Win32.Swen.A@mm( W32/Gibe@mm )
SYMPTOMS:- The user cannot run the registry editor
- Presence of files germs0.dbv and germs1.dbv in the Windows directory
- The registry keys [HKLM\Software\Microsoft\Windows\CurrentVersion\Run] and [HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System] are altered
- A file with 106.496 bytes in size, of a random name, in the Windows directory.
TECHNICAL DESCRIPTION:Win32.Swen.A@mm is an internet worm, which spreads mainly via e-mail, but also via Kazaa, Mirc. The worm usually comes as an e-mail. The subject and the body of the e-mail may vary, but the attachment is always 106.496 bytes long.
The worm may become active by running the infected attachment of an e-mail, or by running an infected file from the Mirc download folder, Kazaa, etc)
When arriving in an email message, the worm disguises as a Microsoft patch. The email messages are quite realistic and may fool some users to open the infected attachement.
Once ran, the worm checks if it’s already running; it does that by checking several registry keys; if the worm is already installed and running, it displays the following message box:
The worm alters several registry keys:
[HKCR\scrfile\shell\open\command] – this key will allow the worm to get executed when the user attempts to open a SCR (screen saver file)
[HKCR\exefile\shell\open\command] – this key will allow the worm to get executed when the user attempts to open an EXE (executable file)
[HKCR\batfile\shell\open\command] – this key will allow the worm to get executed when the user attempts to open a BAT (MS-DOS batch file)
[HKCR\piffile\shell\open\command] – this key will allow the worm to get executed when the user attempts to open a PIF file.
[HKCR\comfile\shell\open\command] – this key will allow the worm to get executed when the user attempts to open a COM file.
[HKCR\regfile\shell\open\command] – this key will allow the worm to get executed when the user attempts to open a registry file.
Also, the worm modifies the registry key [HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System] and adds the value of 1 (true) to the key “DisableRegistryTools”.
When the worm is active in memory, it periodically scans the windows registered in the system. If a window contains one of the strings below, it will receive a “PostQuitMessage”.
"_avp", "ackwin32", "anti-trojan", "aplica32", "apvxdwin", "autodown", "avconsol", "ave32", "avgcc32", "avgctrl", "avgw", "avkserv", "avnt", "avp", "avsched32", "avwin95"
"avwupd32", "blackd", "blackice", "bootwarn", "ccapp", "ccshtdwn", "cfiadmin", "cfiaudit", "cfind", "cfinet", "claw95", "dv95", "ecengine", "efinet32",
"esafe", "espwatch", "f-agnt95", "findviru", "fprot", "f-prot", "fprot95", "f-prot95"
"fp-win", "frw", "f-stopw", "gibe", "iamapp", "iamserv", "ibmasn", "ibmavsp"
"icload95", "icloadnt", "icmon", "icmoon", "icssuppnt", "icsupp"
"iface", "iomon98", "jedi", "kpfw32", "lockdown2000", "lookout", "luall", "moolive"
"mpftray", "msconfig", "nai_vs_stat", "navapw32", "navlu32", "navnt", "navsched"
"navw", "nisum", "nmain", "normist", "nupdate", "nupgrade", "nvc95", "outpost", "padmin", "pavcl", "pavsched", "pavw" , "pcciomon", "pccmain", "pccwin98", "pcfwallicon", "persfw", "pop3trap", "pview", "rav", "regedit", "rescue", "safeweb"
"serv95", "sphinx", "sweep", "tca", "tds2", "vcleaner", "vcontrol", "vet32", "vet95"
"vet98", "vettray", "vscan", "vsecomr", "vshwin32", "vsstat", "webtrap", "wfindv32"
If the worm is debugged (analysed), it displays the following message:
The worm gathers e-mail addresses from the infected user’s address book and uses its own SMTP engine to spread; Also the worm searches for email addresses in .EML, .WAB, .DBX, .MBX, .ASP, .HT* files.
The email message looks like the following:
FROM: "MS Corporation Security Division"
TO: "Commercial Partner"
SUBJECT: New Internet Critical Upgrade
this is the latest version of security update, the
"September 2003, Cumulative Patch" update which eliminates
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express.
Install now to help protect your computer
from these vulnerabilities, the most serious of which could
allow an attacker to run executable on your computer.
This update includes the functionality =
of all previously released patches.
System requirements: Windows 95/98/Me/2000/NT/XP
This update applies to:
- MS Internet Explorer, version 4.01 and later
- MS Outlook, version 8.00 and later
- MS Outlook Express, version 4.01 and later
Recommendation: Customers should install the patch =
at the earliest opportunity.
How to install: Run attached file. Choose Yes on displayed dialog box.
How to use: You don't need to do anything after installing this item.
Microsoft Product Support Services and Knowledge Base articles =
can be found on the Microsoft Technical Support web site.
