Technical Description:
This virus spreads via e-mail by sending itself to the user's contacts in the ICQ contact list (ICQ is a popular instant messenger). It was written in Borland Delphi and the executable was compressed using the UPX executable packer.
It arrives as an attachment (
worms.zip) to an e-mail message with the Subject/Body fields selected from the following choices:
Subject: Chiste Body: Hola te mando los gusanilloes. Pues mirarlos (no es un virus) Subject: Zart Body: Czesc, mam swietnz dowcip - robaka. Obejrzyj go sobie (to nie jest wirus) Subject: Joke Body: Hi, I have some cool joke - worms so have a look at it (no virus) Subject: £æÉëP Body: "ÅòüàÉ, ß ïàîÜ àƒÉ¥ ÄÅòëìè¥îPÜ £ÉæéëP üÅìäà éàÅüÜëP (ÖÉì îà üòÅæƒ) Subject: blague Body: J'ai une bonne blague ca s'appelle verre de terre alors jette un coup d'oeil (il n'y a pas de virus) Subject: Witz Body: Hallo, Ich habe ein guter Witz-Wurm so sieh! (kein virus) Subject: Vtip or
Cervici Body: Cau posielam ti cerviky tak sa na to pozri (virus to neni)
Subject: Vtip or
Cervici Body: Cau posilam ti cerviky tak se na to podivej (virus to neni) When run, the attached executable file copies itself to the Windows System32 folder (as
ntkrnl.exe and
worms.exe) and also creates a ZIP archive (
worms.zip) in the same folder containing the dropped
worms.exe copy of the virus.
The
ntkrnl.exe executable will be registered to run at each Windows start-up by creating the value described above in the registry key
HKCU\Software\Microsoft\Windows\CurrentVersion\Run At Windows start-up, the virus will be run with the
?LOADDRIVERS=TRUEcommand-line argument, which determines "silent" execution (no message box or payload).
The
worms.exe file is used to generate the
worms.zip archive that will be attached to the e-mail messages created by the virus. These messages will be sent to the e-mail addresses of the user's contacts which are found by scanning the ICQ database (
.dat and
.idx files in the ICQ installation folder and subfolders:
2001b,
2001a,
2000b,
2000a). These addresses, together with the associated e-mail messages, will be put down in a temporary file named
ntoskrnl.dat.
Before activating its payload, the virus displays the following message box and waits for the user to click "OK":

The payload is non-destructive - just a cute animation of colourful lines crawling on the Windows desktop (to get rid of them, just restart Windows):

SHARE
THIS ON