Threat Description



Category: Malware
Type: Worm
Platform: JS
Aliases: Gigger


At the time of writing, F-Secure has received no report about this worm from the field.

Gigger is a destructive worm that spreads itself as a fast mass-mailer by using Outlook and as a slow mass-mailer (in infected HTML messages) using Outlook Express. It is written in both JavaScript and Visual Basic Script.


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

Variant:Gigger.A (Gigger.A@mm, JS_GIGGER.A,JS/Gigger.a@MM, JS.Gigger.A, JS/Gigger-A)

When executed, the worm first creates two files into the root of the C: drive: "b.htm" and "bla.hta".

Next Gigger checks an infection marker from the registry, and if it is not present, it is created. The registry key is:


The worm goes all mapped network drives from "C" to "M". If possible, it creates a copy of itself into file

  \windows\start menu\programs\startup\msoe.hta  

for each drive. It also copies itself to

"Windows\Help\mmsn_offline.htm" and "Windows\Samples\WSH\chart.js".

Spreading via Outlook Express

The worm executes its slow mass-mailing routine. It changes Outlook Express settings so that every message sent from an infected machine is in HTML format and contains a copy of the worm, by embedding the file "mmsn_offline.htm" into the message. On that way the worm will activate when next recipient open or view such infected message.

Spreading via Outlook

The fast mass mailing part of the worm collects email addresses from both Outlook contacts folder and from the Windows Address Book. The worm sends itself to each address collected with the following characteristics:

  Subject:    Outlook Express Update     Body:       MSNSoftware Co.     Attachment: mmsn_offline.htm  

The worm also sends a message to, which propably belongs to the virus writer. The message contains a list of all email addresses where the worm was sent.

If the worm fails in the above section to access Outlook, or it fails to create files that it needs, it adds a line to the "c:\autoexec.bat" that attempts to format the C: drive. However, this payload is able to activate only in Windows 9x, and it may not work in localized versions.

The JavaScript code contains the following comment:

  //29.10.2001, 10/29/01 This worm is donation from all Bulgarians!CopyR2001McB  

Gigger also drops "Windows\Help\Charts.vbs", which contains another fast mass-mailer, and runs it. It also adds it to the registry, so it will be executed in the each system startup by using the following registry key:

  HKLM\Software\Microsoft\Windows\CurrentVersion\Run\NAV DefAlert  

The worm again collects email addresses from Outlook Contacts folder, and sends the following message to each recipient:

  Subject:    (email address of the recipient)     Body:       Microsoft Outlook 98     Attachment: mmsn_offline.htm  

The attachment name is set to "Reports", which is the reason why some email clients may show the attachment as "Reports" instead of "mmsn_offline.htm".

The worm also goes through all hard and mapped network drives, appending the worm code to each file that has extension ".htm", ".html" or ".asp".

Further, if the directory contains any files with either ".ini" or ".hlp" extensions, a file "script.ini" is created as well. Therefore, if the user has IRC client mIRC installed into system, the worm will replace the default "script.ini" with its own. After that the worm sends itself to each user that joins the same IRC channel where the infected user is.

If the day of the month is 1st, 5th, 10th, 15th or 20th, the worm replaces all files from all drives with a zero byte files, destroying their original content.

F-Secure Anti Virus detects Gigger worm by heuristics and generic detection.

Description Details: Katrin Tocheva and Sami Rautiainen, F-Secure Corp.; January 11th, 2002


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More