, and stores the
> > filenames
> in
> > %system%\scd.dll. One of these files will be appended to the worm's
> original
> > executable and this new file will be sent as the email attachment.
> >
> > The From: email address and mail server are taken from the
> registry.
> > If no email account exists, then the current user name will be
> > prepended
> to
> > "prodigy.net.mx", eg if the current user logged on as JSmith, then
> > the address will be "[EMAIL PROTECTED]". Then the worm will
> > attempt to connect to a mail server. This will be either the mail
> > server taken from
> the
> > registry, or one of
> >
> > a.. prodigy.net.mx
> > b.. goeke.net
> > c.. enlace.net
> > d.. dobleclick.com.mx
> >
> > The language used for the mail depends on the language used
> > by
the
> > sender. If the sender uses Spanish, then the mail will be in
> > Spanish, otherwise it will be in English. The attachment is chosen
> > randomly from
> the
> > list of files in the scd.dll.
> >
> >
> >
> >
> > Removal instructions:
> >
> > SARC has created a tool to remove this worm.
> >
> > CAUTION:
> >
> > a.. In some cases, if you have had NAV quarantine or delete
> infected
> > files, you will not be able to run .exe files, however you will
> > still be able to run the removal tool.
> > b.. If you are using Windows Me, and a copy of the worm is
> detected
> > in the _Restore folder when running the tool, the tool cannot remove
> > it
> from
> > that folder, as it is protected by Windows. See the document Cannot
> repair,
> > quarantine, or delete a virus found in the _RESTORE folder, and then
> > run
> the
> > tool again.
> > c.. If you are on a network, or have a full time connection
> > to
the
> > Internet, disconnect the computer from the network and the Internet.
> Disable
> > or password protect file sharing before reconnecting computers to
> > the network or to the internet. Because this worm spreads by using
> > shared folders on networked computers, to ensure that the worm does
> > not
reinfect
> > the computer after it has been removed, Symantec suggests sharing
> > with read-only access or using password protection. For instructions
> > on how
to
> do
> > this, see your Windows documentation or the document How to
> > configure
> shared
> > Windows folders for maximum network protection.
> >
> > IMPORTANT: Do not skip this step. You must disconnect from
> > the network before attempting to remove this worm.
> >
> > d.. If a computer was infected more the once, as can happen
> > when using shared folders across a network, the Run32.exe file will
> > have been
> be
> > overwritten with an infected copy of the Rundll32.exe. If you see
> > more
> than
> > one entry of "@win \recycled\sirc32.exe" when performing the steps
> > in
the
> > section "To edit the Autoexec.bat file", do not attempt to rename
> > the
> file.
> > Instead, you must delete the Run32.exe and the Rundll32.exe files
> > and
then
> > extract an new copy of Rundll32.exe from a clean back up or from the
> Windows
> > installation CD. See your Windows documentation for information on
> > how
to
> do
> > this.
> >
> >
> > To obtain the W32.Sircam.Worm@mm removal tool, please click
> > here.
> >
> >
> > Manual Removal
> > If for any reason you cannot use or obtain the
> > W32.Sircam.Worm@mm removal tool, you must remove this worm manually.
> > To do this, you must:
> >
> > a.. Undo the change that it made to the registry key
> > HKEY_CLASSES_ROOT\exefile\shell\open\command
> > b.. Delete any files detected as W32.Sircam.Worm@mm.
> > c.. Use Windows Explorer to remove Sircam.sys (if it exists)
from
> > the Windows Recycle Bin.
> > d.. Remove the entry (if it exists) that the worm made to
> > the
file
> > Autoexec.bat, . (This will only be present if the worm has spread
> > across
a
> > network.)
> > e.. If the file \Windows\Run32.exe exists, rename it back to
> > \Windows\Rundll32.exe
> > See the sections that follow for detailed instructions.
> >
> > NOTE: If you are on a network, or have a full time connection
> > to
the
> > Internet, disconnect the computer from the network and the Internet.
> Follow
> > the removal procedure on all computers, including the server.
> > Disable or password protect file sharing before reconnecting
> > computers to the
network
> > or to the internet.
