Virus Characteristics
The trojan arrives as an email attachment named SCENES.ZIP.
The .ZIP file contains the file SCENES.WRI, which is a Wordpad document. This document contains two embedded objects - SCENES1.JPG and SCENE2.JPG. The object named SCENE2.JPG is an embedded image named "Copy of IMG_0017.jpg".
The second object named SCENES1.JPG is actually an embedded executable named "Copy of RESULT.EXE". When opened, it executes the "Copy of RESULT.EXE" executable. Upon execution, the trojan unpacks several files into the Windows\temp folder, and then displays a JPEG using the default viewer, while it launches the mass-mailing script. It may also attempt to launch two other malicious programs.
The unpacked files are randomly named, and consist of the following:
- a Visual Basic Script file for the mass-mailing routine
- a remote access server component
- the trojan Downloader-b which attempts to download another backdoor trojan
The VBS file attempts to use MAPI to mail itself to all addresses in the Windows Address Book. The emails which it generates will have the following characteristics:
Subject: "Scene from last weekend."
Body: "Please do not forward!!!"
Attachment: SCENES.ZIP
The files dropped by the trojan are detected by current anti-virus software as:
- VBS/Generic@mm (NAI) or VBS.VBSWG.gen (Symantec)
- Downloader-b (NAI) or Dowloader.Trojan (Symantec)
- Backdoor.RS (NAI) or Backdoor.Trojan (Symantec)
Payload
Mails itself out to all addresses found in the Outlook Address Book. It drops at least two remote access trojans.
Due to the amount of user interaction required to launch the malicious code, this threat is not likely to cause mass mailing on a large scale.
Preventative Measures
Block all messages at the messaging gateway with the following characteristics:
Subject: Scene from last weekend.
Body: Please do not forward!!!
Attachment: SCENES.ZIP