This sample arrives together with a malicious MS Word document file as a package or attachment to email messages. The specially crafted file exploits a known Remote Code Execution vulnerability on Microsoft Jet Database Engine.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
This malware file arrives as a package usually with another maliciously crafted MS Word Document file to be executed.
When loaded, this malware wil then exploit a known Remote-Code-Execution vulnerability on MS Jet Database Engine.
A successful execution of the exploit will result to the file C:\SVCH0ST.EXE to be created and executed on the user's system.