> >
> > CAUTION: Do not skip this step. You must disconnect from the
network
> > before attempting to remove this worm.
> >
> >
> > To edit the registry:
> > The worm modifies the registry such that an infected file is
> executed
> > every time that you run a .exe file. Follow these instructions to
> > fix
> this.
> >
> > Copy Regedit.exe to Regedit.com:
> > Because the worm modified the registry so that you cannot run
> > .exe files, you must first make a copy of the Registry Editor as a
> > file with
> the
> > .com extension, and then run that.
> >
> > 1. Do one of the following, depending on which operating
> > system
> you
> > are running:
> > a.. Windows 95/98 users: Click Start, point to Programs,
> > and
> click
> > MS-DOS Prompt.
> > b.. Windows ME users: Click Start, point to Programs,
> > point to Accessories, and then click MS-DOS Prompt.
> > c.. Windows NT/2000 users:
> > 1. Click Start, and click Run.
> > 2. Click Browse, and browse to the \Winnt folder.
> > 3. Double-click the Command.com file, and then click OK.
> >
> > 2. Type the following and then press Enter:
> >
> > copy regedit.exe regedit.com
> >
> > 3. Type the following and then press Enter:
> >
> > start regedit.com
> >
> > 1. Proceed to the section "To edit the registry and remove
> > keys
and
> > changes made by the worm" only after you have accomplished the
> > previous steps.
> >
> > NOTE: This will open the Registry Editor in front of the DOS
window.
> > After you finish editing the registry and have closed Registry
> > Editor,
> close
> > the DOS window.
> >
> > To edit the registry and remove keys and changes made by the
> > worm:
> >
> > CAUTION: We strongly recommend that you back up the system
registry
> > before making any changes. Incorrect changes to the registry can
> > result
in
> > permanent data loss or corrupted files. Please make sure you modify
> > only
> the
> > keys specified in this document. For more information about how to
> > back
up
> > the registry, please read How to back up the Windows registry before
> > proceeding with the following steps. If you are concerned that you
cannot
> > follow these steps correctly, then please do not proceed. Consult a
> computer
> > technician for more information.
> >
> > 1. Navigate to and select the following key:
> >
> > HKEY_CLASSES_ROOT\exefile\shell\open\command
> >
> > CAUTION: The HKEY_CLASSES_ROOT key contains many subkey
> > entries
> that
> > refer to other file extensions. One of these file extensions is
> > .exe. Changing this extension can prevent any files ending with an
> > .exe
> extension
> > from running. Make sure you browse all the way along this path until
> > you reach the \command subkey.
> > Do not modify the HKEY_CLASSES_ROOT\.exe key.
> > Do modify the HKEY_CLASSES_ROOT\exefile\shell\open\command
subkey
> > that is shown in the following figure:
> >
> >
> > <<=== NOTE: This is the key that you need to modify.
> >
> >
> > 2. Double-click the (Default) value in the right pane.
> > 3. Delete the current value data, and then type: "%1" %*
> > (That
is,
> > type the following characters:
> > quote-percent-one-quote-space-percent-asterisk.)
> >
> > NOTE: On Win9x and WinNT systems, the Registry Editor will
> > automatically enclose the value within quotation marks. When you
> > click
OK,
> > the (Default) value should look exactly like this: ""%1" %*" On
> > Win2k systems, the addtional quotation marks will not appear. On
> > Win2k
systems,
> > the (Default) value should look exactly like this: "%1" %*
> >
> > 4. Make sure you completely delete all value data in the
> > command
> key
> > prior to typing the correct data. If a space is left accidentally at
> > the beginning of the entry, any attempt to run program files will
> > result in
> the
> > error message, "Windows cannot find .exe." or "Cannot locate C:\
> > <path
and
> > file name>."
> > 5. Navigate to and select the following key:
> >
> > HKEY_LOCAL_MACHINE\Software\SirCam
> >
> > CAUTION: Make sure that you go all the way down to the
> > SirCam
key,
> > and that it is selected. It will look similar to the following
> > figure:
> >
> >
> >
> > 6. With the SirCam key selected, press Delete and then click
> > Yes
> to
> > confirm.. This will delete the key and all of its subkeys. Since
> > this
key
> > was created by the worm it can be safely deleted.
