Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Mydoom.A2@mm
Detected by Microsoft Defender Antivirus
Aliases: W32/Mydoom@MM (McAfee) W32.Mydoom.A@mm (Symantec) WORM_MYDOOM.A (Trend Micro) Win32.Mydoom.A (CA)
Summary
Win32/Mydoom.A2@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll that acts as a backdoor. After February 1, 2004, the worm attempts to perform a denial-of-service (DoS) attack against www.sco.com.
To manually recover from infection by Win32/Mydoom.A2@mm, perform the following steps:
- Disconnect from the Internet.
- End the worm process.
- Delete the worm files from your computer.
- Delete the worm registry entry.
- Take steps to prevent re-infection.
Disconnect from the Internet
To ensure that your computer is not actively infecting other computers, you should disconnect it from the Internet before proceeding.
End the worm process
Next you should end the worm process. This helps to stop your computer from infecting other computers. It also resolves the crashing, reboot, and performance degradation issues caused by the worm.
To end the worm process
- Press CTRL+ALT+DEL once and click Task Manager.
- Click the Processes tab.
- On the Processes tab, click Image Name to sort the running processes by name.
- Select the process taskmon.exe, and click End Process.
This ends the worm processes and stops the worm from running on your computer.
Delete the worm files from your computer
Once you have stopped the worm from running, you should delete the worm code from your computer.
To delete the worm files from the hard disk
- Click Start, and then click Run.
- In the Open field, type %System%
- Press Enter.
- Click the Name column to sort files by name.
- Find the file taskmon.exe and delete it.
This removes the worm code from your computer. If deleting taskmon.exe fails, use the following steps to verify that taskmon.exe is not running:
- Press CTRL+ALT+DEL once and click Task Manager.
- Click the Processes tab.
- Confirm that mschost.exe is not in the list.
Delete the worm registry entry
Win32/Mydoom.A2@mm creates an entry in the Windows registry that attempts to run the worm every time your computer restarts. This entry should be deleted.
To delete the worm registry entry
- Click Start, and then click Run.
- In the Open field, type regedit
- Press Enter.
- Navigate to the registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- Right-click the value
TaskMon %System%\taskmon.exe
or
TaskMon %Temp%\taskmon.exe
and click Delete. - Click Yes.
- Exit the registry.
Take steps to prevent re-infection
You should not reconnect your computer to the Internet until the computer is protected from re-infection.