Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
Worms automatically spread to other PCs. They can do this in a number of ways, including by copying themselves to removable drives, network folders, or spreading via email.
The following free Microsoft software detects and removes this threat:
Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.
Disable Autorun
This threat tries to use the Windows Autorun function to spread via removable drives, like USB flash drives. You can disable Autorun to prevent worms from spreading:
Worm:Win32/Copali.B copies itself to c:\z\csrss.exe.
The malware creates the following files on your PC:
c:\z\desktop.ini
Spreads via…
Removable drives
Worm:Win32/Copali.B can create the following copies on removable drives, such as USB flash drives:
<targeted drive>:\z\csrss.exe
Payload
Changes system settings
Worm:Win32/Copali.B hides the "Show hidden files and folders" option in the Windows Explorer Folders Options menu by making the following registry change:
Sets value: "CheckedValue" With data: "0" In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL
This malware description was produced and published using automated analysis of file SHA1 123e2f1464f44ad7cbb2a99ac3fe4a6088f51346.