Drowor.A is a Windows file appending virus that infects executables in all drives found including network drives.
Upon execution, this virus checks to see if it is already running in memory by elevating its privileges and enumerating currently running processes on the affected machine.
It then creates and executes a copy of itself as:
It drops a hidden copy of itself, setup.exe, in the root directory of discovered drives. This includes network drives.
It creates an autorun.inf alongside of this setup.exe that may trigger and execute the file.
It Infects by appending itself in Windows executables, adding a section named ".ice" in the infected files.
Drowor.A creates a text file list of Windows executables in the discovered drives to a hard-coded path:
Drowor.A attempts to accesses a file from:
The URL is currently unavailable.