Sorry to get technical .. but we don't want this running around MD_Osprey. All you ever wanted to know is below. Do not open the attachment on the message send earlier this evening. Phil Removing HAPPY99.EXE Virus/Worm There is a worm being passed around the internet recently. It is called HAPPY NEW YEAR 99. It will come as a duplicate email from someone. The second copy of the email will contain an attachment called HAPPY99.EXE. If you get one of these DO NOT OPEN HAPPY99.EXE. DELETE IT IMMEDIATELY. NOTE: You can not get the virus simply by receiving the message. The only way to get the virus on your system is to execute the HAPPY99.EXE. If you do execute it you will see a window of fireworks. This virus will not cause data loss to you but it will attach itself to any messages you send. You will be sending a duplicate email containing HAPPY99.EXE without even knowing it. HAPPY99.EXE started making its way around the Internet about Jan. 20, sending hundreds of copies of itself via e-mail attachments and newsgroup postings. According to Helsinki, Finland, data security firm Data Fellows Inc., the worm does not attempt to destroy files on infected machines, but it sends e-mails and newsgroup postings without the victim’s knowledge and could cause network slowdowns or even crash corporate e-mail servers. The worm, so designated because it can replicate on its own, arrives as an e-mail or newsgroup attachment and infects only users who run the attachment. Once they do, all victims see is a window with a fireworks display. But behind the scenes, the worm alters the host computer’s winsock32.dll file, the computer’s doorway to the Internet. Then, each time a user intiates e-mail or newsgroup activity, by either receiving or sending e-mail or posting to a newsgroup, Happy99 spams the newsgroup or e-mail recipient with copies of itself. Any type of activity on port 25 or 119 will trigger spam activity, according to Takata, senior software support engineer of Data Fellows. It also keeps a list of the spammed e-mail addresses and newsgroups in a separate file called LISTE.SKA. Because the original version of wsock32.dll is preserved in backup form as WSOCK32.SKA, newsgroup posters say they’ve been able to restore their machines without much difficulty. Data Fellows has a patch that recognizes the worm. It poses no risk to data, but can be more than a nuisance to network administrators. “If you have 100 PCs and everyone is checking e-mail at 9 a.m. and this thing starts flying around, absolutely it can slow down a network,” Takata said. “It can crash your e-mail server. I wouldn’t be surprised if it did.” Because the e-mail header contains “MOUT-MOUT Hybrid (c) Spanska 1999.” Takata speculated that the Happy99 author also wrote a series of viruses known as the spanska viruses. Those were first reported in September 1997 and randomly displayed political messages, such as, “Remember those who died for Madrid.” This virus is attached to newsgroup and e-mail messages as an attachment called Happy99.exe. You cannot get infected with this virus just by reading a newsgroup or e-mail message. You have to execute the attachment. Almost always, the person who sent it does not know that they are sending it out. It does not show up in their Outbox. If you didn't execute the attachment, you can just delete it and move on. You should never open an EXE, COM, SHS, BAT, VBS file or MS Office document unless you know the source and its purpose and even then, check it with an up-to-date antivirus program. It will create two files in the Windows System folder, SKA.EXE and SKA.DLL. SKA.EXE will be a copy of HAPPY99.EXE. It will copy the original WSOCK32.DLL to WSOCK32.SKA. Then it will modify WSOCK32.DLL without changing its size so it will try to run SKA.DLL while posting to Usenet and sending E-Mail. The SKA.DLL file will silently attach HAPPY99.EXE to a second copy of outgoing newsgroup and e-mail messages with a barely noticable delay. This second copy will have the same subject and recipient, but it will have an empty body. The outgoing message will contain the header X-Spanska: Yes, but this is normally not visible. It does not modify any other file besides WSOCK32.DLL. WSOCK32.DLL is a regular part of Windows that provides a connnection to the Internet. If it is unable to modify WSOCK32.DLL, then it will add SKA.EXE to the RunOnce section of the registry and WSOCK32.DLL will be modified next time the computer starts. It will still create WSOCK32.SKA even if it is unable to modify WSOCK32.DLL. This virus will keep a list of message recipients in the file LISTE.SKA in the Windows System folder. It will try not to send the Happy99.exe file twice to the same person. The size of SKA.EXE (and HAPPY99.EXE) is 10,000 bytes. The size of SKA.DLL is 8,192 bytes. This virus does not steal passwords, as some sources have reported. It does not contain any payload other than the fireworks display. However, it could overload an e-mail server if a lot of copies get passed around. Also, since it gets passed along a lot, a different virus could attach to HAPPY99.EXE somewhere along the way. Without SKA.DLL and SKA.EXE, the modified WSOCK32.DLL cannot perform any viral action. However using a modified WSOCK32.DLL could cause problems while on the Internet. The most common problem that has been reported is invalid page faults, but these can have other causes. Restoring the original WSOCK32.DLL will correct these problems. This virus does not affect Macs, DOS, Windows 3.x, OS/2, Linux or WebTV. However, someone using one of those could pass it along manually, for example by forwarding the message. Under