Analysis by: Jeffrey Bernardino

 PLATFORM:

Windows 2000, XP, Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

This is the Trend Micro detection for files that exhibit certain behaviors.

  TECHNICAL DETAILS

File Size: 53,248 bytes
File Type: PE
Memory Resident: Yes
Initial Samples Received Date: 05 Sep 2010

Other Details

This is the Trend Micro detection for:

  • Files targeting Trend Micro OfficeScan Corporate Edition (OSCE) server, which are added by TROJ_FAKETM.C to the Trend Micro Scan engine package and are executed with ofcservice service. TROJ_FAKETM.C repackages the Trend Micro scan engine by adding certain files in Trend Micro directory. It renames certain .SYS files included in Trend Micro scan engine pakage to .BIN files and replaces them with malicious and other non-malicious files.

It does the following:

  • It is responsible for restoring .BIN files to the Trend Micro application path using the original .SYS file extension name.
  • It queries the following registry entry to check for Trend Micro application path:

    HKEY_LOCAL_MACHINE\SOFTWARE\Trend Micro\PC-cillinNTCorp\CurrentVersion
    Application Path = "{Trend Micro directory}"

  SOLUTION

Minimum Scan Engine: 8.900
VSAPI OPR PATTERN File: 7.441.00
VSAPI OPR PATTERN Date: 06 Sep 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by TROJ_FAKETM.B

    •  TROJ_FAKETM.C

Step 3

Scan your computer with your Trend Micro product to delete files detected as TROJ_FAKETM.B. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.

Related Malware