SlideShare a Scribd company logo
1 of 2
Download to read offline
Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1
New worm infects removable drives.
Yet another worm that infects removable drives was discovered.
The Win32/SillyAutorun.FTW was recently found in the wild. The worm is written with Microsoft Visual
Studio and uses injection engine - worm's code overwrites the original code in memory. When it runs on
infected machine, it first
copies itself to %ApplicationData%E-73473-3674-74335msnrsmsn.exe; where %ApplicationData% is
application data folder of the current user, for example:
C:Documents and SettingsAdministratorApplication DataE-73473-3674-74335msnrsmsn.exe.
The worm terminates its initial process and runs the cloned file. Then writes registry key to run after
every reboot:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunMicrosoft3264OSUpdate
Then the worm verifies whether removable drive is connected to the computer and starts infecting it.
A difference from previously found worms is that the drive is infected not immediately but after some
time, also all the infected files are written not at once, but one by one. This is a human engineering
trick that prevents worm detection by infected users - a user inserts a USB key and does not see any
immediate change, so the user does not suspect that the computer is actually infected. The method of
infection is similar to known ones, but has some differences - link files are used. For every folder in the
root directory of the drive the worm creates link file named after the folder with appended "s", for
example folder "Documents" it creates "Documentss.lnk". The folders attributes are changed to hidden
and system, so they are invisible in Explorer if option "Show hidden files" is not chosen. The worm
additionally changes this option at infected computer via registry.
The links are seen instead of folders, a user inserts infected USB drive, clicks on the link of the worm
instead of the folder and gets infected. Further the worm creates hidden folder "Drivers" on infected
USB and copy itself named after the hidden folder, for example:
F:Documents - hidden folder
F:Documentss.lnk - link to worm
F:DriversDocuments.exe - worm's copy responsible for this folder
The folder's icon is icon of shell - same as icon of folder. Clicking the link runs a copy of the worm that
infects the computer and then displays the content of the folder to avoid suspicion.
Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2
The recommendations to avoid the infection are same as ones for similar worms. Turn ON the options
to "Show hidden files" and "Show extension" in Explorer. Or, even better, do not use Explorer, use
different file manager instead, since Explorer is often a victim of malware.
Additionally, the worm uses IRC to send messages in different languages with infected attachment, for
example:
belas fotos nao de voce
vakre bilder fra deg.
hoi niet mooi fotos
ich sag nur geile fotos.
About TotalDefense:
Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions.
We offer a broad portfolio of leading security products for the consumer market used by over four
million consumers worldwide. Our solutions also include the industry’s first complete cloud security
platform, providing fully integrated endpoint, web and email security through a single Web-based
management console with a single set of enforceable security policies
Total Defense is a former business of CA Technologies, one of the largest software companies in the
world, and has operations in New York, California, Europe, Israel and Asia.
Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and
businesses.

More Related Content

Viewers also liked

Elektronska Oglasna Deska
Elektronska Oglasna DeskaElektronska Oglasna Deska
Elektronska Oglasna Deskabstih1
 
Social Enginerring
Social EnginerringSocial Enginerring
Social EnginerringLusi Efrenti
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYCollen Tshebo
 
Práctica Google Earth
Práctica Google Earth Práctica Google Earth
Práctica Google Earth RafaelBlanco92
 
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)Tsukasa Makino
 
10 sample questions about Dynamic Attributes (CX-310-083)
10 sample questions about Dynamic Attributes (CX-310-083)10 sample questions about Dynamic Attributes (CX-310-083)
10 sample questions about Dynamic Attributes (CX-310-083)Maarten Storm
 
4gcounts Webinar Q3 2011
4gcounts Webinar Q3 20114gcounts Webinar Q3 2011
4gcounts Webinar Q3 2011Wi-Fi 360
 
Security Chalanges Before Euro 2012 in Poland
Security Chalanges Before Euro 2012 in PolandSecurity Chalanges Before Euro 2012 in Poland
Security Chalanges Before Euro 2012 in PolandSECURITYLLC
 