Windows NT it will create SKA.EXE, SKA.DLL, and WSOCK32.SKA but will fail to add itself to the registry or modify WSOCK32.DLL. If you have NT, you don't have to follow the removal steps; you can simply delete SKA.DLL, WSOCK32.SKA and SKA.EXE from inside Windows NT if you would like. This virus is not able to infect WSOCK32.DLL if it has the read-only attribute. Setting the read-only attribute after being infected is useless. I caution you not to run HAPPY99.EXE even if WSOCK32.DLL is read-only. Since it has passed through so many computers, a different virus could attach to HAPPY99.EXE along the way. Some people have asked whether it is always called HAPPY99.EXE. This virus doesn't contain any code to change the name. However, it would be simple for a person to change it to anything they like. It contains the encrypted text: "Is it a virus, a worm, a trojan? MOUT-MOUT Hybrid (c) Spanska 1999." Spanska is the alias of a virus writer who has written several other viruses. There are some automatic cleaners for this virus here or you could do it manually. Steps marked optional are not absolutely necessary and are completely safe to skip. If you're not comfortable with DOS, get someone knowledgable to help you with this. These steps should be safe, even under unexpected circumstances, but I can't make guarantees. Perform these at your own risk. If you have Windows NT, you don't have to follow the removal steps. If your not sure whether you are infected or not, then perform step 10 to check if you're clean. 1. Click Start, then Shut Down, then "Restart Computer in MS-DOS mode", then click Yes. It's important to exit Windows in order to be able to replace the file WSOCK32.DLL which Windows normally has in use. 2. At the DOS prompt type these commands exactly and press enter at the end of each line: CD \WINDOWS\SYSTEM If that doesn't work, try: CD SYSTEM 3. Delete SKA.EXE and SKA.DLL by typing: DEL SKA.EXE DEL SKA.DLL If you get "File not found" you're either not infected or in the wrong directory. Make sure you're in your Windows System directory; check to see if you followed step 2 exactly. You can continue following the instructions even if you get "File not found". It can't hurt to keep on following the instructions. 4. Copy WSOCK32.SKA to WSOCK32.DLL by typing: ATTRIB -R WSOCK32.DLL COPY WSOCK32.SKA WSOCK32.DLL The ATTRIB command is just in case WSOCK32.DLL has been made read-only since the infection. Answer "Yes" if it asks if you want to overwrite WSOCK32.DLL. Explanation: WSOCK32.SKA is a backup of the original WSOCK32.DLL. You are replacing the modified DLL with the original. If you get a "Sharing violation" make sure you followed step 1. 5. Optional Delete WSOCK32.SKA by typing: DEL WSOCK32.SKA You can leave WSOCK32.SKA on your system. It is a copy of your original WSOCK32.DLL Do not delete WSOCK32.SKA if you are unable to replace WSOCK32.DLL with WSOCK32.SKA. 6. Return to Windows by typing: EXIT 7. Optional Click Start, then Run, then type regedit in the text box, then click OK. Click HKEY_LOCAL_MACHINE, then Software, then Microsoft, then Windows, then CurrentVersion. Under RunOnce check for SKA.EXE and select it if it is there. Press delete and then click Yes. Close Regedit. Don't change anything else without making a backup of the registry first. If you don't find SKA.EXE in the registry, it doesn't mean you're not infected. SKA.EXE is only added to the registry if HAPPY99.EXE is unable to modify WSOCK32.DLL when you run it. Also, you'll only find it in the registry if you haven't rebooted since you ran HAPPY99.EXE. 8. Optional Choose Start, Programs, Accessories, Notepad, choose File, then Open then type C:\WINDOWS\SYSTEM\LISTE.SKA in the File Name box. Warn the people on the list, then delete LISTE.SKA. Make it clear to the people you warn that they won't be infected unless they ran happy99.exe, to avoid alarming them unnecessarily. If you haven't sent out any infected e-mails, there won't be a LISTE.SKA. 9. Optional Delete the HAPPY99.EXE file. The location of HAPPY99.EXE will vary depending on where you saved it. You can delete it simply by dragging it to the Recycle Bin from within Windows or whatever method you prefer. You may still have some messages with HAPPY99.EXE attached in your mailbox. These cannot do anything unless you run them. You can delete them if you want to or just ignore them. 10. Optional If you aren't sure whether you are infected, choose Start, then Find, then "Files or Folders". Then type WSOCK32.DLL in the "Named" box. In the "Look in" box choose drive C: or whatever drive you have Windows on. In the "Containing Text" box type "ska.dll" without the quotes. Then click "Find Now". If you don't find any files, that means that WSOCK32.DLL isn't the modified version. If you don't have the modified WSOCK32.DLL, the virus has no way to attach to e-mails, even if you have SKA.EXE, SKA.DLL, or WSOCK32.SKA in the Windows System folder. If you have SKA.EXE in the RunOnce registry section, and you haven't deleted SKA.EXE, then the virus will try to modify WSOCK32.DLL the next time you restart the computer. If you would like to check if SKA.EXE is in the registry, then do step 7. If you don't have the modified WSOCK32.DLL, and SKA.EXE isn't in the registry, the virus is completely inactive and is effectively removed. Source: http://www.geocities.com/SiliconValley/Heights/3652/SKA.HTM [Perry Home Page]-[Gulf Internet Home Page] ================================================ Phil Davis home: PDavis@ix.netcom.com Davidsonville, Maryland USA work: PDavis@OAO.com Greenbelt, Maryland USA ================================================