Author: Jeffrey Bernardino   
 Modified By:: Michael Cabel

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVER ALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
Low
Medium
High
Critical

  • Threat Type:
    Worm

  • Destructiveness:
    No

  • Encrypted:
    No

  • In the wild:
    Yes

  OVERVIEW

INFECTION CHANNEL: Propagates via removable drives, Propagates via software vulnerabilities

This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed.

This Worm drops file(s)/component(s) detected as RTKT_STUXNET.A. It also drops non-malicious files. It drops copy(ies) of itself in all removable drives. It connects to certain URL(s) to check for an internet connection. It hooks certain APIs to hide files with .TMP and .LNK extensions. It drops the file named Copy of Shortcut to.lnk in all removable drives. Trend Micro detects is as EXPL_CPLNK.SM.

This is the Trend Micro detection for files that exhibit certain behaviors.

  TECHNICAL DETAILS

File size: 517,632 bytes
File type: PE
Memory resident: No
INITIAL SAMPLES RECEIVED DATE: 22 July 2010
PAYLOAD: Drops files, Connects to URLs or IP addresses

Installation

This worm drops the following file(s)/component(s):

  • %System%\drivers\mrxcls.sys - detected as RTKT_STUXNET.A
  • %System%\drivers\mrxnet.sys - detected as RTKT_STUXNET.A

(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)

It drops the following non-malicious files:

  • %Windows%\inf\mdmcpq3.PNF
  • %Windows%\inf\mdmeric3.PNF
  • %Windows%\inf\oem6C.PNF
  • %Windows%\inf\oem7A.PNF

(Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.)

Propagation

This worm drops the following copy(ies) of itself in all removable drives:

  • {drive letter}:\\~WTR4132.tmp
  • {drive letter}:\\~WTR4141.tmp

Other Details

This worm connects to the following URL(s) to check for an Internet connection:

  • www.windowsupdate.com
  • www.msn.com

More information on this vulnerability can be found below:

  • Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)

This is the Trend Micro detection for:

  • Files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed.

It does the following:

  • Hooks the following APIs to hide files with .TMP and .LNK extensions:
    • FindFirstFileW
    • FindNextFileW
    • FindFirstFileExW
    • NtQueryDirectoryFile
    • ZwQueryDirectoryFile
  • Drops the file named Copy of Shortcut to.lnk in all removable drives. Trend Micro detects is as EXPL_CPLNK.SM.

  SOLUTION

Minimum scan engine: 8.900
First VSAPI Pattern File: 7.330.08
First VSAPI Pattern Release Date: 22 July 2010
VSAPI OPR PATTERN-VERSION: 7.333.00
VSAPI OPR PATTERN DATE: 23 July 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by WORM_STUXNET.SM

Step 3

Scan your computer with your Trend Micro product and note files detected as WORM_STUXNET.SM

Step 4

Restart in Safe Mode

[ learnMore ]

Step 5

Search and delete these files

[ learnMore ]
There may be some component files that are hidden. Please make sure you check the Search Hidden Files and Folders checkbox in the "More advanced options" option to include all hidden files and folders in the search result.
  • %Windows%\inf\mdmcpq3.PNF
  • %Windows%\inf\mdmeric3.PNF
  • %Windows%\inf\oem6C.PNF
  • %Windows%\inf\oem7A.PNF

Step 6

Search and delete the file detected as WORM_STUXNET.SM

[ learnMore ]
Please make sure you check the Search Hidden Files and Folders checkbox in the More advanced options option to include all hidden files in the search result.

Step 7

Download and apply this security patch Refrain from using these products until the appropriate patches have been installed. Trend Micro advises users to download critical patches upon release by vendors.


Note: To identify STUXNET-infected systems within a network, administrators can use Trend Micro's special STUXNET Scanner Tool. For more details, download and extract the package and refer to the tool's incorporated text file.


Did this description help? Tell us how we did.