TROJ_FAKEXPA.CE
Windows 98, ME, NT, 2000, XP, Server 2003
Threat Type: Trojan
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Trojan has received attention from independent media sources and/or other security firms.
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
However, due to errors in its code, it fails to perform its intended routine.
TECHNICAL DETAILS
214,528 bytes
PE
Yes
15 Feb 2010
Displays windows, Downloads files
Arrival Details
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.
It may be unknowingly downloaded by a user while visiting malicious websites.
Installation
This Trojan adds the following folders:
- %Program Files%\PersonalSec
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files.)
Other System Modifications
This Trojan adds the following registry keys as part of its installation routine:
HKEY_LOCAL_MACHINE\SOFTWARE\{random characters}
(Default) =
Download Routine
This Trojan accesses the following websites to download files:
- http://{BLOCKED}aredownloadserver.com/download/winlogo.bmp
It saves the files it downloads using the following names:
- %Program Files%\PersonalSec\psecurity.exe - also detected as TROJ_FAKEXPA.CE
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files.)
Other Details
However, due to errors in its code, it fails to perform its intended routine.
SOLUTION
8.900
6.852.07
16 Feb 2010
6.943.00
22 Mar 2010
Step 1
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Step 2
Scan your computer with your Trend Micro product to delete files detected as TROJ_FAKEXPA.CE. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.