|Detected||Jun 06 2006 10:43 GMT|
|Released||Feb 08 2007 12:24 GMT|
|Published||Jun 06 2006 10:43 GMT|
This memory resident malicious program is a Windows PE EXE file written in Microsoft Visual C++. The file is 7013 bytes in size. However, file size varies significantly from variant to variant.
Once launched, the Trojan copies itself to the Windows root directory as SERVICES.EXE and then launches this file for execution.
The original file will then be deleted.
The Trojan also creates the following keys in the system registry:
The SERVICES.EXE which is launched in a separate stream constantly creates the following values in the system registry:
This ensures that the Trojan file will be launched automatically each time Windows is rebooted on the victim machine.
It is impossible to terminate the Trojan process as Windows believes it to be a system process (%system%\services.exe — this is due to the fact that the name of the Trojan process is identical to that launched on the system.).
The Trojan is also capable of downloading files from the Internet and launching them on the victim machine.
Doing this ensures that rescue.bat will be launched instead of the Event Log system servcie.
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.