Analysis by: Roland Marco Dela Paz

ALIASES:

Trojan.Mdropper (Symantec); Exploit.MSWord.CVE-2010-3333.b (Kaspersky)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087).

Once it successfully exploits the said vulnerability, it drops a file detected as TROJ_DROPR.VTG.

Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.

  TECHNICAL DETAILS

File Size: 224,799 bytes
File Type: Other
Memory Resident: No
Initial Samples Received Date: 17 Mar 2011

Installation

This Trojan drops the following non-malicious file:

  • %User Temp%\{malware file name}.doc

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.)

Dropping Routine

This Trojan takes advantage of the following software vulnerabilities to drop malicious files:

  • to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by TROJ_ARTIEF.CJV