presence in files system of executables having icons imitating the folders icons
presence of a chain of processes running copies of itself
presence of an autorun.inf files (pointing to a hidden file) in the root folder of disk partitions, network drives or removable storage devices
Please let BitDefender disinfect your files.
Ovidiu Visoiu, virus researcher
As a trick to be launched the executables uses a folder icon. When is launched opens
"%windir%\Web\Wallpaper" and drops "%windir%\Fonts\wav.wav" containing the Windows XP specific "error sound".
Copies itself in many system folders:
Creates a "%windir%\cursors\boom.vbs" containing VBS commands for adding some registry keys that will start it on reboot:
Three copies will be launched creating a chain where each process protects the others form being stopped.
For spreading, it creates copies of itself in the root folders of network drives and removable drives. It also creates an autorun.inf file which will launch (in case that drives autorun feature is enabled) a hidden copy of this worm.