So yesterday I posted a question on THIS board & now I'm receiving emails supposedly with the patch

  • Thread starter Thread starter Guest
  • Start date Start date
G

Guest

These emails are supposedly from microsoft and are supposed to have the patch attached, my system automatically deletes them...I'm having the same messages as Clare (below)....and where's my damn string from yesterday?? I'd like to read the followups. I have a feeling that Clare & I are receiving emails "Undelivered" because the worm is trying to use our emails to spread itself...am I right? I had two pcs at home go down to the Blaster, and now I'm jeopardizing my work's property by participating in this forum...are Clare & I alone?
 
First, NEVER post your actual email address in a newsgroup or any other
public forum.

Next, get your hands on up to date anti virus / spyware software and run it.


Sarah the Novice said:
These emails are supposedly from microsoft and are supposed to have the
patch attached, my system automatically deletes them...I'm having the same
messages as Clare (below)....and where's my damn string from yesterday?? I'd
like to read the followups. I have a feeling that Clare & I are receiving
emails "Undelivered" because the worm is trying to use our emails to spread
itself...am I right? I had two pcs at home go down to the Blaster, and now
I'm jeopardizing my work's property by participating in this forum...are
Clare & I alone?
 
You did not read this first before posting:
http://support.microsoft.com/newsgroups/default.aspx

To help avoid receiving unwanted messages (spam) in your
regular e-mail account, you may not want to include your
regular e-mail address when you post a question or reply
to a post in a discussion group.


Use a modified email address
Use a different version of your e-mail address that
others will understand, but that spam tools can't
automatically pick up and add to their mailing list

For example, if your actual e-mail address
is "(e-mail address removed)", use "emailname(removethis)
@account.com" as your modified e-mail address. In this
case, the spam tools will send mail to an invalid e-mail
address, and others will know to exclude
the "(removethis)" when they send you e-mail.

When you post a question or reply to a discussion group,
just enter your modified e-mail address in the
appropriate box.

Use a secondary e-mail acccount
Set up or use an e-mail account, such as a Hotmail
account, that is separate from your primary account for
posting to discussion groups. When you post a question or
reply to a discussion group, use your Hotmail account as
your e-mail address.

-----Original Message-----
These emails are supposedly from microsoft and are
supposed to have the patch attached, my system
automatically deletes them...I'm having the same messages
as Clare (below)....and where's my damn string from
yesterday?? I'd like to read the followups. I have a
feeling that Clare & I are receiving emails "Undelivered"
because the worm is trying to use our emails to spread
itself...am I right? I had two pcs at home go down to
the Blaster, and now I'm jeopardizing my work's property
by participating in this forum...are Clare & I alone?
 
These emails are supposedly from microsoft and are supposed to have the
patch attached,

No no no. Ignore and delete these. Nobody from Microsoft sends you patches
by email unless without prior agreement and I'm not sure they even do that.

You are probably correct about it being a worm. These are almost certainly
fake messages that may contain viruses (which is probably why your system
deleted them for you).

Colin
 
There is no string from yestterday, only your post with no
replies.
It isn't this forum that is causing your problem. Anyone
with your email address in their address book could have a
worm that is sending out messages supposedly from you.
-----Original Message-----
These emails are supposedly from microsoft and are
supposed to have the patch attached, my system
automatically deletes them...I'm having the same messages
as Clare (below)....and where's my damn string from
yesterday?? I'd like to read the followups. I have a
feeling that Clare & I are receiving emails "Undelivered"
because the worm is trying to use our emails to spread
itself...am I right? I had two pcs at home go down to the
Blaster, and now I'm jeopardizing my work's property by
participating in this forum...are Clare & I alone?
 
Sarah

There were no replies to your message yesterday.

http://securityresponse.symantec.com/avcenter/venc/data/[email protected]



--
~~~~~~


Hope this helps.

Gerry
~~~~~~~~~~~~~~~~~~~~~~~~
FCA
(e-mail address removed)
Stourport, Worcs, England
Enquire, plan and execute.
~~~~~~~~~~~~~~~~~~~~~~~~
Please tell the newsgroup how any
suggested solution worked for you.

~~~~~~~~~~~~~~~~~~~~~~~~














© 1995-2003 Symantec Corporation.
All rights reserved.
Legal Notices
Privacy Policy


W32.Swen.A@mm
Discovered on: September 18, 2003
Last Updated on: October 06, 2003 06:48:09 PM







NOTE: The definitions that Symantec's Digital Immune System automatically created previously detected W32.Swen.A@mm as Worm.Automat.AHB.

Due to an increase in submissions, Symantec Security Response has upgraded W32.Swen.A@mm to Category 3, as of 6:30 PM Thursday, September 18, 2003.

W32.Swen.A@mm is a mass-mailing worm that uses its own SMTP engine to spread itself. It attempts to spread through file-sharing networks, such as KaZaA and IRC, and attempts to kill antivirus and personal firewall programs running on a computer.

The worm can arrive as an email attachment. The subject, body, and From: address of the email may vary. Some examples claim to be patches for Microsoft Internet Explorer, or delivery failure notices from qmail.

W32.Swen.A@mm is similar to W32.Gibe.B@mm in function, and is written in C++.

This worm exploits a vulnerability in Microsoft Outlook and Outlook Express in an attempt to execute itself when you open or even preview the message. Information and a patch for the vulnerability can be found at: http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.

Symantec Security Response has developed a removal tool to clean the infections of W32.Swen.A@mm.


Also Known As: Swen [F-Secure], W32/Swen@mm [McAfee], W32/Gibe-F [Sophos], I-Worm.Swen [KAV], Win32 Swen.A [CA], WORM_SWEN.A [Trend], Worm.Automat.AHB [Previous Symantec Detection]

Type: Worm
Infection Length: 106,496 bytes



Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Systems Not Affected: DOS, Linux, Macintosh, Microsoft IIS, OS/2, UNIX, Windows 3.x
CVE References: CVE-2001-0154





a.. Virus Definitions (Intelligent Updater) *
September 18, 2003


a.. Virus Definitions (LiveUpdateâ„¢) **
September 18, 2003


*
Intelligent Updater definitions are released daily, but require manual download and installation.
Click here to download manually.

