Email-Worm.Win32.Masana

Class Email-Worm
Platform Win32
Description

Technical Details

I-Worm.Masana is a worm virus spreading via the Internet as an attachment to infected emails. The worm itself is a Windows PE EXE file about 107Kb in size – ASPack compresses it, the decompressed size is about 138Kb, written in Delphi.

Infected messages contain the following:

Another variant is the same subject and body as above but in Russian.

The worm activates from infected email only when a user clicks on the attached file. The worm then installs itself into the system, runs its spreading routine and payload.

The worm has bugs in its code; as a result some of its routines don’t work.

Installing

While installing the worm copies itself into the Windows system directory with under the msys32.exe name and registers this file in the system registry (under Windows NT) or in the SYSTEM.INI (under Windows 9x) auto-run keys:

SYSTEM.INI
[boot]
shell=Explorer.exe msys32.exe -dontrunold

HKLMSoftwareMicrosoftWindowsCurrentVersionRun

Run as Administrator

Under Windows NT systems the worm gains Admin privileges. To do this the worm uses a breach in Windows NT security (so-called DepPloit exploit).

The Masana worm creates two additional files on disk that manage the exploit:

ERunAsX.exe
ERunAsX.dll

The worm then creates another copy of itself under the name EEXPLORER.EXE name and by using DepPLoit exploit starts this copy with administrator rights.

Spreading

To send infected messages the worm uses Windows MAPI functions.

To get victim email addresses Masana:

  1. looks for *.HTM* files and extracts email-like strings
  2. by using Windows MAPI functions it reads all unread messages from the Inbox and answers them.

Each time Masana is run it also sends infected message to the masyana@nm.ru address. This message looks as follows:

Subject: Masyanya!
Body: gygygy!
Attach: Masyanya.exe

Payload
On Mondays the worm starts a DoS (Denial of Service) attack on kavkaz.org.

Other
This worm also:

  • disables the MS Outlook Express 5.0 MAPISendMail warning.
  • adds to the system the user named masyanechkaa with Admin privileges (under Windows NT)

    I-Worm.Masana also contains the text string:

    I-Worm.Masyanya v1.0 8) Just a hello-world worm…

    The worm also creates an additional registry key that indicates the system
    is already infected:

    HKCUEnvironment
    ID = 1