The virus is not a conventional attachment, it is delivered thus:
- The Word document (sra.dcom) contains long strings of hidden text which are obviously program code.
- When the document is opened (security levels permitting) then it runs a macro (think of it as a little App) which also hidden within the document.
- The macro reads through the document and uses this to construct a program which is written to the hard drive of the computer.
- This newly created program (the virus or trojan) is then executed.