Message-ID: <000e01c0dae1$7e1e8500$0301000a@marvin> From: "Alexander Lehmann" To: Cc: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: Fw: Computer Virus Information from a Friend! Date: Sat, 12 May 2001 14:42:56 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Reply-To: djgpp AT delorie DOT com Hi, the Mail sent by Javier Mendez to the list contains the Happy Time Virus: bye, Alexander ----- Original Message ----- From: To: Sent: Saturday, May 12, 2001 2:33 PM Subject: Computer Virus Information from a Friend! > Greetings, lehmann AT nexgo DOT de > > I thought you would be interested in knowing about this computer Virus... > > Name: VBS/Haptime AT MM > > Characteristics: > This Visual Basic Script virus will append itself to files, delete files, > and can spread via embedded VBScript, contained in the body of HTML > formatted email messages. > When the script is permitted to run, the virus inserts itself at the end > of .ASP, .HTM, .HTML, .HTT, and .VBS files. If the current day plus the > current month is equal to 13, the virus attempts to delete .DLL and .EXE > files on local and network drives. > The virus saves its viral code to HELP.HTA and HELP.VBS in the first > directory found on the C: drive, and to HELP.HTM and UNTITLED.HTM in the > WINDOWS directory. > A registry key value is created to set the HELP.HTM file to the current > wallpaper which results in the execution of the virus at system startup, > if active desktop is enabled: > HKCU\Control Panel\Desktop\wallPaper=%WinDir%\HELP.HTM > In a similar fashion to JS/Kak AT M, this virus configures the default > stationary used by Microsoft Outlook Express to an external file, > %WinDir%\UNTITLED.HTM. This causes each message sent from Outlook Express > to contain hidden viral code. These setting are modified in the registry > to accomplish this task: > HKCU\Identities\(User ID)\Software\Microsoft\Outlook > Express\5.0\Mail\Message Send HTML="1" > HKCU\Identities\(User ID)\Software\Microsoft\Outlook > Express\5.0\Mail\Compose Use Stationery="1" > HKCU\Identities\(User ID)\Software\Microsoft\Outlook > Express\5.0\Mail\Stationery Name="%WinDir%\Untitled.htm" > Additionally, the .HTT files in the %WinDir%\WEB directory are infected, > which results in the virus getting executed each time a folder is viewed > as a web page. > The virus keeps track of the number of times that it has been executed by > creating a new registry key and incrementing a key value in this key: > HKCU\Software\Help\ > Once the counter reaches a multiple of 366, the virus will unsuccessfully > attempt to attach UNTITLED.HTM to the email message which it sends. > > To check your system for this Virus, and to learn how to protect yourself > from computer viruses, visit the McAfee.com Clinic at > http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=2103. > > For complete information on this Virus, view McAfee.com's Virus > Information Library listing at > http://vil.mcafee.com/dispVirus.asp?virus_k=99080. > > This email was sent to you by Alexander Lehmann > >