Trojan-Dropper.Win32.Datcaen.d
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 19 |
First Seen: | April 4, 2013 |
Last Seen: | June 16, 2022 |
OS(es) Affected: | Windows |
Trojan-Dropper.Win32.Datcaen.d is a Trojan that is involved in the targeted attacks being sent via a web address registered in Shanghai. The titles of the infected documents that spread Trojan-Dropper.Win32.Datcaen.d either point to articles from Men's Health magazine, involve military issues, or have Cyrillic file names. If opened, the infected documents will illustrate a text document that incorporates the information promised in the title, while Trojan-Dropper.Win32.Datcaen.d is installed on the compromised PC. When the exploit is run, it creates and executes a file called 'wordupgrade.exe'. This executable file downloads a DLL file called 'usrsvpla.dll' into the system32 directory and makes modifications to the WmdmPmSN (Portable Media Serial Number Service) registry key to load the DLL into 'svchost.exe'. The malware infection, 'wordupgrade.exe', installed by these infectious documents is a variant of Enfal/Lurid, recognized as Trojan-Dropper.Win32.Datcaen.d.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | wordupgrade.exe | |
2. | usrsvpla.dll |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.