Trojan.FakeAlert.ACR
HIGH
MEDIUM
~200KB
(Backdoor.Win32.Frauder.ca; Win32/TrojanDownloader.FakeAlert.IC trojan; Win32:FraudLoad-RM; BDS/Frauder.CE)
Symptoms
The sudden change of the desktop background, without user consent, with an image alerting the user that his computer is infected.
The presence of the following files in %SYSDIR%: blphc9pvj0e1ac.scr, lphc9pvj0e1ac.exe, phc9pvj0e1ac.bmp.
Removal instructions:
Please let BitDefender delete your files.
In order to be able to change your desktop, run regedit and delete the following registry keys:
HKCU\Software\Sysinternals\Bluescreen Screen Saver
EulaAccepted -> 0x00000001
HKLM\SOFTWARE\Microsoft\Software Notifier
InstallID = 83ee564f-bf54-4dca-a4ff-f5601fbdefac
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
NoDispScrSavPage = 0x00000001
NoDispBackgroundPage = 0x00000001
Analyzed By
Dana Stanut, virus researcher
Technical Description:
When executed, this malware will drop the following files in %SYSDIR%:
blphc9pvj0e1ac.scr - this file will be set as the new screensaver and
it is detected by BitDefender as Trojan.FakeAlert.AAI
lphc9pvj0e1ac.exe - a copy of the initial file
phc9pvj0e1ac.bmp - the image used as wallpaper, detected by
BitDefender as Trojan.FakeAlert.AAF
In order to be executed at every system startup, it adds the following registry key:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lphc9pvj0e1ac -> C:\WINDOWS\system32\lphc9pvj0e1ac.exe
It sets the new wallpaper and screensaver by adding/modifying the registry keys presended below (after these modifications the user will not be able to modify his background image and/or screensaver):
HKCU\Control Panel\Desktop
OriginalWallpaper = C:\WINDOWS\system32\phc9pvj0e1ac.bmp
TileWallpaper = 0
WallpaperStyle = 0
SCRNSAVE.EXE = C:\WINDOWS\system32\blphc9pvj0e1ac.scr
ScreenSaveTimeOut = 600
Wallpaper = C:\WINDOWS\system32\phc9pvj0e1ac.bmp
ConvertedWallpaper = C:\WINDOWS\system32\phc9pvj0e1ac.bmp
HKCU\Software\Sysinternals\Bluescreen Screen Saver
EulaAccepted = 0x00000001
HKLM\SOFTWARE\Microsoft\Software Notifier
InstallID = 83ee564f-bf54-4dca-a4ff-f5601fbdefac
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
NoDispScrSavPage = 0x00000001
NoDispBackgroundPage = 0x00000001
It will also attempt to download a rogue antivirus from http://antivirusxp-2008.net - wich, once installed, will alert the user about false infections detected on his computer in order to mislead him to buy the licensed version of this software.
After all these modifications, the current system state is saved as the "Last good restore point" using a VB script detected by BitDefender as Application.CleanSystemRestore.A.
SHARE
THIS ON