Classification

Category :

Malware

Type :

Virus

Aliases :

Veneno, Veneno.A

Summary

VM/Veneno is a Word macro virus that is able to replicate with the Spanish version of Word only. The virus has a destructive payload.

The virus infects the global template when an infected document is opened. During infection the virus removes checks for existence of several specially named macros. If these macros are found, it attempts to remove them.

After that the virus infects every document that is opened or saved.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The first payload activates when the number of minutes is exactly 30. Then the virus creates two temporary files to the "C:\DOS" directory and uses these files to drop a binary virus Glupak.847.D to file "C:\DOS\ATTRIB.COM".

The second payload activates every Saturday and Sunday if the number of minutes is less than five. This time the virus inserts the following text to the active document:

** V>N>N0 ** 		

The virus also replaces all occurences of "ste " with "stes ", saves the document with password "Veneno" and closes it.

The third payload activates every time when the Word is restarted or a document is opened. At this point the virus will replace both "C:\CONFIG.SYS" and "C:\AUTOEXEC.BAT". This causes that when the system is restarted, the following message is displayed:

Insert a diskette in drive A:
Press any key to continue...
 

The the virus will attempt to format the disk in the drive "A:". If this fails, the virus attempts to format both "C:" and "D:" drives.

When "Archivo/Imprimir" ("File/Print") or "Archivo/Imprimir Predeter" ("File/Print Preview") menu is selected and the number of seconds is greater than 57, the virus inserts the following lines to the end of the document:

Finalmente me gustaria agregar que...  El Centro de Computo de esta Universidad es una verdadera verguenza,  no nos merecemos este servicio.  >>> Shame on you!!! <<<     

Finally, when "Archive/Guardar Como" ("File/Save As") menu is selected and the number of seconds is exactly 38, the virus shows a message box with the following text:

Finalmente me gustaria agregar que...
El Centro de Computo de esta Universidad es una verdadera verguenza,
no nos merecemos este servicio.
>>> Shame on you!!! <<<

 

Variant:Veneno.B

WM/Veneno.B is functionally identical with VM/Veneno.A.

Variant:Veneno.C

WM/Veneno.C is a corrupted variant with no payload except the message box with "Archive/Guardar Como" ("File/Save As") menu.

Variant:Veneno.D

WM/Veneno.D is a slightly modified variant of WM/Veneno.A.