SCF Advanced Search

  • Total Members: 13889
  • Latest: loutlos
  • Total Posts: 40176
  • Total Topics: 14281
  • Online Today: 699
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)

Author Topic:  (Read 3370 times)

0 Members and 1 Guest are viewing this topic.


  • SCF Global Moderator
  • *****
  • Posts: 1076
  • KARMA: 22
  • Gender: Male
« on: 16. June 2007., 15:11:09 »
This detection is for a trojan which attempts to steal information from a user's system.  It gathers keyboard strokes, window and clipboard contents and other system-specific information.

There have been multiple spam runs recently of this trojan, with a filename of Proforma_Invoice.doc (689,664 bytes).  The MD5s of the files from separate spam runs differ.  Previous variants may be detected with the 5055 DATs as Generic Dropper.p and dropped files as Generic Spy.e.
Characteristics -

This trojan has recently been spammed with emails like the following:

Subject: Proforma Invoice for Chicago Display Marketing Corporation

Message body:

To: Chicago Display Marketing Corporation (Attn: names vary)

The Proforma Invoice is attached to this message. You can find the file in
the attachments area of your email software.

PS: The invoice also includes the cost for the services provided for the
second quarter of 2007.
Please read, evaluate and reply with any comments. Thanks.

Beckman Instruments, Inc.
2500 Harbor Boulevard, E-26-C
Fullerton, CA 92634-3100

Attachment: Proforma_Invoice.doc


The spam emails contain a DOC file (Proforma_Invoice.doc) which contains an executable which must then be double-clicked to run.  The DOC file has the following text:

Upon execution the trojan drops Microsoft.DLL and Microsoft.EXE in various locations.  This location varied between variants.

For example:
C:\Microsoft.dll (425,986 bytes)
C:\Microsoft.exe (119,810 bytes)

Registry entries were created to run itself at windows startup, such as the following:
CurrentVersion\Run Win32KernelStart = Data: "C:\microsoft.exe"
CurrentVersion\Run Win32KernelStart = "C:\microsoft.exe"

It also creates a Browser Helper Object to start the DLL each time Internet Explorer is started.
Symptoms -

Presence of the files and registry entries listed previously
Method of Infection -

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include email, IRC, peer-to-peer networks, newsgroup postings, etc.
Removal -

All Users:
Use specified engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

Additional Windows ME/XP removal considerations

# Online Anti-Malware Scanners:,734.0.html

Samker's Computer Forum -
« on: 16. June 2007., 15:11:09 »


  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • - Samker's Computer Forum
« Reply #1 on: 24. July 2007., 19:49:31 »
- Comon Removal method:

1. Check your AntiVirus (which one is, is it updated and did you make full scan of your PC - after update).

2. If you can't clean threats with this way, reinstal your AV and download & instal one off this AV: McAfee or Kaspersky (here at we provide you link to latest downloads, just check right section) and go again at step 1, don't forget to update your Windows OS (you can even use Autopatcher just download them from right section at

3. Also don't forget to turn off System Restore at your PC.

***If you, after this all steps, still have problem with this Malware go and post Your problem in Our HELP section, direct link is in my Signature (right belowe this post).***

Samker's Computer Forum -

« Reply #1 on: 24. July 2007., 19:49:31 »


With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters)

Enter your email address to receive daily email with ' - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising