Analysis by: Kathleen Notario
 Modified by: Jasen Sumalapao

ALIASES:

TrojanDropper:Win32/Sirefef.B (Microsoft); Trojan.Win32.Sasfis.bvii (Kaspersky); Adware.Lop (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt); W32/Sasfis.BVII!tr (Fortinet)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

Infection Channel: Downloaded from the Internet, Dropped by other malware, Bundled with malware packages as a malware component

TROJ_SASFIS.HS terminates and modifies the Access Control List (ACL) of processes that attempt to access it. When users attempt to execute forensic tools such as Process Explorer, it may display a popup message.

It infects system drivers (SYS) that meet certain conditions.

This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It deletes itself after execution.

  TECHNICAL DETAILS

File Size: 174,423 bytes
File Type: EXE
Memory Resident: Yes
Initial Samples Received Date: 03 Jul 2011
Payload: Terminates processes

Arrival Details

This Trojan may arrive bundled with malware packages as a malware component.

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan injects itself into the following processes as part of its memory residency routine:

  • Explorer.exe

Other Details

This Trojan deletes itself after execution.

NOTES:

This Trojan will terminates and modify the Access Control List (ACL) of processes that attempt to access it. Infected systems are easily identified when users attempt to execute forensic tools such as Process Explorer.

For instance, it will not allow any user to execute Process Explorer and instead will display the pop-up message below:

This Trojan will enumerate all system drivers (SYS) using the following conditions:

  • search for drivers between classpnp.sys and win32k.sys
  • check for size must be greater than the malware code

This Trojan will then infect the SYS files by overwriting the first 53,248 bytes (D000H) of the file.

  SOLUTION

Minimum Scan Engine: 9.200
VSAPI OPR PATTERN File: 8.267.00
VSAPI OPR PATTERN Date: 04 Jul 2011

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Using Trend Micro Rootkit Buster

RootkitBuster is a rootkit scanner that can check through hidden files, registry entries, processes, drivers, and hooked system services.

To use this tool, do the following:

  1. Download the tool from the following link and extract it to a temporary folder:
    https://www.trendmicro.com/download/rbuster.asp
  2. Run the RootkitBuster.exe file.
  3. On the upper left corner, select the types of hidden items that you wish to scan. We recommend selecting all types.
  4. Click the Scan button.
  5. The system is infected by this malware if the Scan result is similar to the image below:

    rootkitbuster

Step 3

Restart in normal mode and scan your computer with your Trend Micro product for files detected as TROJ_SASFIS.HS. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

NOTES:
Step 4

In command prompt, execute the following command:

  • cacls (path and filename) /G Everyone:F
where (path and filename) is the complete location of the file in your system that the ACL has been modified by the malware.


Did this description help? Tell us how we did.