CERT Coordination Center
HomeSite IndexSearchContactFrequently Asked Questions
Vulnerabilities, Incidents, and FixesSecurity Practices 
and EvaluationsSurvivability Research and AnalysisTraining and Education


Vulnerability Notes Database

Incident Notes

Current Activity


Tech Tips


Employment Opportunities

 more links
CERT Statistics

Vulnerability Disclosure Policy

CERT Knowledgebase

System Administrator courses

CSIRT courses

Other Sources of Security Information


Welcome to the new Incidents, Quick Fixes, and Vulnerabilities area of the CERT/CC web site.

Related Sites
Internet Security Alliance

CERT® Incident Note IN-2001-14

The CERT Coordination Center publishes incident notes to provide information about incidents to the Internet community.

W32/BadTrans Worm

Release Date: November 27, 2001

Systems Affected

  • Systems running Microsoft Windows 95, 98, ME, NT, and 2000


W32/BadTrans is a malicious Windows program distributed as an email file attachment. Because of a known vulnerability in Internet Explorer, some email programs, such as Outlook Express and Outlook, may execute the malicious program as soon as the email message is viewed.


The W32/BadTrans worm attempts to use two known vulnerabilities to compromise systems and propagate.

The format of the MIME headers in an email containing W32/BadTrans attempts to exploit a vulnerability in Internet Explorer where certain MIME types can cause arbitrary code to be executed. For more information, including patch information, see

CERT Vulnerability Note VU#980499

On systems that are patched for this vulnerability, the user may receive a confirmation message asking whether or not to execute the attachment. Running the attachment on these systems will still result in a compromise. Users should not execute programs in email attachments unless they exercise reasonable care to ensure that the attachments do not contain malicious code.

The filename in the email attachment of a W32/BadTrans infected email varies from message to message but always has two file extensions. By default, Windows may hide the true file extension from the user, as discussed in

CERT Incident Note IN-2000-07

When the malicious program is executed, a copy is written as "Kernel32.exe" in the Windows directory.

    MD5 checksum = 0bf5eaeed25da53f85086767bcd86e5e
    Filesize     = 29020 bytes

Kernel32.exe is executed and the originally executed file attachment is deleted from the system. Kernel32.exe may run as a system service on some versions of Windows, causing it to not be visible in the default system task list provided by Microsoft.

Kernel32.exe writes two additional files to disk in the Windows system directory.

    MD5 checksum = c7ceb9fb63edc7fb7c7767f899ff5491
    Filesize     = 5632 bytes

    MD5 checksum = varies
    Filesize     = varies

Reports indicate the "kdll.dll" file contains routines to record a user's keystrokes on the infected computer. The "cp_25389.nls" file contains logged keystrokes in encrypted form. Some reports indicate the contents of the log file are sent via email to a particular destination potentially causing sensitive information to be exposed.

Kernel32.exe sets a registry key to insure it is restarted when the computer restarts.

  HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\Kernel32  = "kernel32.exe"

While running, Kernel32.exe checks this registry value approximately every 10 seconds to insure that it is set.

Reports indicate that W32/BadTrans sends copies of itself via email to addresses found in unanswered email or in files found on the computer system. Email messages generated and sent by W32/BadTrans have some identifiable characteristics.

  • During the SMTP conversation, the W32/BadTrans host will issue a "HELO AOL.COM" statement. This is generally visible in the resulting Received: header in the message.
  • The address in the From: header will have a '_' prepended to the sender's email address.
  • The MIME headers contain:
      Mime-Version: 1.0
      Content-Type: multipart/related;
  • The body of the MIME message contains:
      Content-Type: multipart/alternative;
      Content-Type: text/html;
      Content-Transfer-Encoding: quoted-printable
      <HTML><HEAD></HEAD><BODY bgColor=3D#ffffff>
      <iframe src=3Dcid:EA4DMGBP9p height=3D0 width=3D0>
      Content-Type: audio/x-wav;
      Content-Transfer-Encoding: base64

Some reports in public forums indicate that a backdoor is installed by W32/BadTrans, however the CERT/CC has been unable to confirm these reports in our own analysis.


The worm can execute arbitrary commands with the same privileges as the user who triggered it.

During propagation, sites may experience residual denial-of-service conditions on hosts or email systems through which the worm is sent.


Apply the appropriate patch from your vendor

If you are running a vulnerable version of Internet Explorer (IE), the CERT/CC recommends upgrading to at least version 5.0 since older versions are no longer officially maintained by Microsoft. Users of IE 5.0 and above are encouraged to apply patch for the "Automatic Execution of Embedded MIME Types" vulnerability available from Microsoft at


Note: IE 5.5 SP1 users should apply the patches discussed in MS01-027

Run and maintain an antivirus product

It is important for users to update their anti-virus software. Most antivirus software vendors have released updated information, tools, or virus databases to help detect and partially recover from this malicious code. A list of vendor-specific antivirus information can be found in Appendix A.

Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.

Don't open email attachments

The W32/BadTrans worm may arrive as an email attachment with a filename such as "file.ext1.ext2". Users should not open attachments of this nature. If an attachment of this type absolutely needs to be opened, the CERT/CC recommends exercising care to handle it in a way that allows it to be scanned for malicious code prior to execution.


The CERT/CC is interested in receiving reports of this activity. If machines under your administrative control are compromised, please send mail to cert@cert.org with the following text included in the subject line: "[CERT#26210]".

Appendix A. Vendor Information

Antivirus Vendor Information

Aladdin Knowledge Systems


Command Software Systems


Computer Associates


F-Secure Corp




Norman Data Defense Systems


Panda Software

http://service.pandasoftware.es/servlet/panda.pandaInternet.EntradaDatosInternet? operacion=EV2FichaVirus&pestanaFicha;=0&idioma;=2&nombreVirusFicha;=W32/Badtrans.B

P Software






Trend Micro


In addition to these specific vendors, you may wish to visit the CERT/CC's computer virus resources page located at


Author(s): Kevin Houle, Chad Dougherty

This document is available from: http://www.cert.org/incident_notes/IN-2001-14.html

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from

If you prefer to use DES, please call the CERT hotline for more information.

Getting security information

CERT publications and other security information are available from our web site

To subscribe to the CERT mailing list for advisories and bulletins, send email to majordomo@cert.org. Please include in the body of your message

subscribe cert-advisory

* "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office.

Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.
Conditions for use, disclaimers, and sponsorship information

Copyright 2001 Carnegie Mellon University.

Revision History

November 27, 2001: Initial Release
November 28, 2001: Corrected incident number in reporting section