Worm:Win32/Kolabc.C is a worm that can spread to removable drives and to other networked computers by exploiting vulnerabilities described in Microsoft Security Bulletins
MS03-039,
MS06-040 and
MS08-067. The worm contains backdoor functionality that allows an attacker remote access and control of the infected computer.
Installation
When run, Worm:Win32/Kolabc.C copies itself to the Windows fonts folder as in this example:
%windir%\fonts\unwise_.exe
The worm makes the following change to the registry:
Adds value: "msgone"
With data: "%windir%\fonts\unwise_.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions
Spreads via…
Removable drives
Worm:Win32/Kolabc.C may copy itself to removable drives. The worm creates a "recycle bin" folder on the target drive and drops a copy of itself within the folder as in the following example:
<drive:>\Recycler\S-x-x-xx-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxx-xxxx\<Win32/Kolabc.C file name>
The worm then writes an autorun configuration file named "autorun.inf" pointing to the worm copy. When the drive is accessed from a machine supporting the Autorun feature, the worm is launched automatically.
Network shares
The worm attempts to infect other computers that may connect to the infected computer via a mapped network share. The worm creates a unique "Desktop.ini" file that changes the icon of the worm executable to appear as a "recycle bin". Opening the "recycle bin" executes the worm copy.
Exploit
The worm attempts to spread to other computers across a network by exploiting vulnerabilities described in Microsoft Security Bulletins
MS03-039,
MS06-040 and
MS08-067.
Payload
Modifies Windows security settings
Worm:Win32/Kolabc.C modifies certain system settings, such as Windows firewall and security notifications, by modifying the registry.
Disables Windows firewall:
Adds value: "EnableFirewall"
With data: "0"
To subkeys:
HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile
Adds the worm file name to the list of trusted processes that can connect to the network:
Adds value: "unwise_.exe"
With data: "unwise_.exe:*:enabled:system"
To subkeys: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List
Disables Windows Security Center security notification for "antivirus disabled":
Adds value: "AntiVirusDisableNotify"
With data: "1"
To subkey: HKLM\SOFTWARE\Microsoft\Security Center
Prevents the Microsoft Malicious Software Removal Tool (MSRT) from reporting when an infection has been found in the system:
Adds value: "DontReportInfectionInformation"
With data: "1"
To subkey: HKLM\SOFTWARE\Policies\Microsoft\MRT
Disables the download and installation of Windows XP SP2 via Automatic Updates:
Modifes value: "DoNotAllowXPSP2"
With data:"1"
To subkey: HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
Disables Distributed COM (DCOM) on the system:
Modifes value: "EnableDCOM"
With data:"n"
To subkey: HKLM\Software\Microsoft\OLE
Adds restrictions for anonymous connections:
Modifes value: "restrictanonymous"
With data:"1"
To subkey: HKLM\SYSTEM\CurrentControlSet\Control\Lsa
Sets the highest port number that can be assigned:
Adds value: "MaxUserPort"
With data: "fffe"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Allow raw socket for users with non-administrator account types:
Adds value: "DisableRawSecurity"
With data:"1"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\Afd\Parameters
Disable Windows File Protection:
Adds value: "SFCDisable"
With data:"4294967197"
To subkey: HKLM\Software\Policies\Microsoft\Windows NT\Windows File Protection
Increases the number of connections allowed when connected to the Internet:
Adds value: "MaxConnectionsPer1_0Server"
With data: “fffe"
To subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings
The worm makes an additional registry modification that does not affect the time Windows will wait before terminating a service.
Adds value: "WaitToKillServiceT"
With data:"5000"
To subkey: HKLM\SYSTEM\CurrentControlSet\Control
Allows backdoor access and control
Worm:Win32/Kolabc.C attempts to open certain ports to connect to one of the following servers and await commands from a remote attacker:
In the wild, this worm was observed to connect with the first listed server using TCP port 3305.
Analysis by Wei Li