Viewers also liked (10)

Elektronska Oglasna Deska
Elektronska Oglasna DeskaElektronska Oglasna Deska
Elektronska Oglasna Deska
 
Social Enginerring
Social EnginerringSocial Enginerring
Social Enginerring
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY
 
Key Storage
Key StorageKey Storage
Key Storage
 
Práctica Google Earth
Práctica Google Earth Práctica Google Earth
Práctica Google Earth
 
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
高度Ict利活用人材育成推進会議プレゼン(1124) final(改)
 
10 sample questions about Dynamic Attributes (CX-310-083)
10 sample questions about Dynamic Attributes (CX-310-083)10 sample questions about Dynamic Attributes (CX-310-083)
10 sample questions about Dynamic Attributes (CX-310-083)
 
4gcounts Webinar Q3 2011
4gcounts Webinar Q3 20114gcounts Webinar Q3 2011
4gcounts Webinar Q3 2011
 
Security Chalanges Before Euro 2012 in Poland
Security Chalanges Before Euro 2012 in PolandSecurity Chalanges Before Euro 2012 in Poland
Security Chalanges Before Euro 2012 in Poland
 
l-rubysocks-a4
l-rubysocks-a4l-rubysocks-a4
l-rubysocks-a4
 

Recently uploaded

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Win32/SillyAutorun.FTW worm infects removable drives – TotalDefense Blog

  • 1. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1 New worm infects removable drives. Yet another worm that infects removable drives was discovered. The Win32/SillyAutorun.FTW was recently found in the wild. The worm is written with Microsoft Visual Studio and uses injection engine - worm's code overwrites the original code in memory. When it runs on infected machine, it first copies itself to %ApplicationData%E-73473-3674-74335msnrsmsn.exe; where %ApplicationData% is application data folder of the current user, for example: C:Documents and SettingsAdministratorApplication DataE-73473-3674-74335msnrsmsn.exe. The worm terminates its initial process and runs the cloned file. Then writes registry key to run after every reboot: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunMicrosoft3264OSUpdate Then the worm verifies whether removable drive is connected to the computer and starts infecting it. A difference from previously found worms is that the drive is infected not immediately but after some time, also all the infected files are written not at once, but one by one. This is a human engineering trick that prevents worm detection by infected users - a user inserts a USB key and does not see any immediate change, so the user does not suspect that the computer is actually infected. The method of infection is similar to known ones, but has some differences - link files are used. For every folder in the root directory of the drive the worm creates link file named after the folder with appended "s", for example folder "Documents" it creates "Documentss.lnk". The folders attributes are changed to hidden and system, so they are invisible in Explorer if option "Show hidden files" is not chosen. The worm additionally changes this option at infected computer via registry. The links are seen instead of folders, a user inserts infected USB drive, clicks on the link of the worm instead of the folder and gets infected. Further the worm creates hidden folder "Drivers" on infected USB and copy itself named after the hidden folder, for example: F:Documents - hidden folder F:Documentss.lnk - link to worm F:DriversDocuments.exe - worm's copy responsible for this folder The folder's icon is icon of shell - same as icon of folder. Clicking the link runs a copy of the worm that infects the computer and then displays the content of the folder to avoid suspicion.
  • 2. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2 The recommendations to avoid the infection are same as ones for similar worms. Turn ON the options to "Show hidden files" and "Show extension" in Explorer. Or, even better, do not use Explorer, use different file manager instead, since Explorer is often a victim of malware. Additionally, the worm uses IRC to send messages in different languages with infected attachment, for example: belas fotos nao de voce vakre bilder fra deg. hoi niet mooi fotos ich sag nur geile fotos. About TotalDefense: Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions. We offer a broad portfolio of leading security products for the consumer market used by over four million consumers worldwide. Our solutions also include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia. Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and businesses.