**
LiveUpdate virus definitions are usually released every Wednesday.
Click here for instructions on using LiveUpdate.







Wild:

a.. Number of infections: More than 1000
b.. Number of sites: More than 10
c.. Geographical distribution: High
d.. Threat containment: Easy
e.. Removal: Difficult
Threat Metrics


Wild:
High
Damage:
Low
Distribution:
High





When W32.Swen.A@mm is executed, it performs the following actions:


1.. Checks to see whether it has already been installed on the computer. If so, the installation procedure will end and display the following message:





2.. If the executed filename starts with the letter q, u, p, or i, the worm will present the user with the following dialog box:





The worm will install itself regardless of the choice that is made. If you click No, the worm will be installed silently. If you click Yes, the following dialog boxes will be displayed while the worm is installed:








3.. Attempts to end the following processes:

a.. _avp
b.. Azonealarm
c.. avwupd32
d.. avwin95
e.. avsched32
f.. avp
g.. avnt
h.. avkserv
i.. avgw
j.. avgctrl
k.. avgcc32
l.. ave32
m.. avconsol
n.. autodown
o.. apvxdwin
p.. aplica32
q.. anti-trojan
r.. ackwin32
s.. bootwarn
t.. blackice
u.. blackd
v.. claw95
w.. cfinet
x.. cfind
y.. cfiaudit
z.. cfiadmin
aa.. ccshtdwn
ab.. ccapp
ac.. dv95
ad.. espwatch
ae.. esafe
af.. efinet32
ag.. ecengine
ah.. f-stopw
ai.. frw
aj.. fp-win
ak.. f-prot95
al.. fprot95
am.. f-prot
an.. fprot
ao.. findviru
ap.. f-agnt95
aq.. gibe
ar.. iomon98
as.. iface
at.. icsupp
au.. icssuppnt
av.. icmoon
aw.. icmon
ax.. icloadnt
ay.. icload95
az.. ibmavsp
ba.. ibmasn
bb.. iamserv
bc.. iamapp
bd.. jedi
be.. kpfw32
bf.. luall
bg.. lookout
bh.. lockdown2000
bi.. msconfig
bj.. mpftray
bk.. moolive
bl.. nvc95
bm.. nupgrade
bn.. nupdate
bo.. normist
bp.. nmain
bq.. nisum
br.. navw
bs.. navsched
bt.. navnt
bu.. navlu32
bv.. navapw32
bw.. nai_vs_stat
bx.. outpost
by.. pview
bz.. pop3trap
ca.. persfw
cb.. pcfwallicon
cc.. pccwin98
cd.. pccmain
ce.. pcciomon
cf.. pavw
cg.. pavsched
ch.. pavcl
ci.. padmin
cj.. rescue
ck.. regedit
cl.. rav
cm.. sweep
cn.. sphinx
co.. serv95
cp.. safeweb
cq.. tds2
cr.. tca
cs.. vsstat
ct.. vshwin32
cu.. vsecomr
cv.. vscan
cw.. vettray
cx.. vet98
cy.. vet95
cz.. vet32
da.. vcontrol
db.. vcleaner
dc.. wfindv32
dd.. webtrap
de.. zapro


4.. Drops a copy of itself to %Windir% with a randomly generated filename.


------------------------------------------------------
Note: %Windir% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
------------------------------------------------------


5.. Searches the .html, .asp, .eml, .dbx, ..wab, and .mbx files on the hard disk for email addresses.


6.. Creates the file, %Windir%\Germs0.dbv, where it stores the email addresses it has found.


7.. Creates the file, %Windir%\Swen1.dat, where it stores a list of remote news and mail servers.


8.. Drops a %ComputerName%.bat file, which executes the worm and a randomly named configuration file to store the local, machine-specific data.


------------------------------------------------------
Note: %ComputerName% is a variable that represents the name of the infected computer.
------------------------------------------------------


9.. Adds the values:

a.. "CacheBox Outfit"="yes"
b.. "ZipName"="<random>"
c.. "Email Address"="<The current users email address that the worm retrieves from the registry>"
d.. "Server"="<The IP address of the SMTP server that the worm retrieves from the registry>"
e.. "Mirc Install Folder"="<location of mirc client on system>"
f.. "Installed"="...by Begbie"
g.. "Install Item"="<random>"
h.. "Unfile"="<random>"

to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\*

where * is a random set of letters.


10.. Adds a randomly named value to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm starts when Windows starts.


11.. Modifies the following registry keys:

a.. HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command
b.. HKEY_LOCAL_MACHINE\Software\CLASSES\regfile\shell\open\command
c.. HKEY_LOCAL_MACHINE\Software\CLASSES\scrfile\shell\open\command
d.. HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command
e.. HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command
f.. HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command

which hooks the worm to each of these file types.


12.. Modifies the value:

"DisableRegistryTools" = "1"

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

to prevent you from running Regedit on the computer.


13.. Periodically presents you with a fake MAPI32 Exception error:





prompting you to enter the details of your email account, including the following:

a.. Email address
b.. Username
c.. Password
d.. POP3 server
e.. SMTP server


14.. Using the username and password, the worm will log into the POP3 server and check your email. If the worm finds an email that the worm sent, it will be deleted. The worm will only delete the messages, which the currently infected computer has sent.


15.. Intercepts the execution of any of the processes listed in step three, preventing them from loading, and then displays the following fake error message:





16.. Sends an HTTP Get request to a predefined HTTP server to retrieve counter information when the worm runs for the first time. Then, the worm may display the counter information.

For example:




17.. Attempts to create one or more compressed copies of itself using the Winzip file-compression utility, and then the Winrar file-compression utility.

The worm spreads through email, KaZaA, IRC, mapped drives, and newsgroups. The following sections discuss how each of these transmission methods can occur.

Transmission through email
W32.Swen.A@mm sends a copy of itself to the addresses found on the system through various methods. The worm can vary the message it sends, as well as the filename that it attaches itself as. The worm may use an incorrect MIME Header exploit, mentioned in Microsoft Security Bulletin MS01-020, to ensure that it is automatically executed when the mail is viewed.

One of the messages, as shown below, pretends to be a critical message from Microsoft, suggesting that the users update their system with the attached file.

