SlideShare a Scribd company logo
1 of 2
Download to read offline
Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1
New worm infects removable drives.
Yet another worm that infects removable drives was discovered.
The Win32/SillyAutorun.FTW was recently found in the wild. The worm is written with Microsoft Visual
Studio and uses injection engine - worm's code overwrites the original code in memory. When it runs on
infected machine, it first
copies itself to %ApplicationData%E-73473-3674-74335msnrsmsn.exe; where %ApplicationData% is
application data folder of the current user, for example:
C:Documents and SettingsAdministratorApplication DataE-73473-3674-74335msnrsmsn.exe.
The worm terminates its initial process and runs the cloned file. Then writes registry key to run after
every reboot:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunMicrosoft3264OSUpdate
Then the worm verifies whether removable drive is connected to the computer and starts infecting it.
A difference from previously found worms is that the drive is infected not immediately but after some
time, also all the infected files are written not at once, but one by one. This is a human engineering
trick that prevents worm detection by infected users - a user inserts a USB key and does not see any
immediate change, so the user does not suspect that the computer is actually infected. The method of
infection is similar to known ones, but has some differences - link files are used. For every folder in the
root directory of the drive the worm creates link file named after the folder with appended "s", for
example folder "Documents" it creates "Documentss.lnk". The folders attributes are changed to hidden
and system, so they are invisible in Explorer if option "Show hidden files" is not chosen. The worm
additionally changes this option at infected computer via registry.
The links are seen instead of folders, a user inserts infected USB drive, clicks on the link of the worm
instead of the folder and gets infected. Further the worm creates hidden folder "Drivers" on infected
USB and copy itself named after the hidden folder, for example:
F:Documents - hidden folder
F:Documentss.lnk - link to worm
F:DriversDocuments.exe - worm's copy responsible for this folder
The folder's icon is icon of shell - same as icon of folder. Clicking the link runs a copy of the worm that
infects the computer and then displays the content of the folder to avoid suspicion.
Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2
The recommendations to avoid the infection are same as ones for similar worms. Turn ON the options
to "Show hidden files" and "Show extension" in Explorer. Or, even better, do not use Explorer, use
different file manager instead, since Explorer is often a victim of malware.
Additionally, the worm uses IRC to send messages in different languages with infected attachment, for
example:
belas fotos nao de voce
vakre bilder fra deg.
hoi niet mooi fotos
ich sag nur geile fotos.
About TotalDefense:
Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions.
We offer a broad portfolio of leading security products for the consumer market used by over four
million consumers worldwide. Our solutions also include the industry’s first complete cloud security
platform, providing fully integrated endpoint, web and email security through a single Web-based
management console with a single set of enforceable security policies
Total Defense is a former business of CA Technologies, one of the largest software companies in the
world, and has operations in New York, California, Europe, Israel and Asia.
Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and
businesses.

More Related Content

Viewers also liked

Elektronska Oglasna Deska
Elektronska Oglasna DeskaElektronska Oglasna Deska
Elektronska Oglasna Deska
bstih1
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY
Collen Tshebo
 
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
Tsukasa Makino
 

Viewers also liked (10)

Elektronska Oglasna Deska
Elektronska Oglasna DeskaElektronska Oglasna Deska
Elektronska Oglasna Deska
 
Social Enginerring
Social EnginerringSocial Enginerring
Social Enginerring
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY
 
Key Storage
Key StorageKey Storage
Key Storage
 
Práctica Google Earth
Práctica Google Earth Práctica Google Earth
Práctica Google Earth
 
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
 
10 sample questions about Dynamic Attributes (CX-310-083)
10 sample questions about Dynamic Attributes (CX-310-083)10 sample questions about Dynamic Attributes (CX-310-083)
10 sample questions about Dynamic Attributes (CX-310-083)
 
4gcounts Webinar Q3 2011
4gcounts Webinar Q3 20114gcounts Webinar Q3 2011
4gcounts Webinar Q3 2011
 
Security Chalanges Before Euro 2012 in Poland
Security Chalanges Before Euro 2012 in PolandSecurity Chalanges Before Euro 2012 in Poland
Security Chalanges Before Euro 2012 in Poland
 
l-rubysocks-a4
l-rubysocks-a4l-rubysocks-a4
l-rubysocks-a4
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Win32/SillyAutorun.FTW worm infects removable drives – TotalDefense Blog

  • 1. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1 New worm infects removable drives. Yet another worm that infects removable drives was discovered. The Win32/SillyAutorun.FTW was recently found in the wild. The worm is written with Microsoft Visual Studio and uses injection engine - worm's code overwrites the original code in memory. When it runs on infected machine, it first copies itself to %ApplicationData%E-73473-3674-74335msnrsmsn.exe; where %ApplicationData% is application data folder of the current user, for example: C:Documents and SettingsAdministratorApplication DataE-73473-3674-74335msnrsmsn.exe. The worm terminates its initial process and runs the cloned file. Then writes registry key to run after every reboot: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunMicrosoft3264OSUpdate Then the worm verifies whether removable drive is connected to the computer and starts infecting it. A difference from previously found worms is that the drive is infected not immediately but after some time, also all the infected files are written not at once, but one by one. This is a human engineering trick that prevents worm detection by infected users - a user inserts a USB key and does not see any immediate change, so the user does not suspect that the computer is actually infected. The method of infection is similar to known ones, but has some differences - link files are used. For every folder in the root directory of the drive the worm creates link file named after the folder with appended "s", for example folder "Documents" it creates "Documentss.lnk". The folders attributes are changed to hidden and system, so they are invisible in Explorer if option "Show hidden files" is not chosen. The worm additionally changes this option at infected computer via registry. The links are seen instead of folders, a user inserts infected USB drive, clicks on the link of the worm instead of the folder and gets infected. Further the worm creates hidden folder "Drivers" on infected USB and copy itself named after the hidden folder, for example: F:Documents - hidden folder F:Documentss.lnk - link to worm F:DriversDocuments.exe - worm's copy responsible for this folder The folder's icon is icon of shell - same as icon of folder. Clicking the link runs a copy of the worm that infects the computer and then displays the content of the folder to avoid suspicion.
  • 2. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2 The recommendations to avoid the infection are same as ones for similar worms. Turn ON the options to "Show hidden files" and "Show extension" in Explorer. Or, even better, do not use Explorer, use different file manager instead, since Explorer is often a victim of malware. Additionally, the worm uses IRC to send messages in different languages with infected attachment, for example: belas fotos nao de voce vakre bilder fra deg. hoi niet mooi fotos ich sag nur geile fotos. About TotalDefense: Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions. We offer a broad portfolio of leading security products for the consumer market used by over four million consumers worldwide. Our solutions also include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia. Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and businesses.