Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/PSW.Tepfer.apmh
Date discovered:16/07/2012
Type:Trojan
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low
File size:87584 Bytes
MD5 checksum:933f36c1954f46b725d7da3d71c46dcb
VDF version:7.11.36.92 - Monday, July 16, 2012
IVDF version:7.11.36.92 - Monday, July 16, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-PSW.Win32.Tepfer.apmh
   •  Grisoft: SHeur4.AJLE
   •  Eset: Win32/Agent.TUM trojan
     GData: Trojan.Generic.KDV.673626


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7


Side effects:
   • Registry modification

 Files It copies itself to the following locations:
   • %appdata%\csrss.exe
   • %appdata%\System32\rundll32.exe
   • %appdata%\svchost.exe

 Registry To each registry key one of the values is added in order to run the processes after reboot:

  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Client Server Runtime Process"="C:\%appdata%\\csrss.exe"
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\System32\\rundll32.exe"
   • "Service Host Process for Windows"="C:\%appdata%\\svchost.exe"

  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Client Server Runtime Process"="C:\%appdata%\\csrss.exe"
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\System32\\rundll32.exe"
   • "Service Host Process for Windows"="C:\%appdata%\\svchost.exe"

  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\csrss.exe"

  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\csrss.exe"



It creates the following entry in order to bypass the Windows XP firewall:

[HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile\AuthorizedApplications\List]
   • "Client Server Runtime Process"="C:\%appdata%\\csrss.exe"
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\System32\\rundll32.exe"
   • "Service Host Process for Windows"="C:\%appdata%\\svchost.exe"

[HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile\AuthorizedApplications\List]
   • "Host-process Windows (Rundll32.exe)"="C:\Documents and
      Settings\\vanciefancie\\Application Data\\csrss.exe"



The following registry key is added:

[HKCU\Software\BC Clients]
   • "0"=".{RM
   • \"'$H/::l <-\0x008DR+=8(<.^]8(\"\";,K *%$NH]1\" / & B/nM-53UN2<:?o71H"
   • "1"=".{RM
   • \"'$H/::l <-\0x008DR+=8(<.^]8(\"\";,K *%$NH]1\" / & B/nM-53U>8==),a{13;'(->z\0x0178o+1)"
   • "2"=".{RM
   • \"'$H/::l <-\0x008DR+=8(<.^]8(\"\";,K *%$NH]1\" / & B/nM-53U^7-!
   • 2&gH9+"
   • "d"="N{R149N:L,>%)o71H"

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS servers are contacted:
   • smtp.**********e.com
   • puzzle**********talking.com

Description inserted by Wensin Lee on Tuesday, July 17, 2012
Description updated by Wensin Lee on Tuesday, July 17, 2012

Back . . . .