Email-Worm:W32/Nyxem propagates through infectious e-mail file attachments. It is also capable of spreading over a local network. Once installed on a computer, the worm can kill the processes of several applications, as well as preventing other malware from running. Myxem can also perform a Denial of Service (DoS) attack.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
The worm's file is a PE executable 76060 bytes long packed with UPX file compressor. It is written in Visual Basic and it uses p-code instead of native code in its file.
Nyxem worm was found on March 25th, 2004.
When the worm's file is run, it installs itself to system and shows a fake error messagebox:
The worm copies itself multiple times on a hard disk:
The worm also creates the following files:
In the above files, names represents the space character.
The worm uses an interesting technique to stay active. The worm maintains 2 processes in the computer memory. If one process iskilled, it is quickly restarted by the second process. The same technique was used by Sober worm in the past.
The worm periodically tries to delete the following files:
The worm can potentially damage the installations of several anti-virus programs, rendering them inoperable.
Additionally, the worm can perform a DoS attack on the New York Mercantile Exchange website (www.nymex.com).
During installation, the worm creates the following startup keys for 2 of the copied files, to ensure the files are automatically started each time the system starts:
where " is the worm's file name, for example REGEDIT.EXE or EXPLORER.EXE. T
The worm deletes startup Registry key belonging to various applications and malware, including the Bagle worm. The following key values are deleted:
Nyxem propagates in an infected file attachment accompanying e-mail messages with varying subject lines, body texts and attachment names.
Before spreading, the worm collects e-mail addresses from a computer. It scans files with .HTM and .DBX extensions, as well as the Yahoo! Messenger profile folder.
The worm can send 2 types of messages. Characteristics of Type 1 e-mail messages are as follows:
The Subject line is selected from the following list:
The body text is selected from the following list:
The attachment name is selected from the following list:
The attachment can be also sent in a ZIP or TGZ archive. Please note that the above message, texts and attachment names were modified to change obscene words.
The second type of message sent by the Nyxem worm looks as follows:
The worm can use different colors and font types for the above message.
The subject this second message type is:
The file attachment name is
The worm's main executable, FIX_BLACKWORM.COM, may be attached by itself to the e-mail message, or may be embedded in the SCAN.ZIP archive or SCAN.TGZ file attachments.
The worm contains two DLL and one GIF files. One of the DLL files is an external SMTP engine that the worm uses to send the e-mail messages to selected victims once they have been constructed; the other DLL is used to perform the worm's DoS attack.
The GIF file is added to the beginning of the constructed e-mail message to make the recipient think it was scanned by Norton Anti-Virus:
The worm can spread via local network to computers that have open shares with write access enabled. The worm enumerates network shares and copies itself there with one of its hardcoded names.
When that SCR file is run on a remote computer, it becomes infected. Additionally the worm's file can appear in a root folder of a local hard drive if it is shared.
Description Created: 2006-01-01 16:32:13.0
Description Last Modified: 2010-07-15 10:48:03.0