Worm.Win32.Stuxnet

Detect Date 07/15/2010
Class Worm
Platform Win32
Description

Using the driver:

%System%driversmrxnet.sys

The rootkit connects as a driver filter to the following file system arrangements:




FileSystemntfs



FileSystemfastfat



FileSystemcdfs



and thereby obtains control of the infected computer’s file system. The rootkit hides files with names like this:

~WTR<rnd>.tmp

where <rnd> is a random four-digit number, e.g.:

~WTR4132.tmp



~WTR4141.tmp



It also hides files with the extension LNK and a file size equal to 4171 bytes.

The rootkit file has a Realtek Semiconductor Corp digital signature.

It contains the following string:




b:myrtussrcobjfre_w2k_x86i386guava.pdb

Using the driver:

%System%driversmrxcls.sys

The malicious program injects malicious code into the user mode’s processes. To do this, it loads a DLL dynamic library into the following system processes:




svchost.exe



services.exe



lsass.exe



after which, their module lists contain libraries with names like this:




kernel32.dll.aslr.<rnd>



shell32.dll.aslr.<rnd>



where <rnd> is a random hexadecimal number.

The injected code is found in the file:

%WinDir%infoem7A.PNF

in encrypted form.

The injected code contains the malicious program’s main functionality. This includes:

  • Propagation via removable media.
  • Monitoring for the operation of the Siemens Step7 system. To do this, the rootkit driver injects its intermediary library to the process s7tgtopx.exe, replacing the original s7otbxsx.dll, which emulates the operation of the following API functions:
    
    
    
    s7_event
    
    
    
    s7ag_bub_cycl_read_create
    
    
    
    s7ag_bub_read_var
    
    
    
    s7ag_bub_write_var
    
    
    
    s7ag_link_in
    
    
    
    s7ag_read_szl
    
    
    
    s7ag_test
    
    
    
    s7blk_delete
    
    
    
    s7blk_findfirst
    
    
    
    s7blk_findnext
    
    
    
    s7blk_read
    
    
    
    s7blk_write
    
    
    
    s7db_close
    
    
    
    s7db_open
    
    
    
    s7ag_bub_read_var_seg
    
    
    
    s7ag_bub_write_var_seg
    
    
    
    

    collecting various information about how the system works.

  • Execution of SQL requests. The malware obtains a list of computers on the local network and checks whether any of them is currently running Microsoft SQL Server, which serves the process visualization system Siemens WinCC. If the server is detected, the malware attempts to connect to the database with the username and password WinCCConnect/2WSXcder (CVE-2010-2772), after which it attempts to obtain information about tables, such as:
    
    
    
    MCPTPROJECT
    
    
    
    MCPTVARIABLEDESC
    
    
    
    MCPVREADVARPERCON
    
    
    
    
  • It collects information from files with the following extensions:
    
    
    
    *.S7P
    
    
    
    *.MCP
    
    
    
    *.LDF
    
    
    
    

    These are created through the Siemens Step7 system. A search for files is carried out on the whole of the computer’s hard disk.

  • It sends the collected information via the Internet to the malicious user’s server in encrypted form.