Threat description




W97M/Osm.A is a companion macro virus discovered at the end of May 1999. It doesn't infect "Normal.dot" or documents. This macro virus replicates attaching a template "Default.dot" in the documents. This template is a separate file that contains the macro virus code.


Automatic action

Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.

More scanning & removal options

More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

When an infected document is opened, the virus attempts to copy the "Default.dot" file from the active document's directory to the Word's startup directory with the name "Startup.dot". This way the macro virus code executes every time when Word is opened. Once installed the virus replicates by copying the "Startup.dot" as "Default.dot" to the active document's directory, and attaching this template to the document during the save operation.

The virus will not spread further on another computer if the "Default.dot" template is deleted and the user opens the document.

W97M/Osm.A virus hides the "Tools/Macro" dialog by creating its own dialog box similar to the original one. Any attempt to change or create a macro fails and the virus shows a message box:

You do not have permission to create macros on this computer.

The virus code is invisible via "Tools/Macro/Visual Basic Editor", because the template project is originally password protected.

Additionally the attached template contains a hidden embedded executable file "A:\osm32.EXE" that contains a dropper of Back Orifice trojan which is infected twice with W95/Marburg.8582 virus. The macro virus executes this embedded file by activating it, using Visual Basic command.

Since the embedding of the executable file contains the reference to drive "A:", the virus may cause an error when the macro virus is executed from another drive or directory. However, this doesn't stop the macro virus to replicate and to execute the infected embedded executable file.

As a result of all these attached and embedded virus codes, the macro virus will cause infection with tree different viruses/trojans.

Submit a Sample

Suspect a file or URL was wrongly detected? Send it to our Labs for further analysis

Submit a Sample

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

More Info