Classification

Category :

Malware

Type :

-

Aliases :

Creepy, W32/Creepy@mm, W95/Hypnose.A, Hypnose

Summary

Creepy is a mass-mailer. Its file is a 336kb PE executable which is not packed. The worm is written in Delphy and was first discovered in the beginning of September 2001.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

When the worm's file is run, it displays a message in a DOS session window:

Welkom bij de hypnose truuk! Na deze hypnose sessie, kunt u iedere willekeurige tekst ondersteboven lezen!
Zorg dat u vast een A-4tje met tekst, of een krant, ondersteboven naast u hebt liggen. Er verschijnen zometeen tien regels met een willekeurige text op het scherm.
Het kan tot 15 seconden duren voordat de eerste regel verschijnt.
Lees ieder woord totdat het scherm veranderd.
Nu verschijnt een draaiende spiraal. Hierop concentreert u zich gedurende 10 tot 15 seconden.
Kijk hierna snel naar het blad met tekst en zie!! U kunt ondersteboven lezen!! Grafische elementen worden geinstalleerd, moment aub...

The worm assumes that Outlook is already running when it starts. If Outlook is not running the worm might crash.

The worm modifies autostartup Registry keys to be always run when Windows is started. The following keys are modified:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]  "MyApp"= [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]  "MyApp"=  

The <path to worm's file> is the path to the location where the worm was first run following by worm's file name, for example "c:\windows\hypnose.exe"

The worm also modifies Internet settings by adding modifying the following key:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"MyApp"= [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]
"MyApp"=

The worm sets the default Internet Explorer startup page to 'www.de-isp.nl'

The worm also creates several URLs on the Desktop:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"MyApp"= [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]
"MyApp"=

and in Favourites folder:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"MyApp"= [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]
"MyApp"=

To spread itself the worm opens Windows Address Book and sends itself to all email addresses it can find there. The infected message looks like that:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"MyApp"= [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]
"MyApp"=

The attachment's name can vary. It depends on the name of worm's file that an infected computer had.

F-Secure Anti-Virus detects this worm with the latest updates.