W2KM_HANCITOR.YYSVS


 ALIASES:

WM/Agent.OE!tr (Fortinet), Trojan:O97M/Madeba.A!det (Microsoft), W97M/Dropper.ci (McAfee)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.

  TECHNICAL DETAILS

File Size:

261,120 bytes

File Type:

DOC

Initial Samples Received Date:

24 Aug 2016

Arrival Details

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

Dropping Routine

This Trojan drops the following files:

  • %User Temp%\hd831.exe

(Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)

It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.

Other Details

This is the Trend Micro detection for Microsoft Word documents that are compromised through the insertion of a malicious macro.