WORM_ZIMUS.A


 PLATFORM:

Windows 98, ME, NT, 2000, XP, Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Worm

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Copies itself in all available physical drives, Propagates via removable drives

Trend Micro has flagged this {malware/spyware type} as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically,it deletes important files that are needed during in system bootup.

To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.

This worm arrives via removable drives. It may be unknowingly downloaded by a user while visiting malicious websites.

It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.

  TECHNICAL DETAILS

File Size:

Varies

File Type:

PE

Memory Resident:

Yes

Initial Samples Received Date:

27 Jan 2010

Payload:

Deletes files

Arrival Details

This worm arrives via removable drives.

It may be unknowingly downloaded by a user while visiting malicious websites.

Installation

This worm drops the following copies of itself into the affected system:

  • %System%\tokset.dll

(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)

It drops the following files:

  • %Program Files%\Dump\dump.exe - non-malicious
  • %User Temp%\instdrv.exe - non-malicious
  • %System%\drivers\mseu.sys - used by this malware to delete files
  • %System%\drivers\mstart.sys - used by this malware to delete files
  • %System%\mseus.exe - contains the main worm routine and MBR infection routine
  • %System%\ainf.inf - copy of autorun.inf
  • %User Temp%\Regini.exe - non-malicious file
  • %System%\ainf.inf - copy of autorun.inf
  • %System%\drivers\mseu.sys - used by this malware to delete files also detected as WORM_ZIMUS.A
  • %System%\drivers\mstart.sys - used by this malware to delete files also detected as WORM_ZIMUS.A
  • %System%\mseus.exe - contains the main worm routine and MBR infection routine also detected as WORM_ZIMUS.A

(Note: %Program Files% is the default Program Files folder, usually C:\Program Files.. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.. %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)

It creates the following folders:

  • %Program Files%\Dump

(Note: %Program Files% is the default Program Files folder, usually C:\Program Files.)

Autostart Technique

This worm registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\Eventlog\System\
MSTART
(Default) =  

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\Mseu
(Default) =  

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\MSTART
(Default) =  

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\UnzipService
(Default) =  

It adds the following registry entries to enable its automatic execution at every system startup:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
Dump = %Program Files%\Dump\Dump.exe

Other System Modifications

This worm deletes the following files:

  • %User Temp%\Dump.ini
  • %User Temp%\mseu.ini
  • %User Temp%\mseus.ini
  • %User Temp%\Regini.exe
  • %User Temp%\instdrv.exe
  • C:\BOOT.INI
  • C:\BOOTMGR
  • C:\BOOTMGR.BAK
  • C:\BOOTSECT
  • C:\BOOTSECT.BAK
  • C:\Documents and Settings\*.*
  • C:\Documents and Settings\Administrator\My Documents\*.*
  • C:\HYBERFILE.SYS
  • C:\NTDETECT.COM
  • C:\NTLDR
  • C:\System Volume Information\*.*
  • C:\Users\*.*
  • C:\Users\Administrator\*.*
  • D:\Documents and Settings\*.*
  • D:\Documents and Settings\Administrator\My Documents\*.*
  • D:\System Volume Information\*.*
  • D:\Users\*.*
  • D:\Users\Administrator\*.*
  • E:\Documents and Settings\*.*
  • E:\Documents and Settings\Administrator\My Documents\*.*
  • E:\System Volume Information\*.*
  • E:\Users\*.*
  • E:\Users\Administrator\*.*
  • F:\Documents and Settings\*.*
  • F:\Documents and Settings\Administrator\My Documents\*.*
  • F:\System Volume Information\*.*
  • F:\Users\*.*
  • F:\Users\Administrator\*.*
  • G:\Documents and Settings\*.*
  • G:\Documents and Settings\Administrator\My Documents\*.*
  • G:\System Volume Information\*.*
  • G:\Users\*.*
  • G:\Users\Administrator\*.*
  • H:\Documents and Settings\*.*
  • H:\Documents and Settings\Administrator\My Documents\*.*
  • H:\System Volume Information\*.*
  • H:\Users\*.*
  • H:\Users\Administrator\*.*
  • I:\Documents and Settings\*.*
  • I:\Documents and Settings\Administrator\My Documents\*.*
  • I:\System Volume Information\*.*
  • I:\Users\*.*
  • I:\Users\Administrator\*.*
  • J:\Documents and Settings\*.*
  • J:\Documents and Settings\Administrator\My Documents\*.*
  • J:\System Volume Information\*.*
  • J:\Users\*.*
  • J:\Users\Administrator\*.*

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.)

Propagation

This worm drops the following copy(ies) of itself in all removable drives:

  • zipsetup.exe

It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.

The said .INF file contains the following strings:

[autorun]
shellexecute=zipsetup.exe /H

  SOLUTION

Minimum Scan Engine:

8.900

VSAPI OPR PATTERN File:

6.827.00

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Scan your computer with your Trend Micro product and note files detected as WORM_ZIMUS.A


Did this description help? Tell us how we did.