Worm.Vbs.HeadTail.a, Virus:VBS/Invadesys.A (Microsoft), VBS.Invadesys.A (Symantec), VBS/HeadTail-A (Sophos)


A standalone malicious program which uses computer or network resources to make complete copies of itself.


Automatic action

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

UPDATE (July 22 2009):

F-Secure Anti-Virus products had a brief False Alarm with this detection. A clean file called avh_fsav_800_bin was detected as being infected on 21 July 2009. This has now been fixed with the database update, 2009-07-21_10.If the avh_fsav_800_bin file was removed, it will be recreated automatically and there is no need for further action by the user. We apologize for any inconvenience.

Technical Description

Worm:VBS/HeadTail.A is a Visual Basic Script worm that propagates by copying itself to available removable, fixed, and remote drives. It is also able to delete predefined files and processes.


Whenever the specified drive is accessed in systems with Drive Type Autorun Enabled settings, the malware will automatically execute itself.Upon execution, this malware will search in removable, fixed, and remote drives for HTA, HTM, HTML, ASP and VBS files whose file size is less than 350000 Bytes to infect. It then creates a autorun registry entry in :

  • HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load

As a way to infect more files and enable additional executions, the worm modifies the file association of the following file types to execute the malware first:

  • .CHM
  • .HLP
  • .REG
  • .TXT

As part of the malware's restrictions in terms of infection, the malware will infect no more than 1000 files that is found on single execution.HeadTail.A uses the System and Hidden file properties and sets the registry to disable viewing of files with such attributes in order to hide from the user.


HeadTail.A checks the filename and if it contains predefined strings (supposedly related to adult videos), it will delete the file. The file formats are as below:

  • .AVI
  • .MPG
  • .RM
  • .RMVB

It will also monitor and ensure that the following processes are terminated :

  • 360tray.exe
  • cmd.com
  • cmd.exe
  • msconfig.exe
  • ras.exe
  • regedit.com
  • regedit.exe
  • regedit.pif
  • regedit.scr
  • SREng.exe
  • taskmgr.exe
  • USBAntiVir.exe

Based on the parameters, HeadTail.A is capable of removing all system modifications and deleting all its copies. It can also disinfect all infected files accessible in the system.

Date Created: 2007-12-27 02:37:54.0

Date Last Modified: 2009-08-19 09:23:42.0