Threat behavior
Worm:Win32/Nuwar.JK is a mass-mailing email worm that sends a Trojan dropper via email. When the attachment is opened, it installs a downloader Trojan which in turn downloads an encrypted copy of the email worm component and runs it. The email worm component does the following:
- Drops a file with a random name into the directory in which it is executed.
- This file creates a driver in the Windows system folder (by default, on Windows XP and Vista, this folder is C:\Windows\System32. The dropped file is usually named wincom32.sys.
- This driver contains the main payload functionality of the worm, and is used to inject an embedded dll into running processes which enlists the computer in a private peer-to-peer (p2p) network.
- The injected dll drops an initialization file wincom32.ini in the Windows system folder which contains its network peer information. This file is detected as Worm:Win32/Nuwar!ini.
- The driver is added as a service to run whenever Windows starts. The service is called 'wincom32'
- On Windows XP or earlier, the driver will stealth references to 'wincom32' so that the driver and its service cannot be seen.
Email Characteristics
To obtain addresses in order to spread, Worm:Win32/Nuwar.JK enumerates the first 30000 files under 122k on all fixed and remote drives. The worm does not use domains containing 'microsoft' or domains ending in .gov or .mil. The worm performs DNS queries on the email address domains to check their legitimacy. The worm will spoof the sender address to be a randomly chosen name from a list from the yahoo.com domain. The message body will be blank. The subject line may be one of the following:
USA Missle Strike: Iran War just have started
Missle Strike: The USA kills more then 20000 Iranian citizens
Missle Strike: The USA kills more then 1000 Iranian citizens
Missle Strike: The USA kills more then 10000 Iranian citizens
Israel Just Have Started World War III
USA Just Have Started World War III
Iran Just Have Started World War III
The following attachment names are used:
- More.exe
Read More.exe
Click Here.exe
Click Me.exe
Read Me.exe
Movie.exe
News.exe
Video.exe
Worm:Win32/Nuwar.JK attempts to stop processes with process or window names containing one of the following substrings:
Mcafee
taskmgr
hijack
f-pro
lockdown
msconfig
firewall
blackice
avg
vsmon
zonea
spybot
nod32
reged
rav
nav
avp
troja
viru
anti
alsys
Registry Editor
Prevention