The subject of the email can take one of two formats:

Subject 1

In this subject, the email contains up to four strings and may appear as lowercase:

1.. String 1
a.. Current
b.. Newest
c.. Last
d.. New
e.. Latest
f.. <empty>


2.. String 2
a.. Net
b.. Network
c.. Microsoft
d.. Internet
e.. <empty>


3.. String 3
a.. Critical
b.. Security
c.. <empty>


4.. String 4
a.. Patch
b.. Update
c.. Pack
d.. Upgrade


Subject 2

1.. String 1
a.. RE:
b.. FWD:
c.. FW:
d.. <empty>


2.. String 2
a.. Check
b.. Checkout
c.. Prove
d.. Taste
e.. Try
f.. TryOn
g.. LookAt
h.. TakeALookAt
i.. See
j.. Watch
k.. Use
l.. Apply
m.. Install
n.. <empty>


3.. String 3
a.. this
b.. that
c.. the
d.. these
e.. <empty>


4.. String 4
a.. important
b.. internet
c.. critical
d.. security
e.. corrective
f.. correction
g.. <empty>


5.. String 5
a.. pack
b.. package
c.. patch
d.. update

e.. The subject for subject 2 may end here


6.. String 6
a.. for
b.. <emtpy>


7.. String 7
a.. Windows
b.. Internet Explorer
c.. <empty if String 6 is empty>

d.. The subject may end here


8.. String 8
a.. which
b.. that
c.. <empty>


9.. String 9
a.. came
b.. comes
c.. <empty if String 8 is empty>


10.. String 10
a.. from


11.. String 11
a.. the
b.. <empty>


12.. String 12
a.. MS
b.. Microsoft
c.. M$


13.. String 13
a.. Corporation
b.. Corp.
c.. <empty>

The attachment name is created by:

1.. Selecting one of the following predetermined names:

a.. Patch
b.. Upgrade
c.. Update
d.. Installer
e.. Install
f.. Pack
g.. Q


2.. Followed by a series of random numbers.


3.. And a file extension that is either .exe or .zip.











The worm can also impersonate mail delivery failure notices, attaching itself as a randomly named executable.

One example is:

I'm sorry I wasn't able to deliver your message to one or more destinations.


Transmission through KaZaA
When attempting to spread through KaZaA, W32.Swen.A@mm performs the following actions:

1.. Drops a .zip or .rar copy of itself into a randomly named subdirectory of %Temp% on the computer.


------------------------------------------------------
Note: %Temp% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
------------------------------------------------------


2.. Adds the values:

"Dir99"= "012345:<random folder name>"
"DisableSharing"="0"

to the registry key:

HKEY_CURRENT_USER\Software\Kazaa\LocalContent

which adds this folder to the list of shared folders in KaZaA.


------------------------------------------------------
Note: <random folder name> is the folder created under %Temp% in step 1 above.
------------------------------------------------------


3.. Some of the possible dropped filenames include:

a.. Virus Generator
b.. Magic Mushrooms Growing
c.. Cooking with Cannabis
d.. Hallucinogenic Screensaver
e.. My naked sister
f.. XXX Pictures
g.. Sick Joke
h.. XXX Video
i.. XP update
j.. Emulator PS2
k.. XboX Emulator
l.. Sex
m.. HardPorn
n.. Jenna Jameson
o.. 10.000 Serials
p.. Hotmail hacker
q.. Yahoo hacker
r.. AOL hacker
s.. fixtool
t.. cleaner
u.. removal tool
v.. remover
w.. Klez
x.. Sobig
y.. Sircam
z.. Gibe
aa.. Yaha
ab.. Bugbear
ac.. installer
ad.. upload
ae.. warez
af.. hacked
ag.. hack
ah.. key generator
ai.. Windows Media Player
aj.. GetRight FTP
ak.. Download Accelerator
al.. Mirc
am.. Winamp
an.. WinZip
ao.. WinRar
ap.. KaZaA
aq.. KaZaA media desktop
ar.. Kazaa Lite


Transmission through IRC
When attempting to spread through IRC, W32.Swen.A@mm performs the following actions:

1.. Searches for a \Mirc folder.


2.. Creates a Script.ini file in this folder, which the worm uses to send .zip, .rar, or .exe files of itself to other mIRC users, who are connected on the same channel as the infected computer.


Transmission through mapped drives
When attempting to spread through mapped drives, W32.Swen.A@mm does so to the following locations:

a.. \Win98\Start menu\Programs\Startup
b.. \Win95\Start menu\Programs\Startup
c.. \WinMe\Start menu\Programs\Startup
d.. \Windows\Start menu\Programs\Startup
e.. \Documents and Settings\All Users\Start menu\Programs\Startup
f.. \Documents and Settings\Administrator\Start menu\Programs\Startup
g.. \Documents and Settings\Default User\Start menu\Programs\Startup
h.. \Winnt\Profiles\All Users\Start menu\Programs\Startup
i.. \Winnt\Profiles\Administrator\Start menu\Programs\Startup
j.. \Winnt\Profiles\Default User\Start menu\Programs\Startup

Transmission through newsgroups
The worm will enumerate the registry looking for newsgroup server addresses, and then attempt to contact that newsgroup server. If a newsgroup server is not configured on the system, the worm will randomly select one from a predefined list. The worm will download the available groups and post messages to randomly selected groups. The messages posted to the newsgroups are generated according to the same routine used for sending email.






Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

a.. Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
b.. If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
c.. Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
d.. Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
e.. Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
f.. Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
g.. Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.


The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.




--------------------------------------------------------
Note: Due to the numerous changes that the worm makes to the Windows registry, the worm can be somewhat difficult to remove if it has already run and your
Symantec antivirus product subsequently quarantined or deleted it.

Follow the instructions in the section below that describes your situation. We strongly advise that you read all the instructions in the appropriate sections before you start.
--------------------------------------------------------

W32.Swen.A@mm has not been quarantined or deleted
If your Symantec antivirus product has not quarantined or deleted W32.Swen.A@mm, and you suspect or know that W32.Swen.A@mm is on your system, follow these steps:

1.. Download and run the W32.Swen.A@mm Removal Tool. Complete instructions are in the W32.Swen.A@mm Removal Tool document.


2.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


3.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.


W32.Swen.A@mm has already been quarantined or deleted
If your Symantec antivirus product has already detected and then quarantined or deleted W32.Swen.A@mm, you will not be able to run the .exe, .com, and other executable files. Follow the instructions for your operating system.

