W32.Welchia.D.Worm is a minor variant of W32.Welchia.C.Worm
If the operating system of an infected computer is Chinese, Korean, or English, the worm will attempt to download the Microsoft Workstation Service Buffer Overrun
and Microsoft Messenger Service Buffer Overrun
patches from the Microsoft Windows Update Web site, install it, and then restart the computer.
The worm also attempts to remove the W32.Mydoom.A@mm
, and W32.HLLW.Doomjuice.B
W32.Welchia.D.Worm exploits multiple vulnerabilities, including:
- The DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135. The worm specifically targets Windows XP machines using this exploit.
- The WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80. The worm specifically targets machines running the Microsoft IIS 5.0 using this exploit. The worm's use of this exploit will impact Windows 2000 systems, and may impact Windows NT/XP systems.
- The Workstation service buffer overrun vulnerability (described in Microsoft Security Bulletin MS03-049) using TCP port 445.
- The Locator service vulnerability using TCP port 445 (described in Microsoft Security Bulletin MS03-001). The worm specifically targets Windows 2000 machines using this exploit.
In addition, W32.Welchia.D.Worm attempts to exploit the W32.Mydoom.A@mm backdoor (port 3127) to spread.
The presence of the file, %Windir%\System32\Drivers\Svchost.exe, is an indication of a possible infection.
This threat is compressed with UPX.
Click for a more detailed description of Rapid Release and Daily Certified virus definitions.