TROJ_SMALL.LIL
Windows 2000, Windows XP, Windows Server 2003
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It executes then deletes itself afterward.
It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts the computer at a greater risk of infection by other threats. As of this writing, the said sites are inaccessible.
TECHNICAL DETAILS
70,192 bytes
EXE
No
04 Jul 2009
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following files:
- %System%\mspciuv.dll
(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)
Its DLL component is injected to the following process(es):
- svchost.exe
It executes then deletes itself afterward.
Autostart Technique
This Trojan modifies the following registry entry(ies) to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\stisvc\Parameters
ServiceDll = "%System%\mspciuv.dll"
(Note: The default value data of the said registry entry is %SystemRoot%\system32\wiaservc.dll.)
Download Routine
This Trojan connects to the following malicious URLs:
- hackerken.{BLOCKED}2.org
As of this writing, the said sites are inaccessible.