For Windows 95/98
1.. Restart the computer.
2.. Do one of the following:
a.. Windows 95: When "Starting Windows 95..." appears on the screen, press F8. The Windows 95 Startup Menu appears.
b.. Windows 98: As the computer restarts, press and hold down the Ctrl key until the Windows 98 Startup Menu appears.


----------------------------------------------------
Note: On some computers, a keyboard or other error may appear during restart as you hold down the Ctrl key. If this happens, then follow the prompts to press a key to continue (for example, the message may prompt you to press the Esc key), then immediately press the Ctrl key again.
----------------------------------------------------


3.. Select "Command Prompt only."


4.. Type the following and press Enter after typing each line:

cd\
cd windows
edit repair.reg

The DOS text editor opens.


5.. Type the following lines into the DOS text editor exactly as shown here:

REGEDIT4

[HKEY_CLASSES_ROOT\exefile\shell\open\command]
@="\"%1\" %*"

[HKEY_CLASSES_ROOT\regfile\shell\open\command]
@="regedit.exe \%1\"


6.. Press Alt and F at the same time to access the File menu, and then press X to exit the DOS text editor. When prompted, press Enter to confirm that you want to save the file. This returns you to the command prompt.


7.. Type the following and press Enter after typing each line. You must type them exactly as shown here:

regedit /e backup.reg hkey_classes_root\exefile
regedit /d hkey_classes_root\exefile\shell\open\command
regedit /d hkey_classes_root\regfile\shell\open\command
regedit repair.reg


8.. Restart the computer.


9.. Download and run the W32.Swen.A@mm Removal Tool. Complete instructions are in the W32.Swen.A@mm Removal Tool document.


10.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


11.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.


For Windows Me
To perform this procedure on Windows Me, you must have a Windows Me boot disk. If you cannot locate the Me boot disk that came with your computer, you may be able to obtain one from the PC vender or a local computer store.

1.. Insert the Windows Me boot disk in the floppy disk drive and restart the computer. The computer opens to a MS-DOS prompt.


2.. Type the following and then press Enter after typing each line:

c:
cd\
cd windows
edit repair.reg

The DOS text editor opens.


3.. Type the following lines into the DOS text editor exactly as shown here:

REGEDIT4

[Hkey_classes_root\exefile\shell\open\command]
@="\"%1\" %*"

[Hkey_classes_root\regfile\shell\open\command]
@="regedit.exe \%1\"


4.. Press Alt and F at the same time to access the File menu, and then press X to exit the DOS text editor. When prompted, press Enter to confirm that you want to save the file. This returns you to the command prompt.


5.. Type the following and then press Enter after typing each line. You must type them exactly as shown here:

regedit /e backup.reg hkey_classes_root\exefile
regedit /d hkey_classes_root\exefile\shell\open\command
regedit /d hkey_classes_root\regfile\shell\open\command
regedit repair.reg


6.. Restart the computer.


7.. Download and run the W32.Swen.A@mm Removal Tool. Complete instructions are in the W32.Swen.A@mm Removal Tool document.


8.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


9.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.


For Windows NT/2000/XP
1.. Download the W32.Swen.A@mm Removal Tool and begin to follow the instructions in the W32.Swen.A@mm Removal Tool document. However, when you get to step 5, which instructs you to "Double-click the FixSwen.exe file," stop. Do not double-click the file. Instead:
1.. Right-click the downloaded FixSwen.exe file, and then click Rename.
2.. Rename the file to:

FixSwen.cmd


3.. When you are asked whether you want to change the file extension, click Yes.
4.. Double-click the FixSwen.cmd file and continue with the steps in the Removal Tool document.


2.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


3.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.







Additional information:

This worm, like others, sends a fake email message that appears to have been sent from Microsoft when it is not.

For information on how to recognize such an email, read the Microsoft article, "How to Tell If a Microsoft Security-Related Message Is Genuine."



Revision History:

October 1, 2003:

a.. Added link to Microsoft Article in "Additional Information" field.
September 19, 2003:
a.. Added new images to the "Technical Details" section.
b.. Added new information to the "Technical Details" section.
c.. Updated the "Removal Instructions" section.





Write-up by: John Canavan























© 1995-2003 Symantec Corporation.
All rights reserved.
Legal Notices
Privacy Policy


W32.Swen.A@mm
Dicovered on: September 18, 2003
Last Updated on: October 06, 2003 06:48:09 PM







NOTE: The definitions that Symantec's Digital Immune System automatically created previously detected W32.Swen.A@mm as Worm.Automat.AHB.

Due to an increase in submissions, Symantec Security Response has upgraded W32.Swen.A@mm to Category 3, as of 6:30 PM Thursday, September 18, 2003.

W32.Swen.A@mm is a mass-mailing worm that uses its own SMTP engine to spread itself. It attempts to spread through file-sharing networks, such as KaZaA and IRC, and attempts to kill antivirus and personal firewall programs running on a computer.

The worm can arrive as an email attachment. The subject, body, and From: address of the email may vary. Some examples claim to be patches for Microsoft Internet Explorer, or delivery failure notices from qmail.

W32.Swen.A@mm is similar to W32.Gibe.B@mm in function, and is written in C++.

This worm exploits a vulnerability in Microsoft Outlook and Outlook Express in an attempt to execute itself when you open or even preview the message. Information and a patch for the vulnerability can be found at: http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.

Symantec Security Response has developed a removal tool to clean the infections of W32.Swen.A@mm.


Also Known As: Swen [F-Secure], W32/Swen@mm [McAfee], W32/Gibe-F [Sophos], I-Worm.Swen [KAV], Win32 Swen.A [CA], WORM_SWEN.A [Trend], Worm.Automat.AHB [Previous Symantec Detection]

Type: Worm
Infection Length: 106,496 bytes



Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Systems Not Affected: DOS, Linux, Macintosh, Microsoft IIS, OS/2, UNIX, Windows 3.x
CVE References: CVE-2001-0154





a.. Virus Definitions (Intelligent Updater) *
September 18, 2003


a.. Virus Definitions (LiveUpdateâ„¢) **
September 18, 2003


*
Intelligent Updater definitions are released daily, but require manual download and installation.
Click here to download manually.

