ESILE
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This malware drops the following files:
- %User Temp%\calendar.xls
- %User Temp%\iexplore.bat
The dropped .BAT file is then executed by the malware. Therefore the malicious routines of the dropped file are exhibited on the affected system.
The .XLS file is then opened by the malware to trick the user into thinking that opening the xls file was the only behavior exhibited on the system.
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal.
It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
TECHNICAL DETAILS
Yes
Installation
This Trojan drops the following files:
- %User Temp%\calendar.xls
- %User Temp%\iexplore.bat
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
It bears the file icons of the following applications:
- Microsoft Excel
Dropping Routine
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
NOTES:
It drops a legitimate .XLS file and executes it. Thus, the malware tricks the user into thinking it is only opening an .XLS file.