Home / malwarePDF  

Worm:Win32/Dogkild.A


First posted on 10 July 2009.
Source: SecurityHome

Aliases :

There are no other names known for Worm:Win32/Dogkild.A.

Explanation :

Worm:Win32/Dogkild.A is a worm that that spreads via removable drives. It downloads and executes arbitrary files from a remote host. It has been designed to deliberately compromise particular System Restore hardware and software. Note: In the wild this worm has been observed being downloaded and installed onto affected machines by malicious code detected as Exploit:JS/CVE-2008-0015. Exploit:JS/CVE-2008-0015 is detection for code that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control. When a user visits a Web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware. This vulnerability is discussed in detail in Microsoft Security Advisory (972890).

Symptoms
System changesThe following system changes may indicate the presence of this malware:

  • The presence of the following files:
    %windir%func.dll (detected as Worm:Win32/Dogkild.A!dll)
    <system folder>func.dll (detected as TrojanDownloader:Win32/Dogkild.N)
    <system folder>driverspcidump.sys


  • Worm:Win32/Dogkild.A is a worm that that spreads via removable drives. It downloads and executes arbitrary files from a remote host. It has been designed to deliberately compromise particular System Restore hardware and software. Note: In the wild this worm has been observed being downloaded and installed onto affected machines by malicious code detected as Exploit:JS/CVE-2008-0015.

    Installation
    Worm:Win32/Dogkild.A may consist of several components. When executed, it may drop the following files to the affected system:
  • %windir%phpi.dll (detected as Worm:Win32/Dogkild.A!dll)
  • <system folder>func.dll (detected as TrojanDownloader:Win32/Dogkild.N)
  • <system folder>driverspcidump.sys (detected as VirTool:WinNT/Dogrobot.gen!K)
  • Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP and Vista is C:WindowsSystem32. Spreads via…Removable drives Worm:Win32/Dogkild.A spreads via removable drives. It copies itself as 1.exe to the root of all accessible removable drives. Worm:Win32/Dogkild.A then writes an autorun configuration file named 'autorun.inf' pointing to its copy. When the removable or networked drive is accessed from another machine supporting the Autorun feature, the malware is launched automatically.

    Payload
    Downloads and executes arbitrary filesWorm:Win32/Dogkild.A contacts remote hosts in order to download and execute files of the attacker's choice on the affected machine. In the wild, Worm:Win32/Dogkild.A has been observed contacting the following domain for this purpose:
  • babi2009.com
  • It also posts data regarding the infection to the tongji520.com domain, presumably for statistics gathering purposes. Compromises system restore Win32/Dogkild may overwrite particular system files, thus bypassing the protection offered by System Restore hardware and software as the integrity of restore settings may be lost. The overwritten file may be <system folder>driversgm.dls. Modifies hosts fileWorm:Win32/Dogkild.A may replace the Windows Hosts file. The local Hosts file overrides the DNS resolution of a web site URL to a particular IP address. Malicious software may make modifications to the Hosts file in order to redirect specified URLs to different IP addresses. Malware often modifies an affected machine's hosts file in order to stop users from accessing websites associated with particular security-related applications (such as antivirus for example). Terminates processes
    Win32/Dogkild attempts to terminate the following processes - these processes are related to antivirus software:
    360Safe.exe
    360Safebox.exe
    360tray.exe
    AgentSvr.exe
    antiarp.exe
    ANTI-TROJAN.exe
    antivir.exe
    AUTODOWN.exe
    AVKSERV.exe
    avp.exe
    AVPUPD.exe
    AVSCHED32.exe
    avsynmgr.exe
    AVWIN95.exe
    CCenter.exe
    CFIAUDIT.exe
    CFIND.exe
    cfinet.exe
    cfinet32.exe
    DrRtp.exe
    DV95.exe
    DV95_O.exe
    DVP95.exe
    egui.exe
    ekrn.exe
    JED.exe
    Kabackreport.exe
    kaccore.exe
    Kasmain.exe
    kav32.exe
    kavstart.exe
    kissvc.exe
    kmailmon.exe
    KPFW32.exe
    kpfw32.exe
    kpfwsvc.exe
    KPPMain.exe
    KRF.exe
    KVMonXP.exe
    KVPreScan.exe
    kwatch.exe
    KwatchSvc.exe
    luall.exe
    LUCOMSERVER.exe
    mcafee.exe
    McNASvc.exe
    McProxy.exe
    Mcshield.exe
    mon.exe
    moniker.exe
    MOOLIVE.exe
    MpfSrv.exe
    N32ACAN.exe
    navapsvc.exe
    navapw32.exe
    NAVLU32.exe
    NAVNT.exe
    navrunr.exe
    NAVSCHED.exe
    NAVW.exe
    NAVW32.exe
    navwnt.exe
    nod32krn.exe
    PCCClient.exe
    pccguide.exe
    pcciomon.exe
    pccmain.exe
    pccwin98.exe
    PCFWALLICON.exe
    PERSFW.exe
    pop3trap.exe
    PpPpWallRun.exe
    program.exe
    prot.exe
    pview95.exe
    QQDoctor.exe
    ras.exe
    Rav.exe
    RAV7.exe
    rav7win.exe
    RavMon.exe
    RavMonD.exe
    RavStub.exe
    RavTask.exe
    rescue32.exe
    Rfw.exe
    rfwmain.exe
    rfwProxy.exe
    rfwsrv.exe
    rfwstub.exe
    Rsaupd.exe
    RsMain.exe
    rsnetsvr.exe
    rssafety.exe
    RsTray.exe
    safeboxTray.exe
    safeweb.exe
    scam32.exe
    scan.exe
    SCAN32.exe
    scanfrm.exe
    ScanFrm.exe
    SCANPM.exe
    scon.exe
    SCRSCAN.exe
    secu.exe
    SERV95.exe
    sirc32.exe
    SMC.exe
    smtpsvc.exe
    SPHINX.exe
    spy.exe
    SWEEP95.exe
    TBSCAN.exe
    TCA.exe
    TDS2-98.exe
    TDS2-NT.exe
    Tmntsrv.exe
    TMOAgent.exe
    tmproxy.exe
    tmupdito.exe
    TSC.exe
    UlibCfg.exe
    vavrunr.exe
    VET95.exe
    VETTRAY.exe
    vir.exe
    VPC32.exe
    VSECOMR.exe
    vshwin32.exe
    VSHWIN32.exe
    VSSCAN40
    vsstat.exe
    WEBSCAN.exe
    WEBSCANX.exe
    webtrap.exe
    WFINDV32.exe
    wink.exe
    zonealarm.exe
    ZONEALARM.exe Modifies system security settingsWin32/Dogkild also attempts to disable the following antivirus related services:
  • avp
  • ekrn


  • Analysis by Chun Feng

    Last update 10 July 2009

     

    TOP