**
LiveUpdate virus definitions are usually released every Wednesday.
Click here for instructions on using LiveUpdate.







Wild:

a.. Number of infections: More than 1000
b.. Number of sites: More than 10
c.. Geographical distribution: High
d.. Threat containment: Easy
e.. Removal: Difficult
Threat Metrics


Wild:
High
Damage:
Low
Distribution:
High





When W32.Swen.A@mm is executed, it performs the following actions:


1.. Checks to see whether it has already been installed on the computer. If so, the installation procedure will end and display the following message:





2.. If the executed filename starts with the letter q, u, p, or i, the worm will present the user with the following dialog box:





The worm will install itself regardless of the choice that is made. If you click No, the worm will be installed silently. If you click Yes, the following dialog boxes will be displayed while the worm is installed:








3.. Attempts to end the following processes:

a.. _avp
b.. Azonealarm
c.. avwupd32
d.. avwin95
e.. avsched32
f.. avp
g.. avnt
h.. avkserv
i.. avgw
j.. avgctrl
k.. avgcc32
l.. ave32
m.. avconsol
n.. autodown
o.. apvxdwin
p.. aplica32
q.. anti-trojan
r.. ackwin32
s.. bootwarn
t.. blackice
u.. blackd
v.. claw95
w.. cfinet
x.. cfind
y.. cfiaudit
z.. cfiadmin
aa.. ccshtdwn
ab.. ccapp
ac.. dv95
ad.. espwatch
ae.. esafe
af.. efinet32
ag.. ecengine
ah.. f-stopw
ai.. frw
aj.. fp-win
ak.. f-prot95
al.. fprot95
am.. f-prot
an.. fprot
ao.. findviru
ap.. f-agnt95
aq.. gibe
ar.. iomon98
as.. iface
at.. icsupp
au.. icssuppnt
av.. icmoon
aw.. icmon
ax.. icloadnt
ay.. icload95
az.. ibmavsp
ba.. ibmasn
bb.. iamserv
bc.. iamapp
bd.. jedi
be.. kpfw32
bf.. luall
bg.. lookout
bh.. lockdown2000
bi.. msconfig
bj.. mpftray
bk.. moolive
bl.. nvc95
bm.. nupgrade
bn.. nupdate
bo.. normist
bp.. nmain
bq.. nisum
br.. navw
bs.. navsched
bt.. navnt
bu.. navlu32
bv.. navapw32
bw.. nai_vs_stat
bx.. outpost
by.. pview
bz.. pop3trap
ca.. persfw
cb.. pcfwallicon
cc.. pccwin98
cd.. pccmain
ce.. pcciomon
cf.. pavw
cg.. pavsched
ch.. pavcl
ci.. padmin
cj.. rescue
ck.. regedit
cl.. rav
cm.. sweep
cn.. sphinx
co.. serv95
cp.. safeweb
cq.. tds2
cr.. tca
cs.. vsstat
ct.. vshwin32
cu.. vsecomr
cv.. vscan
cw.. vettray
cx.. vet98
cy.. vet95
cz.. vet32
da.. vcontrol
db.. vcleaner
dc.. wfindv32
dd.. webtrap
de.. zapro


4.. Drops a copy of itself to %Windir% with a randomly generated filename.


------------------------------------------------------
Note: %Windir% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
------------------------------------------------------


5.. Searches the .html, .asp, .eml, .dbx, ..wab, and .mbx files on the hard disk for email addresses.


6.. Creates the file, %Windir%\Germs0.dbv, where it stores the email addresses it has found.


7.. Creates the file, %Windir%\Swen1.dat, where it stores a list of remote news and mail servers.


8.. Drops a %ComputerName%.bat file, which executes the worm and a randomly named configuration file to store the local, machine-specific data.


------------------------------------------------------
Note: %ComputerName% is a variable that represents the name of the infected computer.
------------------------------------------------------


9.. Adds the values:

a.. "CacheBox Outfit"="yes"
b.. "ZipName"="<random>"
c.. "Email Address"="<The current users email address that the worm retrieves from the registry>"
d.. "Server"="<The IP address of the SMTP server that the worm retrieves from the registry>"
e.. "Mirc Install Folder"="<location of mirc client on system>"
f.. "Installed"="...by Begbie"
g.. "Install Item"="<random>"
h.. "Unfile"="<random>"

to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\*

where * is a random set of letters.


10.. Adds a randomly named value to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm starts when Windows starts.


11.. Modifies the following registry keys:

a.. HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command
b.. HKEY_LOCAL_MACHINE\Software\CLASSES\regfile\shell\open\command
c.. HKEY_LOCAL_MACHINE\Software\CLASSES\scrfile\shell\open\command
d.. HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command
e.. HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command
f.. HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command

which hooks the worm to each of these file types.


12.. Modifies the value:

"DisableRegistryTools" = "1"

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

to prevent you from running Regedit on the computer.


13.. Periodically presents you with a fake MAPI32 Exception error:





prompting you to enter the details of your email account, including the following:

a.. Email address
b.. Username
c.. Password
d.. POP3 server
e.. SMTP server


14.. Using the username and password, the worm will log into the POP3 server and check your email. If the worm finds an email that the worm sent, it will be deleted. The worm will only delete the messages, which the currently infected computer has sent.


15.. Intercepts the execution of any of the processes listed in step three, preventing them from loading, and then displays the following fake error message:





16.. Sends an HTTP Get request to a predefined HTTP server to retrieve counter information when the worm runs for the first time. Then, the worm may display the counter information.

For example:




17.. Attempts to create one or more compressed copies of itself using the Winzip file-compression utility, and then the Winrar file-compression utility.

The worm spreads through email, KaZaA, IRC, mapped drives, and newsgroups. The following sections discuss how each of these transmission methods can occur.

Transmission through email
W32.Swen.A@mm sends a copy of itself to the addresses found on the system through various methods. The worm can vary the message it sends, as well as the filename that it attaches itself as. The worm may use an incorrect MIME Header exploit, mentioned in Microsoft Security Bulletin MS01-020, to ensure that it is automatically executed when the mail is viewed.

One of the messages, as shown below, pretends to be a critical message from Microsoft, suggesting that the users update their system with the attached file.