For security-related information about Microsoft products, please =
visit the Microsoft Security Advisor web site
Thank you for using Microsoft products.
Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable =
to respond to any replies.
The names of the actual companies and products mentioned =
herein are the trademarks of their respective owners.
Copyright 2003 Microsoft Corporation.
The worm counts the number of infected computers; probably the virus writer needed hits
on its website; It used the http://ww2.fce.vutbr.cz/bin/counter.gif/link=bacillus hit count system.
When the user clicks the infected attachement, the worm takes control and installs itself into the system. Then, it fakes an error in the Windows Messaging API (MAPI) and asks the user to enter confidential informations like password, account, SMTP server, etc.
KaZaa spreading: the worm also gets the shared KaZaa directory and copies itself there with the following names:
'Virus Generator', 'Magic Mushrooms Growing', 'Cooking with Cannabis', 'Hallucinogenic Screensaver', 'My naked sister', 'XXX Pictures', 'Sick Joke', 'XXX Video', 'XP update', 'Emulator PS2', 'XboX Emulator', 'Sex', 'HardPorn', 'Jenna Jameson', '10.000 Serials', 'Hotmail hacker', 'Yahoo hacker', 'AOL hacker'.
It also disguises itself as removal tools for various worms like Klez, Sircam, etc.
The worm also uses NEWS servers; the list is stored as a resource, packed with MS-Compress inside the virus resource section. The worm attempts to post itself to a random News server (chosen from a list of 350 news servers).
Removal instructions:The BitDefender Virus Analyse Team has releasead a free removal tool for this particular virus.
Important: You will have to close all applications before running the tool (including the antivirus shields) and to restart the computer afterwards. Additionally you'll have to manually delete the infected files located in archives and the infected messages from your mail client.
The BitDefender Antisven-en.exe tool does the following:
You may also need to restore the affected files.
To prevent the virus from replicating itself from infected machines to clean machines, you should try to disinfect all computers in the network before rebooting any of them, or unplug the network cables.
ANALYZED BY:Mihai Chiriac BitDefender Virus Researcher
Bitdefender e-Guides Series
The Bitdefender e-Guides series is a learning initiative aiming to provide the Bitdefender reader and user community with valuable information about e-threats and the security issues of the IT&C realm, while also offering practical advice and feasible solutions to their on-line defense needs. The Bitdefender security analysts share their knowledge in malware prevention, identification and annihilation, with an emphasis on on-line privacy and different technologies, countermeasures and cybercrime prevention methods.
Covering topics that range from kids and family's on-line protection, safe social networking and preventing data safety breaches to securing enterprise environments, the e-Guides series is intended for a broad audience of small organizations and individual users concerned about the safety and integrity of their networks and systems. The e-Guides also address issues pertaining to the daily activity of IT&C Systems Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers.
Safe Blogging Guide
Tips and tricks on how to keep your blog and your identity safe
Blogging is one of the most popular forms of written expression on the web, with more than 150 million indexed blogs worldwide. While regular readers are looking for pieces of information and articles, cyber-crooks take a different interest in them. Finding private information and getting cheap storage space for their malware campaigns are only two of the multitude of users they may subject your blog to.
This material covers the basic guidelines for safe blogging and is especially focused on individual blogs that are either self-hosted or provided as a service by major blog providers.
Securing Wireless Networks Guide
Tips and tricks on how to shield your home network from intruders
This document is intended for computer users who have deployed or plan to deploy a home wireless network. At a time when wireless communication has become a significant part of our lives, cyber-criminals try to exploit every security breach in the wireless configuration in order to intercept traffic or use the internet connection for illegal purposes.
The following guide will teach you the best practices when using unsecured wireless networks, as well as how to properly configure your home router or access point to prevent others from abusing your network.
Protecting Children On-line Guide
How to secure and defend the digital experience of your kids
This document is intended for family, parents and teachers and its purpose is to help secure the digital activities of kids and teens. In an age when the mass production and accessibility of computers have turned these devices into regular family or household commodities, children get familiar with PCs and Internet from a very fresh age. Despite its obvious communication-related benefits, the WWW can also be a hazardous place for kids, with e-threats directly targeting their age group and their home or school computers.
This e-Guide covers the main risks and dangers for kids on-line, such as cyber-bulling, exposure to inappropriate content, on-line addiction and other harmful online actions, while also focusing on topics such as malware, phishing, ID theft and spam, to which teenagers, just as any other Internet users, are exposed nowadays. A Safety Tips section helps parents and teachers better understand and deal with these issues in relation to the kids.
Silver Surfers On-line Safety Guide
How to protect valuable ideas and assets from cyber-hacking
This document is intended for families and senior citizens and its purpose is to help them browse the web safely and enjoy their on-line activities.
