Virus Profile: Exploit-CVE2010-0188

Threat Search
Print
   
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 4/6/2012
Date Added: 4/6/2012
Origin: Unknown
Length: Varies
Type: Trojan
Subtype: Exploit
DAT Required: 6841
Removal Instructions
   
 
 
   

Description

This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Aliases

  • Microsoft -  Exploit:Win32/CVE-2010-0188.D
  • Ikarus  - Exploit.PDF.Agent
  • Drweb  - Exploit.PDF.2990
  • Avg  - Exploit_c.VQW

Indication of Infection

Because this is a generic detection there is no specific description of the activity undertaken by JavaScript detected under this name, however these can include malicious activity such as downloading and executing files or scripts.

Methods of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.
   

Virus Characteristics

-----------------------Updated on may 8th 2014----------------------------------

Aliases

  • ESET-NOD32        -     PDF/Exploit.CVE-2013-2729.A
  • Kaspersky        -     Exploit.JS.CVE-2010-0188.f
  • Microsoft        -     Exploit:JS/Pdfjsc.AU


Exploit-CVE2010-0188” is the detection for specially crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. It may also have the instruction to download other payloads.

Trojan checks the installed component versions such as Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.

It may appear as an attachment to a spammed email message and might download other payloads.

------------------------------------------------------------------------------------------------------------------------


Exploit-CVE2010-0188” is the detection for specially designed PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.

Trojan checks the installed component versions such as Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 and allows the attacker to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.

It may appear as an attachment to a spammed email message or may be exist in a malicious webpage.

Upon execution the Trojan tires to connect the below URL though remote port 80 in order to download the other payloads

  • hxxp://fe[Removed]o.de/images/real.exe
  • hxxp://la[Removed]eit.de/throm/fotos/index.exe

The above mention site was down at the time of analysis


And also it creates the following files in the below location

  • %UserProfile%\Local Settings\Temporary Internet Files\Content.IE5\5K4TM6VV\real[1].exe[Detected as Generic PWS.zj]
  • %windir%\system32\playli.exe
  • %AppData%\Microsoft\Address Book\Administrator.wab~

The following registry keys has been created

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe\Debugger: "playli.exe"

The above mentioned registry ensures that, the Trojan registers itself with the compromised system and executes itself upon every reboot.

  • HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable: 0x00000000
  • HKEY_USERS\S-1-5-1[VARIES]\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable: 0x00000000

The above registry entries confirms that the Trojan disable the Proxy settings.

  • HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline: 0x00000000
  • HKEY_USERS\S-1-5-1[VARIES]\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline: 0x00000000
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cEmailDistribution\bAlwaysUseServerFD: 0x00000000
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cEmailDistribution\bDefaultFD: 0x00000000
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cEmailDistribution\tDistMethod: "EMAIL"
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cEmailDistribution\tUI: "Manually collect responses in my email inbox"
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cEmailDistribution\tURL: "urn://ns.adobe.com/Collaboration/Forms/Email"
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cDocumentCenter\bAlwaysUseServer: 0x00000000
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cDocumentCenter\bAlwaysUseServerFD: 0x00000000
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cDocumentCenter\bDefault: 0x00000001
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cDocumentCenter\bDefaultFD: 0x00000001
  • HKEY_USERS\S-1-5-2[VARIES]\Software\Adobe\Acrobat Reader\9.0\Collab\cDocumentCenter\tDistMethod: "UPLOAD"
   

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

   

PC Infected? Get Expert Help

McAfee
Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!

$89.95