The subject of the email can take one of two formats:

Subject 1

In this subject, the email contains up to four strings and may appear as lowercase:

1.. String 1
a.. Current
b.. Newest
c.. Last
d.. New
e.. Latest
f.. <empty>


2.. String 2
a.. Net
b.. Network
c.. Microsoft
d.. Internet
e.. <empty>


3.. String 3
a.. Critical
b.. Security
c.. <empty>


4.. String 4
a.. Patch
b.. Update
c.. Pack
d.. Upgrade


Subject 2

1.. String 1
a.. RE:
b.. FWD:
c.. FW:
d.. <empty>


2.. String 2
a.. Check
b.. Checkout
c.. Prove
d.. Taste
e.. Try
f.. TryOn
g.. LookAt
h.. TakeALookAt
i.. See
j.. Watch
k.. Use
l.. Apply
m.. Install
n.. <empty>


3.. String 3
a.. this
b.. that
c.. the
d.. these
e.. <empty>


4.. String 4
a.. important
b.. internet
c.. critical
d.. security
e.. corrective
f.. correction
g.. <empty>


5.. String 5
a.. pack
b.. package
c.. patch
d.. update

e.. The subject for subject 2 may end here


6.. String 6
a.. for
b.. <emtpy>


7.. String 7
a.. Windows
b.. Internet Explorer
c.. <empty if String 6 is empty>

d.. The subject may end here


8.. String 8
a.. which
b.. that
c.. <empty>


9.. String 9
a.. came
b.. comes
c.. <empty if String 8 is empty>


10.. String 10
a.. from


11.. String 11
a.. the
b.. <empty>


12.. String 12
a.. MS
b.. Microsoft
c.. M$


13.. String 13
a.. Corporation
b.. Corp.
c.. <empty>

The attachment name is created by:

1.. Selecting one of the following predetermined names:

a.. Patch
b.. Upgrade
c.. Update
d.. Installer
e.. Install
f.. Pack
g.. Q


2.. Followed by a series of random numbers.


3.. And a file extension that is either .exe or .zip.











The worm can also impersonate mail delivery failure notices, attaching itself as a randomly named executable.

One example is:

I'm sorry I wasn't able to deliver your message to one or more destinations.


Transmission through KaZaA
When attempting to spread through KaZaA, W32.Swen.A@mm performs the following actions:

1.. Drops a .zip or .rar copy of itself into a randomly named subdirectory of %Temp% on the computer.


------------------------------------------------------
Note: %Temp% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
------------------------------------------------------


2.. Adds the values:

"Dir99"= "012345:<random folder name>"
"DisableSharing"="0"

to the registry key:

HKEY_CURRENT_USER\Software\Kazaa\LocalContent

which adds this folder to the list of shared folders in KaZaA.


------------------------------------------------------
Note: <random folder name> is the folder created under %Temp% in step 1 above.
------------------------------------------------------


3.. Some of the possible dropped filenames include:

a.. Virus Generator
b.. Magic Mushrooms Growing
c.. Cooking with Cannabis
d.. Hallucinogenic Screensaver
e.. My naked sister
f.. XXX Pictures
g.. Sick Joke
h.. XXX Video
i.. XP update
j.. Emulator PS2
k.. XboX Emulator
l.. Sex
m.. HardPorn
n.. Jenna Jameson
o.. 10.000 Serials
p.. Hotmail hacker
q.. Yahoo hacker
r.. AOL hacker
s.. fixtool
t.. cleaner
u.. removal tool
v.. remover
w.. Klez
x.. Sobig
y.. Sircam
z.. Gibe
aa.. Yaha
ab.. Bugbear
ac.. installer
ad.. upload
ae.. warez
af.. hacked
ag.. hack
ah.. key generator
ai.. Windows Media Player
aj.. GetRight FTP
ak.. Download Accelerator
al.. Mirc
am.. Winamp
an.. WinZip
ao.. WinRar
ap.. KaZaA
aq.. KaZaA media desktop
ar.. Kazaa Lite


Transmission through IRC
When attempting to spread through IRC, W32.Swen.A@mm performs the following actions:

1.. Searches for a \Mirc folder.


2.. Creates a Script.ini file in this folder, which the worm uses to send .zip, .rar, or .exe files of itself to other mIRC users, who are connected on the same channel as the infected computer.


Transmission through mapped drives
When attempting to spread through mapped drives, W32.Swen.A@mm does so to the following locations:

a.. \Win98\Start menu\Programs\Startup
b.. \Win95\Start menu\Programs\Startup
c.. \WinMe\Start menu\Programs\Startup
d.. \Windows\Start menu\Programs\Startup
e.. \Documents and Settings\All Users\Start menu\Programs\Startup
f.. \Documents and Settings\Administrator\Start menu\Programs\Startup
g.. \Documents and Settings\Default User\Start menu\Programs\Startup
h.. \Winnt\Profiles\All Users\Start menu\Programs\Startup
i.. \Winnt\Profiles\Administrator\Start menu\Programs\Startup
j.. \Winnt\Profiles\Default User\Start menu\Programs\Startup

Transmission through newsgroups
The worm will enumerate the registry looking for newsgroup server addresses, and then attempt to contact that newsgroup server. If a newsgroup server is not configured on the system, the worm will randomly select one from a predefined list. The worm will download the available groups and post messages to randomly selected groups. The messages posted to the newsgroups are generated according to the same routine used for sending email.






Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

a.. Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
b.. If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
c.. Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
d.. Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
e.. Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
f.. Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
g.. Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.


The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.




--------------------------------------------------------
Note: Due to the numerous changes that the worm makes to the Windows registry, the worm can be somewhat difficult to remove if it has already run and your
Symantec antivirus product subsequently quarantined or deleted it.

Follow the instructions in the section below that describes your situation. We strongly advise that you read all the instructions in the appropriate sections before you start.
--------------------------------------------------------

W32.Swen.A@mm has not been quarantined or deleted
If your Symantec antivirus product has not quarantined or deleted W32.Swen.A@mm, and you suspect or know that W32.Swen.A@mm is on your system, follow these steps:

1.. Download and run the W32.Swen.A@mm Removal Tool. Complete instructions are in the W32.Swen.A@mm Removal Tool document.


2.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


3.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.


W32.Swen.A@mm has already been quarantined or deleted
If your Symantec antivirus product has already detected and then quarantined or deleted W32.Swen.A@mm, you will not be able to run the .exe, .com, and other executable files. Follow the instructions for your operating system.