> > 7. Navigate to and select the following key:
> >
> > HKEY_LOCAL_MACHINE\Software\
> > Microsoft\Windows\CurrentVersion\RunServices
> >
> > 8. In the right pane, look for and select the value
> >
> > Driver32.
> >
> > 9. Press Delete, and then click Yes to confirm.
> >
> >
> > To remove the worm:
> > 1. Run LiveUpdate to make sure that you have the most recent
virus
> > definitions.
> > 2. Start Norton AntiVirus (NAV), and run a full system scan,
> making
> > sure that NAV is set to scan all files.
> > 3. Delete any files detected as W32.Sircam.Worm@mm.
> >
> > NOTE: If you are using Windows Me, and a copy of the worm is
> > detected in the _Restore folder, NAV cannot remove it from that
> > folder,
as
> > it is protected by Windows. See the document Cannot repair,
> > quarantine,
or
> > delete a virus found in the _RESTORE folder.
> >
> > To empty the Recycle Bin:
> > Because of the way that files are placed there in this case,
> > you cannot just click Empty Recycle Bin as you would with files that
> > are
> deleted
> > in the normal manner. Instead, use Windows Explorer to delete the
> > file C:\Recycled\Sircam.sys if it is present.
> >
> > To edit the Autoexec.bat file:
> > 1. Click Start, and click Run.
> > 2. Type the following, and then click OK.
> >
> > edit c:\autoexec.bat
> >
> > The MS-DOS Editor opens.
> >
> > 3. Remove the line "@win \recycled\sirc32.exe" if it is
> > present.
> >
> > CAUTION: If you see more then one entry of "@win
> > \recycled\sirc32.exe" in the Autoexec.bat file, it means that the
computer
> > was infected more the once. Because of this, the Run32.exe file will
have
> > been overwritten with an infected copy of the Rundll32.exe. As a
> > result,
> you
> > will not be able to rename the file to recover it as directed in the
next
> > section.
> >
> >
> > 4. Click File and then click Save.
> > 5. Exit the MS-DOS Editor
> >
> > To rename the Run32.exe file:
> > If this file exists, it should be renamed back to its original
name.
> >
> > CAUTION: If a computer was infected more the once, as can
> > happen
> when
> > using shared folders across a network, the Run32.exe file will have
> > been
> be
> > overwritten with an infected copy of the Rundll32.exe If you saw
> > more
than
> > one entry of "@win \recycled\sirc32.exe" when performing the steps
> > in
the
> > previous section, do not attempt to rename the file. Instead, you
> > must delete the Run32.exe and the Rundll32.exe files and then
> > extract an new
> copy
> > of Rundll32.exe from a clean back up or from the Windows
> > installation
CD.
> > See your Windows documentation for information on how to do this.
> >
> > 1. Click Start, point to Find or Search, and then click
> > Files or Folders.
> > 2. Make sure that "Look in" is set to (C:) and that Include
> > subfolders is checked.
> > 3. In the "Named" or "Search for..." box, type--or copy and
> > paste--the following file names:
> >
> > run32.exe
> >
> > 4. Click Find Now or Search Now.
> > 5. Right-click the Run32.exe file and then click Rename.
> > 6. Rename it to:
> >
> > rundll32.exe
> >
> > 7. Press Enter.
> >
> >
> >
> > Additional information:
> >
> > Configure Windows for maximum protection
> > Because this virus spreads by using shared folders on
> > networked computers, to ensure that the virus does not reinfect the
> > computer after
> it
> > has been removed, Symantec suggests sharing with read-only access or
using
> > password protection. For instructions on how to do this, see your
Windows
> > documentation or the document How to configure shared Windows
> > folders
for
> > maximum network protection.
> >
> >
> >
> >
> >
> > Write-up by: Peter Ferrie and Peter Szor
> >
> >
> >
> >
> >
>
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm