Threat description


Platform: W32
Aliases: Creepy, W32/Creepy@mm, W95/Hypnose.A, Hypnose


Creepy is a mass-mailer. Its file is a 336kb PE executable which is not packed. The worm is written in Delphy and was first discovered in the beginning of September 2001.


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.


More information on scanning and removal options available in your F-Secure product can be found in the Help Center.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

When the worm's file is run, it displays a message in a DOS session window:

Welkom bij de hypnose truuk! Na deze hypnose sessie, kunt u iedere willekeurige tekst ondersteboven lezen!  Zorg dat u vast een A-4tje met tekst, of een krant, ondersteboven naast u hebt liggen. Er verschijnen zometeen tien regels met een willekeurige text op het scherm.  Het kan tot 15 seconden duren voordat de eerste regel verschijnt.  Lees ieder woord totdat het scherm veranderd.  Nu verschijnt een draaiende spiraal. Hierop concentreert u zich gedurende 10 tot 15 seconden.  Kijk hierna snel naar het blad met tekst en zie!! U kunt ondersteboven lezen!! Grafische elementen worden geinstalleerd, moment aub...  

The worm assumes that Outlook is already running when it starts. If Outlook is not running the worm might crash.

The worm modifies autostartup Registry keys to be always run when Windows is started. The following keys are modified:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]  "MyApp"= [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]  "MyApp"=  

The <path to worm's file> is the path to the location where the worm was first run following by worm's file name, for example "c:\windows\hypnose.exe"

The worm also modifies Internet settings by adding modifying the following key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\SafeSites]  "" =  ""  

The worm sets the default Internet Explorer startup page to ''

The worm also creates several URLs on the Desktop:

\  \  \  \  \  \  \Registreer een domein 1.url  \Registreer een domein 2.url  \Registreer een domein 3.url  

and in Favourites folder:

\  \  \  \  \  \  \Internet Hosting\  \Internet Hosting\  \Internet Hosting\  \Internet Hosting\  \Internet Hosting\  \Internet Hosting\  \Internet Hosting\Registreer een domein 1.url  \Internet Hosting\Registreer een domein 2.url  \Internet Hosting\Registreer een domein 3.url  

To spread itself the worm opens Windows Address Book and sends itself to all e-mail addresses it can find there. The infected message looks like that:

	Subject: Leuk programmaatje! 	Body: 		Hallo , dit is een heel gaaf programmaatje wat ik van Bert gekregen heb.  		Opstarten en gedurende 5 minuten naar de stip kijken en daarna naar je hand. Creepy!! 		Ik heb het op virussen gecheckt dus dat zit wel snor. 		Groetjes... 	Attachment: 		hypnose.exe (name may vary)  

The attachment's name can vary. It depends on the name of worm's file that an infected computer had.

F-Secure Anti-Virus detects this worm with the latest updates.

Description Last Modified: Analysis: Alexey Podrezov; F-Secure Corp.; September 12, 2001


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More