Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Chir.B

 
Threat LevelModerate threat
DamageHigh
DistributionNot widespread

At a glance

Common name:Chir.B
Technical name:W32/Chir.B
Threat level:Low
Alias:I-Worm.Runouce.b,, Win32/ChiHack, PE_CHIR.B
Type:Virus
Effects:  It overwrites files with certain extensions and exploits two vulnerabilities in Internet Explorer.

Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95

First detected on:Aug. 1, 2002
Detection updated on:June 17, 2010
StatisticsNo
Proactive protection:
Yes, using TruPrevent Technologies

Brief Description 

    

Chir.B is a worm that reaches computers in an e-mail attachment called PP.EXE. The subject of this message consists of the sender's name followed by the text is coming!.

It is easy to get infected with this worm, as it activates automatically when the message is opened or just viewed through Outlook's Preview Pane.

In order to do so, it exploits two vulnerabilities: Exploit/iFrame and Exploit/MIME. These vulnerabilities allow files attached to e-mail messages to be run automatically.

This is a dangerous worm, as it infects files with the following extensions: EXE, SCR, HTM and HTML. Besides, Chir.B has destructive effects, as on the first day of each month it overwrites the first 4,660 bytes of files with the following extensions: ADC, R.DB, DOC and XLS.

Visible Symptoms 

    

A clear indication that you have received Chir.B is a message with the following characteristics:

  • Sender: one of the following:
    %sender's name%@yahoo.com
    Imissyou@btamail.net.cn
  • Subject:
    %sender's name% is coming!
  • Message: it does not contain any text.
  • Attachments:
    PP.EXE

Tech details

Effects

Chir.B activates when the attachment is run. From that moment, the worm has the following effects:

  • It infects files with the following extensions: EXE, SCR, HTM and HTML.
  • On the first day of each month, it overwrites the first 4,660 bytes of files with the following extensions: ADC, R.DB, DOC and XLS.

Infection strategy 

Chir.B creates the following files:

  • RUNOUCE.EXE, in the Windows system directory. This file is a copy of the worm.
  • README.EML, in the directories in which the worm finds and infects files with an HTM and/or HTML extension. This file contains the worm's code in MIME format.

Chir.B creates the following entry in the Windows Registry:

  • HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Run
    Runonce = %sysdir%\ runouce.exe

    where %sysdir% is the system directory.
    By creating this entry, Chir.B ensures that it is run whenever Windows is started.

Means of transmission 

Chir.B spreads itself via e-mail. It follows the routine below:

  • It reaches the computer in an e-mail message with the following characteristics:

    Sender: one of the following:
    %sender's name%@yahoo.com
    Imissyou@btamail.net.cn


    Subject:
    %sender's name% is coming!

    Message: it does not contain any text.

    Attachments:
    PP.EXE
  • It activates when the attachment is run.
  • It sends itself out to the e-mail addresses it gets from the infected user's Address Book.

Solution

See solution