When this worm is executed, it does the following:
- Copies itself to \%System%\Wink<random characters>.exe.
Note: %System% is a variable. The worm locates the Windows System folder (by default, this is C:\Windows\System or C:\Winnt\System32) and copies itself to that location.
- Adds the value:
Wink<random characters> %System%\Wink<random characters>.exe
to the registry key:
or, it creates the registry key:
and inserts a value in this subkey, so that the worm executes when you start Windows.
- Attempts to disable on-access virus scanners and some previously distributed worms (such as W32.Nimda and CodeRed), by stopping any active processes. The worm removes the startup registry keys, which antivirus products use, and deletes the checksum database files, including:
Copying local and network drives
The worm copies itself to the local, mapped, and network drives as:
- A random file name with a double extension; for example, Filename.txt.exe.
- A .rar archive with a double extension; for example, Filename.txt.rar.
This worm searches the Windows address book, the ICQ database, and local files for email addresses. It sends an email message to these addresses with itself as an attachment. The worm contains its own SMTP engine and attempts to guess at the available SMTP servers.
For example, if the worm encounters the address, firstname.lastname@example.org, it attempts to send email via the server, smtp.abc123.com.
The subject line, message bodies, and attachment filenames are random. The From address is randomly chosen from email addresses that the worm finds on an infected computer.
The worm will the search files with the following extensions for the email addresses:
In addition to the worm attachment, the worm may also attach a random file from the computer. The file will have one of the following extensions:
As a result, the email message would have two attachments, the first being the worm and the second being the randomly selected file.
"Random" strings comprise the email message that this worms sends. The subject can be one of the following:
- Worm Klez.E immunity
- Undeliverable mail--"[Random word]"
- Returned mail--"[Random word]"
- a [Random word] [Random word] game
- a [Random word] [Random word] tool
- a [Random word] [Random word] website
- a [Random word] [Random word] patch
- [Random word] removal tools
- how are you
- let's be friends
- so cool a flash,enjoy it
- your password
- some questions
- please try again
- welcome to my hometown
- the Garden of Eden
- introduction on ADSL
- meeting notice
- japanese girl VS playboy
- look,my beautiful girl friend
- eager to see you
- spice girls' vocal concert
- japanese lass' sexy pictures
The random word is one of the following:
- IE 6.0
The body of the email message is random.
- This worm often uses a technique called "spoofing." When the worm performs its email routine, it can use a randomly chosen address it finds on an infected computer as the "From:" address. Numerous cases have been reported in which users of uninfected computers received complaints that they sent an infected message to someone else.
For example, Linda Anderson is using a computer infected with W32.Klez.H@mm. Linda is not using an antivirus program or does not have the current virus definitions. When W32.Klez.H@mm performs its emailing routine, it finds the email address of Harold Logan. The worm inserts Harold's email address into the "From:" portion of an infected message, which the worm then sends to Janet Bishop. Then, Janet contacts Harold and complains that he sent her an infected message, but when Harold scans his computer, Norton AntiVirus (NAV) does not find anything because his computer is not infected.
If you are using a current version of Norton AntiVirus, have the most recent virus definitions, and a full system scan with Norton AntiVirus, which is set to scan all the files, does not find anything, be assured that your computer is not infected with this worm.
- There have been several reports that, in some cases, if you receive a message that the virus has sent using its own SMTP engine, the message appears to be a "postmaster bounce message" from your own domain. For example, if your email address is email@example.com, you could receive a message that appears to be from firstname.lastname@example.org, indicating that you attempted to send an email and the attempt failed. If this is the false message sent by the virus, the attachment includes the virus itself. Of course, such attachments should not be opened.
- The message may be disguised as an immunity tool. One version of this false message is:
Klez.E is the most common world-wide spreading worm. It's very dangerous by corrupting your files. Because of its very smart stealth and anti-anti-virus technic,most common AV software can't detect or clean it.We developed this free immunity tool to defeat the malicious virus. You only need to run this tool once,and then Klez will never come into your PC.
NOTE: Because this tool acts as a fake Klez to fool the real worm,some AV monitor maybe cry when you run it. If so,Ignore the warning,and select 'continue'. If you have any question,please mail to me.
If the message is opened in an unpatched version of Microsoft Outlook or Outlook Express, the attachment may be automatically executed. Information about this vulnerability and a patch are available at:
This worm inserts the W32.Elkern.4926
virus as a file, with a random name in the \%Program Files% folder, and then executes it.
%Program Files% is a variable. The worm locates the \Program Files folder (by default, this is C:\Program Files) and copies the virus to that location.
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":