|Detected||Jul 18 2010 14:59 GMT|
|Released||Jul 19 2010 06:31 GMT|
|Published||Mar 22 2011 09:27 GMT|
This Trojan delivers a malicious payload to the user's computer. It is a Windows application (PE DLL file). It is 26 625 bytes in size. It is written in C++.
The Trojan copies its body to the Windows system directory as "iqum.tco":
%System%\iqum.tcoIn order to ensure that it is launched automatically when the system is rebooted, the Trojan adds an entry to the system registry autorun key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] "Shell"="Explorer.exe rundll32.exe iqum.tco lqpjxwe">
If Microsoft Office is installed on the user's computer, the Trojan sets the security level to low by registering the following values in the system registry key:
[HKCU\Software\Microsoft\Office\11.0\Word\Security] "Level" = "1" "AccessVBOM" = "1"It also executes a macro, through which the original body of the Trojan is launched for execution.
To ensure that its process is unique within the system, the Trojan creates a unique identifier:
54774082920a5dc9dThen, the Trojan creates a process named "svchost.exe" and injects its malicious code into the process's address space:
svchost.exeThe Trojan sends a request to the following address:
http://repu***cracy.cn/myxxx/bb.phpAt the time of writing, this link was inactive.
In response, it receives a configuration file for its subsequent functionality.
Links received from the configuration file for downloading other malicious files are saved by the Trojan in the following registry key:
If your computer does not have an antivirus, and is infected by this malicious program, follow the instructions below to delete it:
[HKCU\Software\Microsoft\Office\11.0\Word\Security] "Level" "AccessVBOM"
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] "Shell" = "Explorer.exe"
This type of behaviour covers malicious programs that delete, block, modify, or copy data, disrupt computer or network performance, but which cannot be classified under any of the behaviours identified above.
This classification also covers “multipurpose” Trojan programs, i.e. those that are capable of conducting several actions at once and which demonstrate several Trojan behaviours in a single program. This means they cannot be indisputably classified as having any single behaviour.