For Windows 95/98
1.. Restart the computer.
2.. Do one of the following:
a.. Windows 95: When "Starting Windows 95..." appears on the screen, press F8. The Windows 95 Startup Menu appears.
b.. Windows 98: As the computer restarts, press and hold down the Ctrl key until the Windows 98 Startup Menu appears.


----------------------------------------------------
Note: On some computers, a keyboard or other error may appear during restart as you hold down the Ctrl key. If this happens, then follow the prompts to press a key to continue (for example, the message may prompt you to press the Esc key), then immediately press the Ctrl key again.
----------------------------------------------------


3.. Select "Command Prompt only."


4.. Type the following and press Enter after typing each line:

cd\
cd windows
edit repair.reg

The DOS text editor opens.


5.. Type the following lines into the DOS text editor exactly as shown here:

REGEDIT4

[HKEY_CLASSES_ROOT\exefile\shell\open\command]
@="\"%1\" %*"

[HKEY_CLASSES_ROOT\regfile\shell\open\command]
@="regedit.exe \%1\"


6.. Press Alt and F at the same time to access the File menu, and then press X to exit the DOS text editor. When prompted, press Enter to confirm that you want to save the file. This returns you to the command prompt.


7.. Type the following and press Enter after typing each line. You must type them exactly as shown here:

regedit /e backup.reg hkey_classes_root\exefile
regedit /d hkey_classes_root\exefile\shell\open\command
regedit /d hkey_classes_root\regfile\shell\open\command
regedit repair.reg


8.. Restart the computer.


9.. Download and run the W32.Swen.A@mm Removal Tool. Complete instructions are in the W32.Swen.A@mm Removal Tool document.


10.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


11.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.


For Windows Me
To perform this procedure on Windows Me, you must have a Windows Me boot disk. If you cannot locate the Me boot disk that came with your computer, you may be able to obtain one from the PC vender or a local computer store.

1.. Insert the Windows Me boot disk in the floppy disk drive and restart the computer. The computer opens to a MS-DOS prompt.


2.. Type the following and then press Enter after typing each line:

c:
cd\
cd windows
edit repair.reg

The DOS text editor opens.


3.. Type the following lines into the DOS text editor exactly as shown here:

REGEDIT4

[Hkey_classes_root\exefile\shell\open\command]
@="\"%1\" %*"

[Hkey_classes_root\regfile\shell\open\command]
@="regedit.exe \%1\"


4.. Press Alt and F at the same time to access the File menu, and then press X to exit the DOS text editor. When prompted, press Enter to confirm that you want to save the file. This returns you to the command prompt.


5.. Type the following and then press Enter after typing each line. You must type them exactly as shown here:

regedit /e backup.reg hkey_classes_root\exefile
regedit /d hkey_classes_root\exefile\shell\open\command
regedit /d hkey_classes_root\regfile\shell\open\command
regedit repair.reg


6.. Restart the computer.


7.. Download and run the W32.Swen.A@mm Removal Tool. Complete instructions are in the W32.Swen.A@mm Removal Tool document.


8.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


9.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.


For Windows NT/2000/XP
1.. Download the W32.Swen.A@mm Removal Tool and begin to follow the instructions in the W32.Swen.A@mm Removal Tool document. However, when you get to step 5, which instructs you to "Double-click the FixSwen.exe file," stop. Do not double-click the file. Instead:
1.. Right-click the downloaded FixSwen.exe file, and then click Rename.
2.. Rename the file to:

FixSwen.cmd


3.. When you are asked whether you want to change the file extension, click Yes.
4.. Double-click the FixSwen.cmd file and continue with the steps in the Removal Tool document.


2.. After the tool has run, update the virus definitions. Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.


3.. Run a full system scan.
1.. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2.. Run a full system scan.
3.. If any files are detected as infected with W32.Swen.A@mm, click Delete.







Additional information:

This worm, like others, sends a fake email message that appears to have been sent from Microsoft when it is not.

For information on how to recognize such an email, read the Microsoft article, "How to Tell If a Microsoft Security-Related Message Is Genuine."



Revision History:

October 1, 2003:

a.. Added link to Microsoft Article in "Additional Information" field.
September 19, 2003:
a.. Added new images to the "Technical Details" section.
b.. Added new information to the "Technical Details" section.
c.. Updated the "Removal Instructions" section.





Write-up by: John Canavan








--
~~~~~~


Hope this helps.

Gerry
~~~~~~~~~~~~~~~~~~~~~~~~
FCA
(e-mail address removed)
Stourport, Worcs, England
Enquire, plan and execute.
~~~~~~~~~~~~~~~~~~~~~~~~
Please tell the newsgroup how any
suggested solution worked for you.

~~~~~~~~~~~~~~~~~~~~~~~~
 
Thanks guys. Yeah, I was freaked, and failed to see my inquiry way down at the bottom. Oops. But yeah, I am protected so all is good...it's just argg...so lame, I'm dealing with two infected pc's at home..and now I see the presence of danger here at work...how creepy...never dealt with virus' or otherwise in all my years surfin'. Have any of you heard of the Blaster slipping by Norton undetected? I scanned at home and nothing came up? Puter's shutting down in 60 though, so I know I have it. ???
 
Are your virus definition files up to date?


Sarah the Novice said:
Thanks guys. Yeah, I was freaked, and failed to see my inquiry way down
at the bottom. Oops. But yeah, I am protected so all is good...it's just
argg...so lame, I'm dealing with two infected pc's at home..and now I see
the presence of danger here at work...how creepy...never dealt with virus'
or otherwise in all my years surfin'. Have any of you heard of the Blaster
slipping by Norton undetected? I scanned at home and nothing came up?
Puter's shutting down in 60 though, so I know I have it. ???
 
Is your Norton up to date?

-----Original Message-----
Thanks guys. Yeah, I was freaked, and failed to see my
inquiry way down at the bottom. Oops. But yeah, I am
protected so all is good...it's just argg...so lame, I'm
dealing with two infected pc's at home..and now I see the
presence of danger here at work...how creepy...never dealt
with virus' or otherwise in all my years surfin'. Have any
of you heard of the Blaster slipping by Norton undetected?
I scanned at home and nothing came up? Puter's shutting
down in 60 though, so I know I have it. ???
 
Sarah said:
Thanks guys. Yeah, I was freaked, and failed to see my inquiry way
down at the bottom. Oops. But yeah, I am protected so all is
good...it's just argg...so lame, I'm dealing with two infected pc's
at home..and now I see the presence of danger here at work...how
creepy...never dealt with virus' or otherwise in all my years
surfin'. Have any of you heard of the Blaster slipping by Norton
undetected? I scanned at home and nothing came up? Puter's shutting
down in 60 though, so I know I have it. ???

When you boot the computers at home, do not connect to the internet until
you enable the XP firewall. Information how to enable the firewal is below.
What You Should Know About the Blaster Worm
http://www.microsoft.com/security/incident/blast.asp

Remove W32.MSBlast.Worm
http://www.kellys-korner-xp.com/xp_qr.htm#rpc

Blaster Worm: Critical Security Patch for Windows XP (32-bit version)
http://microsoft.com/downloads/deta...6C-C5B6-44AC-9532-3DE40F69C074&displaylang=en

If your computer is constantly attempting to shutdown
or reboot, quickly go to:

Start > Run and type: CMD , and hit enter.
This opens the Command Prompt window.

Then type: shutdown -a , and hit enter.

This should halt the rebooting problem.

Then immediately turn-on Windows XP's built-in Firewall:

How do I turn on the Firewall?
http://www.andyrathbone.com/tips/firewall.html


**** IMPORTANT ****

Visit this web site if you experience difficulty installing
Windows XP Security Patch 823980:

How To Fix The Cryptographic Service Error
http://www.updatexp.com/cryptographic-service.html
--

Michael Stevens MS-MVP XP
(e-mail address removed)
http://michaelstevenstech.com
For a better newsgroup experience. Setup a newsreader.
http://michaelstevenstech.com/outlookexpressnewreader.htm
 
Yeah...I'm not sure if my Norton is up to date, I believe it's not even a year old..but the way things go....it's probably no good. I am unable to enable my firewall because
A. when i could see my isp's under network connection controls, I couldn't access the properties..nothing happened. I tried to add a connection, and during installation there was never an option to enable the firewall.
B. Now nothing appears when I look into my network connections.

I tried the run/servicesmsc/rpc bit, but once again, I can't use my right-click menu to get into properties...I read something about renaming too...not happening

Thanks so much
 
Having a copy of Norton that you purchased within the last year is not the
same thing as keeping your virus definitions up to date.

You could have a 3 year old copy of the software and still have up to date
virus definitions.


sarah said:
Yeah...I'm not sure if my Norton is up to date, I believe it's not even a
year old..but the way things go....it's probably no good. I am unable to
enable my firewall because
A. when i could see my isp's under network connection controls, I
couldn't access the properties..nothing happened. I tried to add a
connection, and during installation there was never an option to enable the
firewall.
B. Now nothing appears when I look into my network connections.

I tried the run/servicesmsc/rpc bit, but once again, I can't use my
right-click menu to get into properties...I read something about renaming
too...not happening.
 
Open your NAV and click on live update. New updates come out every few days.

--
Steve C. Ray
Replace "mail" with "36db"
sarah said:
Yeah...I'm not sure if my Norton is up to date, I believe it's not even a
year old..but the way things go....it's probably no good. I am unable to
enable my firewall because
A. when i could see my isp's under network connection controls, I
couldn't access the properties..nothing happened. I tried to add a
connection, and during installation there was never an option to enable the
firewall.
B. Now nothing appears when I look into my network connections.

I tried the run/servicesmsc/rpc bit, but once again, I can't use my
right-click menu to get into properties...I read something about renaming
too...not happening.
 
In
Steve C. Ray said:
Open your NAV and click on live update. New updates come out every
few days.


NAV updates come out regularly every Wednesday, and more often if
necessary.
 
Blaster will infect any XP/NT/2000 computer that has not
been updated with the patch any time the computer logs on
the Internet (can happen very quickly, just depends when
they sweep your ISP) unless you have a firewall. A firewall
is your first line of protection, then the Windows Update
patch is still a good idea in case your firewall is down.

Anti-virus software must be up to date and still it can be
defeated, the firewall and patch are important.

Boot your computer and as soon as you logon, use
ctrl/alt/del to open the task manager, click the processes
tab and find and stop blaster.

Then turn your firewall on, even the XP firewall will work
(it is in network properties for your connection)
The get the Stinger virus removal tool from www.nai.com
browse to find it.
Remove the virus.
Do Windows Update.


"Sarah the Novice" <[email protected]>
wrote in message
| Thanks guys. Yeah, I was freaked, and failed to see my
inquiry way down at the bottom. Oops. But yeah, I am
protected so all is good...it's just argg...so lame, I'm
dealing with two infected pc's at home..and now I see the
presence of danger here at work...how creepy...never dealt
with virus' or otherwise in all my years surfin'. Have any
of you heard of the Blaster slipping by Norton undetected?
I scanned at home and nothing came up? Puter's shutting
down in 60 though, so I know I have it. ???
 
Norton and McAfee issue updates at least weekly, often
daily.


message
| Yeah...I'm not sure if my Norton is up to date, I believe
it's not even a year old..but the way things go....it's
probably no good. I am unable to enable my firewall because
| A. when i could see my isp's under network connection
controls, I couldn't access the properties..nothing
happened. I tried to add a connection, and during
installation there was never an option to enable the
firewall.
| B. Now nothing appears when I look into my network
connections.
|
| I tried the run/servicesmsc/rpc bit, but once again, I
can't use my right-click menu to get into properties...I
read something about renaming too...not happening.
|
| Thanks so much
 
The firewall is on the properties/advanced tab


message
| Yeah...I'm not sure if my Norton is up to date, I believe
it's not even a year old..but the way things go....it's
probably no good. I am unable to enable my firewall because
| A. when i could see my isp's under network connection
controls, I couldn't access the properties..nothing
happened. I tried to add a connection, and during
installation there was never an option to enable the
firewall.
| B. Now nothing appears when I look into my network
connections.
|
| I tried the run/servicesmsc/rpc bit, but once again, I
can't use my right-click menu to get into properties...I
read something about renaming too...not happening.
|
| Thanks so much
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Back
Top