A standalone malicious program which uses computer or network resources to make complete copies of itself.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Upon execution VB.KQ creates a copy of itself as the following:
It also drops two files into available removable, fixed, and shared drives:
The 2008.exe file is actually a copy of the worm itself.
The autorun.inf file is an autorun file of 2008.exe and contains the following strings:
It also attempts to drop a copy of itself using an .EXE extension to all shared folders on the infected system. It then creates a kernel service driver file named %systemdir%\drivers\hideproc.sys, which is detected as Rootkit:W32/Agent.TZ.
After using the hideproc.sys file to hide itself in the process list, the worm uninstalls the driver.
The HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon entry is created for automatic execution when Windows starts.
The worm attempts to download a DLL and OCX file and register them using the command "cmd /c regsvr32/s [%OSSMTP library files%]".
The DLL file is registered as as %systemdir%\OSSMTP.dll. The OCX file is registered as %systemdir%\OSSMTP.ocx.
This mass mailing worm attempts to send copies of itself to email addresses harvested from the infected system.
The emails are compiled by gathering them from the path C:\. Additionally, the worm searches through files with HTM and HTML file extensions and looks for the text string "@yahoo.com". On finding the text string, the email address is added to its list of harvested addresses.
To propagate itself, the worm downloads and installs normal component libraries which assist it in sending emails via SMTP through Yahoo! Mail Exchange Servers.
The email messages sent via the Mail Exchange Servers appear as follows:
In addition to propagating itself, the worm also contains a keylogger program that it installs and uses to log the input typed on the keyboard. This information is logged in the file %systemdir%\2008.txt, which records the following data:
It installs a "WH_KEYBOARD_LL" hook procedure to monitor low-level keyboard input events.
Once compiled, the worm attempts to send the gathered information to the email address "kelvilmitnick@yahoo.com".
The email appears as such:
From: [...] Subject: Information Attachment: 2008.txt Message Body: Information
The worm uses rootkit stealth techniques to hide its presence on the infected machine, including deleting its own installation file once the installation has been completed.
Creates these files:
Attempts to download files from:
Sets these values:
Creates these keys: