Virus Family Statistics (over the past 30 days)
Family Statistics information
||% Infected Computers
This is a virus for Word 97 documents. It is able to replicate under the SR-1 release of Word 97. It will turn off the macro warning feature of Word 97. This virus uses the "ThisDocument" stream, or class module, of a document or template during infection routine. It is a copy-cat of the W97M/Melissa.a virus and there is a payload to send the infected file via MS Outlook. Another payload exists for this virus which is date activated - December 25th - to reformat the hard drive (on Windows 9x systems) and also overlay the active document with random shapes.
This virus hooks the system event of opening documents in Word97 by the subroutine "Document_Open" thereby running its code. Another system event hooked is the closing of documents due to the subroutine "Document_Close" in the global template after infection.
This virus checks for the existence of a registry key, a self-check to verify if the local system has already been infected. The key is:
"HKCU\Software\Microsoft\Office\" "CyberNET"="(C)1999 - Indonesia by AnomOke!"
If this key is not found, the virus code uses VBA instructions to create a MS Outlook email message with the subject line "Message From " (Office97 UserName) and a message body of "This document is very Important and you've GOT to read this !!!". The first 50 listings from all available address books are selected as the recipient - the message is then sent with an attachment of the infected document. Lastly, the virus code creates the registry key.
If this key does exist, the email propagation is not repeated.
If the date is December 25th (any year), the virus runs a destructive payload to overwrite the existing C:\AUTOEXEC.BAT file with the following instructions:
"@echo Vine...Vide...Vice...Moslem Power Never Ends