Threat Encyclopedia

Selected viruses, spyware, and other threats: sorted alphabetically

You can download the removal tool here .
Short description
Win32/Conficker.AQ is a worm that spreads via network exploiting vulnerabilities of the operating system. It connects to remote machines in attempt to exploit the Server Service vulnerability. The file is run-time compressed using UPX .
Installation
When executed the worm drops in folder %system% the following file:
  • %variable%.tmp (4096 B)
A string with variable content is used instead of %variable% .

Installs the following system drivers:
  • %variable%.tmp (4096 B)
The following Registry entries are created:
  • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
    CurrentVersion\Applets]
    "ds" = %value%
  • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
    Applets]
    "ds" = %value%
If the current system date and time matches certain conditions, worm deactivates some of its features.
Spreading
The worm starts a HTTP server on a random port. It connects to remote machines to port TCP 139, 445 in attempt to exploit the Server Service vulnerability.

This vulnerability is described in Microsoft Security Bulletin MS08-067 .

If successful, the remote computer attempts to connect to the infected computer and download a malware component.

It is a DLL library with the following extension:
  • .bmp
  • .gif
  • .jpeg
  • .png
When executed on the remote computer, the worm copies itself to any of the following locations:
  • %system%\%variable%.dll
  • %program files%\Internet Explorer\%variable%.dll
  • %program files%\Movie Maker\%variable%.dll
  • %program files%\Windows NT\%variable%.dll
  • %appdata%\%variable%.dll
  • %temp%\%variable%.dll
A string with variable content is used instead of %variable% .

The worm loads and injects the library into the following processes:
  • explorer.exe
  • services.exe
  • svchost.exe
The worm registers itself as a system service with the name combined from the following strings:
  • App
    Audio
    DM
    ER
    Event
The service Display Name consists of some of the following strings:
  • Boot
  • Center
  • Config
  • Driver
  • Helper
In order to be executed on every system start, the worm sets the following Registry entries:
  • [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Run]
    "%random1%" = "rundll32.exe "%variable%.dll",%random2%"
  • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
    Run]
    "%random1%" = "rundll32.exe "%variable%.dll",%random2%"
%random1-2% stands for a random text.

The following Registry entries are set:
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\%random
    service name%\Parameters]
    "ServiceDll" = "%system%\%variable%.dll"
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\%random
    service name%]
    "Image Path" = "%System Root%\system32\svchost.exe -k netsvcs"
The following Registry entries are deleted:
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
    SafeBoot]
  • [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\explorer\ShellServiceObjects\
    {FD6905CE-952F-41F1-9A6F-135D9C6622CC}]
    "wscsvc" = "%filepath%"
  • [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Run]
    "Windows Defender" = "%filepath%"
Other information
The worm terminates processes with any of the following strings in the name:
  • autoruns
  • avenger
  • bd_rem
  • cfremo
  • confick
The following services are disabled:
  • Windows Security Center Service (wscsvc)
  • Windows Automatic Update Service (wuauserv)
  • Background Intelligent Transfer Service (BITS)
  • Windows Defender Service (WinDefend)
  • Windows Error Reporting Service (ERSvc)
  • Windows Error Reporting Service (WerSvc)
The worm connects to the following addresses:
  • aol.com
    cnn.com
    ebay.com
    msn.com
    myspace.com
The worm blocks access to any domains that contain any of the following strings in their name:
  • activescan
  • adware
  • agnitum
  • ahnlab
  • anti-
The worm contains a list of blacklisted IP addresses.

The worm opens a random TCP, UDP port.

The worm receives data and instructions for further action from the Internet or another remote computer within its own network (botnet).

It uses its own P2P network for communication.