Notable Characteristic Descriptions Parent topic

Anti-Security, Self-Preservation

Name
Description
Deletes antivirus registry entry
Removal of registry entries associated with security software may prevent these software from running.
Disables antivirus service
Disabling of services associated with security software may prevent these software from running.
Stops or modifies antivirus service
Stopping or modification of services associated with security software may prevent these software from running.
Uses suspicious packer
Malware are often compressed using packers to avoid detection and prevent reverse engineering.

Autostart or Other System Reconfiguration

Name
Description
Adds Active Setup value in registry
Values in the Active Setup registry key are used by Windows components. Malware may add such values to automatically run at startup.
Adds autorun in registry
Addition of autorun registry keys enables malware to automatically run at startup.
Adds scheduled task
Scheduled tasks are used to automatically run components at predefined schedules. Malware may add such tasks to remain active on affected systems.
Adds startup file or folder
Windows automatically opens files in the startup folder. Malware may add a file or folder in this location to automatically run at startup and stay running.
Modifies AppInit_DLLs in registry
Modification of DLLs in the AppInit_DLLs registry value may allow malware to inject its code into another process.
Modifies file with infectible type
Certain types of files that are located in non-system folders may be modified by malware. These include shortcut links, document files, dynamic link libraries (DLLs), and executable files.
Modifies firewall settings
Malware may add a firewall rule to allow certain types of traffic and to evade firewall protection.
Modifies important registry entries
Malware may modify important registry entries, such as those used for folder options, browser settings, service configuration, and shell commands.
Modifies IP address
Malware may modify the IP address of an affected system to allow remote entities to locate that system.
Modifies system file or folder
Modification of system files and usage of system folders may allow malware to conceal itself and appear as a legitimate system component.

Deception, Social Engineering

Name
Description
Creates message box
A fake message box may be displayed to trick users into construing malware as a legitimate program.
Drops fake system file
Files with names that are identical or similar to those of legitimate system files may be dropped by malware to conceal itself.
Uses deceiving extension
A deceiving file extension may be used to trick users into construing malware as a legitimate program.
Uses double DOS header
The presence of two DOS headers is suspicious because it usually occurs when a virus infects an executable file.
Uses double extension with executable tail
Double file extension names are commonly used to lure users into opening malware.
Uses fake icon
Icons from known applications or file types are commonly used to lure users into opening malware.
Uses fake or uncommon signature
Malware may use an uncommon, fake, or blacklisted file signature.
Uses file name associated with pornography
File names associated with pornography are commonly used to lure users into opening malware.
Uses spoofed version information
Malware may use spoofed version information, or none at all.

File Drop, Download, Sharing, or Replication

Name
Description
Copies self
Malware may create copies of itself in one or more locations on the system. These copies may use different names in order to lure the user into opening the file.
Creates multiple copies of a file
Multiple copies of a file may be created by malware in one or more locations on the system. These copies may use different names in order to lure the user into opening the file.
Deletes file
Malware may delete a file to compromise the system, to remove traces of the infection, or to prevent forensic analysis.
Deletes self
Malware may delete itself to remove traces of the infection and to prevent forensic analysis.
Downloads executable
Downloading of executable files is considered suspicious because this behavior is often only attributed to malware and applications that users directly control.
Drops driver
Many drivers run in kernel mode, allowing them to run with high privileges and gain access to core operating system components. Malware often install drivers to leverage these privileges.
Drops executable
An executable file may be dropped by malware in one or more locations on the system as part of its installation routine.
Drops file with infectible type
Certain types of files, such as shortcut links and document files, may be dropped by malware. Shortcut links are often used to lure users into opening malware, while document files may contain exploit payload.
Drops file into shared folder
A file may be dropped by malware in a shared folder as part of its propagation routine, or to enable transmission of stolen data.
Executes dropped file
Execution of a dropped file is considered suspicious because this behavior is often only attributed to malware and certain installers.
Renames downloaded file
Malware may rename a file that it downloaded to conceal the file and to avoid detection.
Shares folder
A folder may be shared by malware as part of its propagation routine, or to enable transmission of stolen data.