At a first glance, it would appear that senior citizens are exposed to cybercrime just as much as any other inexperienced Internet user, irrespective of their age. However, as this e-Guide shows through several case studies, there are several risks and dangers targeting directly silver surfers, such as pension delivery and fallacious tax paying methods or income-related scams. Examples, tips and advice complement the case studies and provide readers with useful guidelines in their daily on-line routine.
Preventing Data Breaches Guide
How to protect valuable ideas and assets from cyber-hacking
The e-guide was designed to cover the various potential sore points of business data safety, from the matter of the network's physical integrity to the complicated mechanisms of business targeted cybercrime (e.g. banker Trojans, phishing). This material is also intended to match, though not in as much detail as a full-fledged technical description, the features of the various consumer and business oriented Bitdefender solutions to the situations in which they might come in handy to IT administrators.
Consulting this document would be useful in the process of deciding what's best for small to medium-sized networks security and a solid basis for further comparative research on this subject.
- Aggressive Advertisers Pose Privacy Risks
- Bitdefender Case Study: Kids and Online Threats
- Facebook Whitepaper
- Bitdefender Antivirus Technology
- B-HAVE ,The Road to Success
- The medium or the message? Dealing with image spam, December 2006, Virus Bulletin
- Fighting Image Spam
- Bitdefender NeuNet Antispam Technology
- Proactive security I body armor against business attacks
- Whitepaper-Emerging Threats to Business Security
- Securing the Uncertain Bitdefender's B-HAVE Proactive Technology for Defense against Versatile_Threats
- Securing E-Mail-The First Strategic Defense Line
- Virus Naming. The "Who's Who?" Dilemma
- Facebook – Another breach in the wall
- Bitdefender Active Virus Control: Proactive Protection Against New and Emerging Threats
Bitdefender E-Threats Landscape Reports
The purpose of this report is to provide a comprehensive investigation of the threats’ landscape. Bitdefender’s security experts thoroughly analyze and examine the menaces of the each semester, focusing on software vulnerabilities and exploits, different types of malware, as well as countermeasures, cyber crime prevention and law enforcement. The E-Threats Landscape Report concentrates mainly on the latest trends, but it also contains facts and data and concerning the previously investigated periods, as well as several predictions related to the upcoming semesters. This document is primarily intended for IT&C System’s Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers, but it also addresses issues pertaining to a broader audience, like small organizations or individual users concerned about the safety and integrity of their networks and systems.
H2 2012 E-Threat Landscape Report - Overview
For the first half of the year, zero-day vulnerabilities played an essential role in disseminating malware with exploit packs as a favorite vector of infection. The dangerous zero-day exploit in the Java Runtime Environment (CVE-2012-4681) was documented and proof of concept was added to Metasploit, which became public knowledge before a fix was made available.
As a direct result, three billion devices running Java were vulnerable to remote code exploitation for roughly 48 hours. A second exploit hit in September and targeted Internet Explorer 9. Successful exploitation would allow remote compromise of the system with the installation of the Poison Ivy backdoor. Both zero-day exploits were used in advanced persistent attacks.
2012 saw fluctuations in the amount of junk e-mail as a proportion of e-mail traffic. The year began with a slight decrease in spam e-mails, but spam constantly gained ground towards the middle of the year. According to data gathered from the Bitdefender Antispam lab, the second half saw growth again, with small variations towards the end of 2012. The increase in the number of junk e-mails was nonetheless minor, by only 5%, leading to a rough value of 73% of the total number of e-mails sent worldwide.
Download now the full H2 2012 E Threat Landscape Report (pdf)
Download now the overview H2 2012 E Threat Landscape Executive Summary (pdf)
Download now H1 2012 E Threat Landscape Report (pdf)
Download now H1 2011 E-Threats Landscape Report - Executive Summary (pdf)
Download now H2 2011 E-Threat Landscape Report (pdf)
Download now H2 2011 E-Threat Landscape Report - Executive Summary (pdf)
Download now H2 2010 E-Threats Landscape Report - Executive Summary (pdf)
Download now H2 2010 E-Threats Landscape Report (pdf)
Download now H1 2010 E-Threats Landscape Report - Executive Summary (pdf)
Download now H1 2010 E-Threats Landscape Report (pdf)
Download now H1 2009 Malware and Spam Review Executive Summary (pdf)
Download now H1 2009 E-Threats Landscape Report (pdf)
Download now H2 2009 Malware and Spam Review (pdf)
Download now H2 2009 E-Threats Landscape Report - Executive Summary (pdf)
Download now H1 2008 E-Threats Landscape Report (pdf)
Download now H2 2008 E-Threats Landscape Report (pdf)
Who to ask? Below you have a list of all of our media representatives who are ready to answer any question you might have.
Head of Communications
+40 723 399 778
Global PR Manager
+40 731 496 792
+40 725 354 897