WORM_AUTOSIPOC.B
Worm.MSIL.Agent.ck (Kaspersky), Worm:MSIL/Autosipoc.A (Microsoft), W32.SillyFDC (Symmantec), MSIL/AutoCopies (Mcafee), Trojan.Win32.Generic.pak!cobra (Sunbelt), Worm/Autosipoc.A.3 (Antivir), Worm.Generic.324853 (Bitdefender), W32/Agent.CK!worm (Fortinet), Worm.Win32.Msil (Ikarus), Win32/Agent.NJY worm (Esset), Generic (Panda), Worm.MSIL.Agent (Vba32)
Windows

Threat Type: Worm
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
Arrival Details
This worm arrives via removable drives.
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This worm drops the following copies of itself into the affected system:
- {My Music folder}\Imagenes2.exe
- {My Pictures folder}\Imagenes2.exe
- %Start Menu%\Programs\Imagenes2.exe
- {malware path}\Music.exe
(Note: %Start Menu% is the current user's Start Menu folder, which is usually C:\Windows\Start Menu or C:\Documents and Settings\{User name}\Start Menu on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista and 7.)
Propagation
This worm drops the following copy of itself in all physical and removable drives:
- {drive letter}:\{folder}\..{folder}\{folder name}.exe
- Note that this worm uses names of existing folders as filenames for its dropped copies