Steps to recover from W32/Blaster
These instructions are designed for Windows XP. Under some circumstances, these instructions may not completely disable the worm or protect the system from re-infection. See Notes.
Physically disconnect the machine from the network (remove phone/network cable, wireless card).
Kill the "msblast.exe" process using Task Manager.
Press Ctrl-Alt-Delete key combination
Click "Task Manager" button
Select "Processes" tab
Highlight "msblast.exe"
Click "End Process" button, answer "Yes" to warning dialog
Delete any files named "msblast.exe" on the machine.
Start -> Search -> Find Files or Folders
Search for "msblast.exe"
Right-click each file and delete it
(Optional) Disable DCOM
From MS03-026
http://microsoft.com/technet/technet...n/MS03-026.asp :
Run Dcomcnfg.exe.
If you are running Windows XP or Windows Server 2003 perform these additional steps:
Click on the Component Services node under Console Root.
Open the Computers sub-folder.
For the local computer, right click on My Computer and choose Properties.
For a remote computer, right click on the Computers folder and choose New then Computer. Enter the computer name. Right click on that computer name and choose Properties.
Choose the Default Properties tab.
Select (or clear) the Enable Distributed COM on this Computer check box.
If you will be setting more properties for the machine, click the Apply button to enable (or disable) DCOM. Otherwise, click OK to apply the changes and exit Dcomcnfg.exe.
Enable Internet Connection Firewall (ICF)
From Microsoft Knowledge Base Article 283673
http://support.microsoft.com/default...b;en-us;283673 :
In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.
Right-click the connection on which you would like to enable ICF, and then click Properties.
On the Advanced tab, click the box to select the option to Protect my computer or network.
If you want to enable the use of some applications and services through the firewall, you need to enable them by clicking the Settings button, and then selecting the programs, protocols, and services to be enabled for the ICF configuration
Reboot the machine and reconnect to the network.
Install the patch from Windows Update
http://windowsupdate.microsoft.com/ , or MS03-026
http://microsoft.com/technet/technet...n/MS03-026.asp .
Using Internet Explorer, go to Windows Update and follow the instructions there to install any available patches.
Read and apply the clean up measures outlined in MS03-026
http://microsoft.com/technet/technet...n/MS03-026.asp .
Notes
The worm may exist as processes and files with names other than "msblast.exe."
It has been reported that AOL network connections do not display an option to use ICF.
Disabling DCOM may break things and may be unnecessary (assuming that the worm is completely disabled and ICF is enabled).
Another type of host-based or network firewall can be used to block 135/tcp.
Save yourself the trouble next time by blocking 135, 137, 138, 139, and 445 tcp and udp inbound and outbound. This will block most MS networking traffic.
More Information:
http://www.cert.org/advisories/CA-2003-20.html
http://www.trendmicro.com/vinfo/viru...WORM_MSBLAST.A
(Y)