FOLDER.HTT & DESKTOP.INI

Simple Hyper Text Template or VBS.Redlof Virus

 

These two files are found in every folder on Windows based machine’s hard disk (set "Show All Files" in Folder Option > View).

Desktop.ini is a simple configuration file that keeps folder's visual settings. But the " FOLDER.HTT " file (in addition to taking the hard disk space) is described a malicious script by many anti-virus software.

 

==========================================================================================

DOCUMENT SUMMARY

==========================================================================================

IMPACT ON SYSTEM:

Hard Disk Space

Not much critical

Performance Deterioration

Moderately Critical

Damage

1. Pay load insertion into all new e-mail messages

 

2. Modifies files, like htm*, asp, jsp, php, vbs, etc.

 

3. Modifies Registry keys (details below)

 

4. Changes OE stationery settings in registry

Removal

Moderate (but may render some *.exe(s) useless)

------------------------------------------------------------------------------------------------------------------------------------------------------------

AFFECTED SOFTWARE / SYSTEM:

Windows 3.x, Windows 9x / ME, Windows NT, Windows 2000, Windows XP.

------------------------------------------------------------------------------------------------------------------------------------------------------------

CODE NAME:
VBS/Redlof@M [McAfee], VBS.Redlof [AVP], VBS_REDLOF.A [Trend], VBS/Redlof-A [Sophos]

TYPE:
VIRUS

DESCRIPTION:
When the above virus executes, it infects a file "web\Folder.htt" in the Windows installation directory. This means the virus will activate when any directory is opened using the Active Desktop's web folder feature.

REASON:
Security Vulnerability in 'Microsoft VM ActiveX Component'

WORKOUT:
1. Removal of the virus using an Anti-Virus software
2. Apply patch from http://windowsupdate.microsoft.com/
[see end of message]

==========================================================================================

END OF DOCUMENT SUMMARY

==========================================================================================

 

TECHNICAL DETAILS

 

When HTML.Redlof.A runs, it does the following:

It decrypts its viral body and executes it. Depending on the location of the Windows System folder, the virus copies itself as one of the following:

%windir%\System\Kernel.dll
%windir%\System\Kernel32.dll

NOTE: %windir% is a variable. The worm locates the primary Windows installation folder (by default this is C:\Windows or C:\Winnt) and copies itself to that location.

The virus makes following changes to the registry:

 

Value Comparison / Modification

Registry Key

Virus verifies

Virus Modifies to

HKEY_CLASSES_ROOT\.dll

Dllfile

 

HKEY_CLASSES_ROOT\.dll\Content Type

application/x-msdownload

 

HKEY_CLASSES_ROOT\dllFile\ DefaultIcon

-

C:\WINDOWS\SYSTEM\shell32.dll,-154

Add following Subkeys

 

 

ScriptEngine

-

VBScript

ScriptHostEncode

-

{85131631-480C-11D2-B1F9-00C04F86C324}

HKEY_CLASSES_ROOT\dllFile\Shell\Open\Command\

-

"%windir%\WScript.exe ""%1"" %*"

OR

"%windir%\System32\WScript.exe ""%1"" %*"

HKEY_CLASSES_ROOT\dllFile\ShellEx\PropertySheetHandlers\WSHProps

-

{60254CA5-953B-11CF-8C96-00AA00B8708C}

 

The virus searches for files that the exensions .htm*, asp, php, jsp, and vbs in all folders and on all drives, and infects them.

HTML.Redlof.A spreads by adding itself as the default stationery that is used to create email messages:

 It either copies itself to C:\Program Files\Common Files\Microsoft Shared\Stationery\Blank.htm or, if that file already exists, it appends itself to the file.

 It then sets Outlook Express to use stationery by default. To do this, in the registry key:

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook Express\[Outlook Version].0\Mail the virus sets the value of "Compose Use Stationery" to " 1 ".

Then, if the following values do not exist, they are created with the following value data:

Registry Key

Value of

Virus Sets to

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook Express\[Outlook Version].0\Mail

Stationery Name

C:\Program Files\Common Files\Microsoft Shared\Stationery\blank.htm

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook Express\[Outlook Version].0\Mail

Wide Stationery Name

C:\Program Files\Common Files\Microsoft Shared\Stationery\blank.htm

HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Options\Mail

EditorPreference

131072

Following values, if do not exist, are created and set to blank:

 

 

HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings\0a0d020000000000c000000000000046

001e0360

 

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings\0a0d020000000000c000000000000046

001e0360

 

HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Common\MailSettings

NewStationery

 

HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Options\Mail\EditorPreference

EditorPreference

131072

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Kernel32

SYSTEM\Kernel32.dll or SYSTEM\Kernel.dll

 

Reportedly (ref. Microsoft Security Bulletin), these happens due to a security vulnerability in Microsoft VM ActiveX Component.

The MS VM is virtual machine for the Win32© operating environment. It runs atop MS Windows 9x / ME, NT 4.0 and Windows 2000. It is shipped as a part of each of these OSs and is also a of MS IE.

The versions of MS VM shipped with MS IE 4.x and IE 5.x contain a vulnerability that could allow a Java applet, on a malicious web site to take any desired action on a visiting user's machine.

The Microsoft virtual machine (Microsoft VM) contains functionality that allows ActiveX controls to be created and manipulated by Java applications or applets. This functionality is intended to only be available to stand-alone Java applications or digitally signed applets. However, this vulnerability allows ActiveX controls to be created and used from a web page, or from within a HTML based e-mail message, without requiring a signed applet. If a user visited a malicious web site that exploited this vulnerability, a Java applet on one of the web pages could run any desired ActiveX control, even ones that are marked as unsafe for scripting. This would enable the malicious web site operator to take any desired action on the user’s machine.

Web sites placed within the Restricted Sites zone in Internet Explorer will not be able to exploit this vulnerability.

 

 

 

==========================================================================================

USING MICROSOFT WINDOWS UPDATES

==========================================================================================

You won't be able to use Microsoft Windows 98 Updates (from their Windows update site), if, for any reason you are not using a Registered copy of Windows 98.

If you want to use Microsoft's Windows Update Feature simply modify this registry parameter and you can use Update feature without any registration.

Here is how to do it...

    1. Open registry (Run > regedit)
    2. Go down to: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
    3. Find String "REGDONE"
    4. Its defaul value is = 0, double click on it and change this to 1, i.e.: REGDONE=1
    5. Press F5 and restart your explorer (using END-TASK > EXPLORER > Wait for few seconds > END TASK)
    6. Now you are ready to use Microsoft's Windows Update feature.


___________________________________________________________________________________________

References:

Microsoft TechNet
www.microsoft.com/technet/security/bulletin/ms00-075.asp

Symantec Security Response
securityresponse.symantec.com/avcenter/venc/data/html.redlof.a.html

___________________________________________________________________________________________

This text is written by Sheikh M. Taimur (and is dedicated to my parents)
This page is designed at 800 x 600-screen resolution

August 04, 2003 (8.17 AM)

1