This sample arrives together with a malicious MS Word document file as a package or attachment to email messages. The specially crafted file exploits a known Remote Code Execution vulnerability on Microsoft Jet Database Engine.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
This malware file arrives as a package usually with another maliciously crafted MS Word Document file to be executed.
When loaded, this malware wil then exploit a known Remote-Code-Execution vulnerability on MS Jet Database Engine.
A successful execution of the exploit will result to the file C:\SVCH0ST.EXE to be created and executed on the user's system.