Thursday, April 14, 2011

Remove Neeris.Worm.gen!c

Remove Neeris.Worm.gen!c

Also Known As:
Win32/Neeris.worm.101376 (AhnLab)
Win32/IRCBot.KA (CA)
Win32/AutoRun.IRCBot.Q (ESET)
Worm.Win32.AutoRun.fla (Kaspersky)
W32/IRCbot.gen.a (McAfee)
W32/Neeris-A (Sophos)
W32.Spybot.Worm (Symantec)
Summary

Worm:Win32/Neeris.gen!C is the generic detection for a member of the Win32/Neeris family of worms. These worms spread via MNS Messenger and may contain backdoor functionalities. New variants of this worm may exploit a vulnerability in the Windows Server Service (srvsvc) in computers that have not yet applied http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Microsoft Security Bulletin MS08-067.

Symptoms
You may be informed by your MSN Messenger contacts that your account has attempted or is attempting to send them a ZIP archive, or you may notice an unknown TFTP transaction in your logs.

Technical Information
Worm:Win32/Neeris.gen!C is the generic detection for a member of the Win32/Neeris family of worms. These worms spread via MNS Messenger and may contain backdoor functionalities. New variants of this worm may exploit a vulnerability in the Windows Server Service (srvsvc) in computers that have not yet applied Microsoft Security Bulletin MS08-067.

Installation
Different samples of Win32/Neeris.gen!C install themselves in systems in varying ways. They commonly copy themselves in the Windows or Windows system folder and modify the system registry so that they run every time Windows starts.
For example, one variant of this family copies itself to a subfolder of the Windows folder as VMwareService.exe and makes the following registry autostart modification:
Adds value: "GON"
With data: "%windir%\system\VMwareService.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions
Another variant of this worm may copy itself as the following file
%windir%\system\netmon.exe

The worm may be present as a file with a two digit name and .SCR extension such as 21.scr.
The registry is modified to run the dropped worm copy at each Windows start. Other registry data may be created to execute the worm when booting in Windows safe mode.
Adds value: "netmon"
With data: "%windir%\system\netmon.exe"
To subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Adds value: "(default)"
With data: "service"
To subkey: HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\netmon32

Adds value: "(default)"
With data: "service"
To subkey: HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Network\netmon32




Win32/Neeris.gen!C spreads by sending a copy of itself to all of a user's contacts in MSN Messenger. The attached copy is usually a ZIP archive containing the EXE copy of the worm.
This worm may also drop a copy of itself and a corresponding autorun.inf file into all available removable drives. The function of the autorun.inf file is to ensure that the worm copy automatically runs when the drive is accessed and Autoplay is enabled. The image below illustrates how a user could potentially launch the worm when accessing an infected share:
Filenames of the dropped worm copy vary but may have a name such as 'smartkey.exe'.

Bypass Windows Firewall

This worm may add itself as an "authorized application" by modifying the Windows firewall policy stored in the registry.

Adds value: "%windir%\system\netmon.exe"
With data: "%windir%\system\netmon.exe:*:microsoft enabled"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications\List

Win32/Neeris.gen!C may connect to a predefined Internet Relay Channel (IRC) server using a specified port number such as TCP port 6667 or 449. Once connected, it awaits commands from a remote attacker.

Win32/Neeris.gen!C may drop a driver '\drivers\sysdrv32.sys' which patches TCP/IP to remove connection throttling in Windows XP SP2 computers.

Analysis by Jireh Sanico

Recovery Steps Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft online scanner (http://safety.live.com).

No comments:

Post a Comment