This worm uses the Kazaa file exchange P2P network to spread itself. The Kazaa network allows its users to exchange files with each other using the Kazaa client software. To learn more about the Kazaa network visit their site at: http://www.kazaa.com.
Benjamin is written in Borland Delphi and is approximately 216 Kb in size – it is compressed by the AsPack utility. The size of a file can vary greatly as the worm ends each file with “dust” for masking.
Firstly the worm shows a false error report:
Benjamin then copies itself to the %WinDir%SYSTEM directory as
and creates two keys in the system registry:
The worm executes after system restarts.
Spreading can most likely only take place if the
KaZaa P2P client (software) is installed. Benjamin reads the system registry for information on the Kasaa client and creates the
that registers as the directory accessible to all
KaZaa network users. It fills this directory with copies of itself listed under
numerous various names from a list contained in the body of the worm.
Spreading occurs as follows. A “victim” searching for a file in the KaZaa network finds it in the list of accessible files on already
infected machine. Not suspecting a problem the user downloads this file and opens it, thus infecting his or her own machine.
The worm opens the benjamin.xww.de Web-site to display an advertisement.
|Find out the statistics of the threats spreading in your region|