W32/Goner WormRelease Date: December 4, 2001
- Systems running Microsoft Windows with Microsoft Outlook installed
- Systems running Microsoft Windows with Microsoft Office and ICQ installed
W32/Goner is a malicious Windows program distributed as an email file attachment and via ICQ file transfers. To a user, the file (gone.scr) appears to be a Windows screen saver. W32/Goner infects a system when a user executes file "gone.scr".
Late this morning, the CERT/CC began receiving reports of a new piece of malicious code known as W32/Goner. Since that time, the CERT/CC has received an increasing number of reports of this code circulating on the Internet.
Analysis indicates that this code is spreading via email with the following characteristics:
Subject: Hi! Body: How are you ? When I saw this screen saver, I immediately thought about you I am in a harry, I promise you will love it! Attachment:gone.scr
Several anti-virus vendors have stated that this code may also propogate via the ICQ messaging program. W32/Goner is believed to initiate a file transfer with any "online" users in the infected user's contact list. If the user on the receiving end approves the transfer, the worm sends a copy of itself.
When the file "gone.scr" is executed, the worm displays a splash screen and a false error message in an attempt to fool the user into thinking the program is a legitimate screen saver. It copies itself to the Windows system folder (usually C:\WINDOWS\SYSTEM32\scr.exe or C:\WINNT\SYSTEM32\scr.exe) and modifies the Windows registry to execute itself upon reboot by adding the following key:
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ C:%WINDIR%\SYSTEM\gone.scr=C:\%WINDIR\SYSTEM\gone.scr
W32/Goner propagates by sending itself to all addresses listed in the Microsoft Outlook address book and all online users in the ICQ contacts list.
In addition, the worm looks for and terminates processes associated with many popular antivirus and security programs. The following processes/files are targeted by this malicious code:
If W32/Goner finds any of these programs running, the process is terminated and all files in the directory containing that executable are deleted. If the worm is unable to delete the files immediately, it creates a file called WININIT.INI, which deletes the files upon reboot.
There is also some evidence that W32/Goner may install denial of service scripts for the mIRC Internet Relay Chat client.
The worm may disable anti-virus and security software installed on the system.
During propagation, sites may experience residual denial of service conditions on hosts or email systems through which the worm is sent.
Run and maintain an antivirus product
It is important for users to update their antivirus software. Most antivirus software vendors have released updated information, tools, or virus databases to help detect and partially recover from this malicious code. A list of vendor-specific antivirus information can be found in Appendix A.
Many antivirus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.
Don't open email attachments
The W32/Goner worm may arrive as an email attachment (gone.scr). Users should not open attachments of this nature. In general, users should use caution when opening any email attachment by first scanning it with an anti-virus product.
Don't open files received via instant messaging applications
The W32/Goner worm may arrive via an ICQ file transfer. ICQ users should exercise caution when opening files received via a file transfer just as they would with email attachments.
Filter email attachments
System administrators may install filters on mail servers to prevent potentially harmful files (.exe, .vbs, .bat, .scr, etc.) from being spread via email. In this case filters could be used to prevent the spread of "gone.scr".
The CERT/CC is interested in receiving reports of this activity. If machines under your administrative control are compromised, please send mail to email@example.com with the following text included in the subject line: "[CERT#27693]".
Appendix A. Vendor Information
Antivirus Vendor Information
Norman Data Defense Systems
In addition to these specific vendors, you may wish to visit the CERT/CC's computer virus resources page located at
Author(s): Brian B. King, John Shaffer, Robert Hanson
Copyright 2001 Carnegie Mellon University.
December 4, 2001: Initial Release