Hijack, Redirection, or Data Theft

Name
Description
Installs keylogger
Hooking of user keystrokes may allow malware to record and transmit the data to remote third parties.
Installs BHO
Browser helper objects (BHO) are loaded automatically each time Internet Explorer is started. BHOs may be manipulated by malware to perform rogue functions, such as redirecting web traffic.
Modifies configuration files
System configuration files may be modified by malware to perform rogue functions, such as redirecting web traffic or automatically running at startup.

Malformed, Defective, or with Known Malware Traits

Name
Description
Causes document reader to crash
Many document files that contain exploits are malformed or corrupted. Document readers may crash because of a malformed file that contains a poorly implemented exploit.
Causes process to crash
Malware may crash a process to run shellcode. This may also occur due to poorly constructed code or incompatibility issues.
Fails to start
Malware may fail to execute because of poor construction.
Detected as known malware
The file is detected using an aggressive pattern created for a specific malware variant.
Detected as probable malware
The file is detected using an aggressive generic pattern.

Process, Service, or Memory Object Change

Name
Description
Adds service
Services are often given high privileges and configured to run at startup.
Attempt to use document exploit
A document or SWF file that contains an exploit may pad memory with a sequence of no-operation (NOP) instructions to ensure exploit success.
Contains exploit code in document
Documents or SWF files may contain exploits that allow execution of arbitrary code on vulnerable systems. Such exploits are detected using the Trend Micro document exploit detection engine.
Creates mutex
Mutex objects are used in coordinating mutually exclusive access to a shared resource. Because a unique name must be assigned to each mutex, the creation of such objects serves as an effective identifier of suspicious content.
Creates named pipe
Named pipes may be used by malware to enable communication between components and with other malware.
Creates process
Creation of processes is considered suspicious because this behavior is not commonly exhibited by legitimate applications.
Executes a copy of itself
Malware may execute a copy of itself to stay running.
Injects memory with dropped files
Malware may inject a file into another process.
Resides in memory
Malware may inject itself into trusted processes to stay in memory and to avoid detection.
Starts service
An existing service may be started by malware to stay running or to gain more privileges.
Stops process
A process may be stopped by malware to prevent security software and similar applications from running.
Uses heap spray to execute code
Malware may perform heap spraying when certain processes are running. Allocation of multiple objects containing exploit code in a heap increases the chances of launching a successful attack.

Rootkit, Cloaking

Name
Description
Attempts to hide file
Malware may attempt to hide a file to avoid detection.
Hides file
Malware may hide a file to avoid detection.
Hides registry
Malware may hide a registry key, possibly using drivers, to avoid detection.
Hides service
Malware may hide a service, possibly using drivers, to avoid detection.

Suspicious Network or Messaging Activity

Name
Description
Accesses highly suspicious host
Hosts that are classified as highly suspicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware.
Accesses highly suspicious URL
URLs that are classified as highly suspicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware.
Accesses known C&C host
Malware accesses known C&Cs to receive commands and transmit data.
Accesses malicious host
Hosts that are classified as malicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware.
Accesses suspicious host
Hosts that are classified as suspicious or unrated by the Trend Micro Web Reputation Service (WRS) may be accessed by malware.
Accesses suspicious URL
URLs that are classified as suspicious or unrated by the Trend Micro Web Reputation Service (WRS) may be accessed by malware.
Creates raw socket
Malware may create a raw socket to connect to a remote server. Establishing a connection allows malware to check if the server is running, and then receive commands.
Establishes network connection
Network connections may allow malware to receive and transmit commands and data.
Establishes uncommon connection
Uncommon connections, such as those using non-standard ports, may indicate system intrusion and connections to a malicious server.
Exhibits bot behavior
Compromised devices exhibit certain network behavior when operating as part of a botnet.
Exhibits DDOS attack behavior
Malware exhibit certain network behavior when participating in a distributed denial of service (DDoS) attack.
Listens on port
Malware may create sockets and listen on ports to receive commands.
Opens IRC channel
Opening of an Internet Relay Chat (IRC) channel may allow malware to send and receive commands.
Queries DNS server
Querying of uncommon top-level domains may indicate system intrusion and connections to a malicious server.
Requests suspicious URL
URLs that are classified as suspicious by the Trend Micro Web Reputation Service (WRS) may be requested by malware.
Sends email
Sending of email may indicate a spam bot or mass mailer.