Analysis by: Lord Alfred Remorin

ALIASES:

Exploit:Win32/CVE-2012-0158 (Microsoft), Trojan.Mdropper (Symantec), Exp/20120158-A (Sophos)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

  TECHNICAL DETAILS

File Size: 186,864 bytes
File Type: RTF
Memory Resident: Yes
Initial Samples Received Date: 15 Aug 2012

Arrival Details

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

Installation

This Trojan drops and executes the following files:

  • %User Temp%\WINWORD.EXE - detected as TSPY_FLAME.M

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.)

Dropping Routine

This Trojan takes advantage of the following software vulnerabilities to drop malicious files:

NOTES:

Upon execution, this Trojan drops and opens a document file to hide its malicious routines from the user.

  SOLUTION

Minimum Scan Engine: 9.200
FIRST VSAPI PATTERN FILE: 9.326.08
FIRST VSAPI PATTERN DATE: 15 Aug 2012
VSAPI OPR PATTERN File: 9.327.00
VSAPI OPR PATTERN Date: 15 Aug 2012

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove the malware/grayware file that dropped/downloaded TROJ_MDROPPER.CD