TROJ_ARTIEF.CJV
Trojan.Mdropper (Symantec); Exploit.MSWord.CVE-2010-3333.b (Kaspersky)
Windows 2000, Windows XP, Windows Server 2003

Threat Type: Trojan
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087).
Once it successfully exploits the said vulnerability, it drops a file detected as TROJ_DROPR.VTG.
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
TECHNICAL DETAILS
Installation
This Trojan drops the following non-malicious file:
- %User Temp%\{malware file name}.doc
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.)
Dropping Routine
This Trojan takes advantage of the following software vulnerabilities to drop malicious files:
- to allow full scanning of your computer.
Step 2
Remove malware files dropped/downloaded by TROJ_ARTIEF.CJV