TrojanSpy.Win32.FAUXPERSKY.AB
Trojan-Downloader.Win32.Autohk (Ikarus)
Windows
Threat Type: Trojan Spy
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan Spy adds the following processes:
- %AppData%\Kaspersky PURE v3.0\spoolsvc.exe -> detected as TrojanSpy.Win32.FAUXPERSKY.AA
It creates the following folders:
- %AppData%\Kaspersky PURE v3.0 (attributes set to Read-Only, System, and Hidden)
Other Details
This Trojan Spy does the following:
- It opens the following folder:
- %System Root%\Kaspersky PURE v3.0\Vault
- It copies the following files if they don't exist in the created folder yet (%AppData%\Kaspersky PURE v3.0) and sets their attributes to Read-Only, System, and Hidden):
- Files with .exe extension in {Malware Directory}
- It must be executed as winlogin.exe in order to proceed with the copying of files.
(Note: %System Root% is the Windows root folder, where it usually is C:\ on all Windows operating system versions.)
SOLUTION
Step 1
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Step 2
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 3
Restart in Safe Mode
Step 4
Search and delete these folders
- %AppData%\Kaspersky PURE v3.0
Step 5
Restart in normal mode and scan your computer with your Trend Micro product for files detected as TrojanSpy.Win32.FAUXPERSKY.AB. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.