XP Antispyware 2009 is a member of the Win32/FakeRean family, a family of programs that claim to scan for malware and display fake warnings of malicious files. They then inform the user that they need to pay money to register the software in order to remove these non-existent threats.
Installation
XP Antispyware 2009 installers download several archives in either ZIP or CAB format from a remote location via HTTP. For example:
- Binaries1.cab
- Binaries2.cab
- Binaries3.cab
The installer then extracts these files into a directory it creates under %Program Files%.
The installer may display a window before it begins downloading, for example:

While downloading, the installer may display a window like the following:

XP Antispyware 2009 creates the following directories and file names:
- %Program Files%\XP_AntiSpyware\AVEngn.dll
- %Program Files%\XP_AntiSpyware\htmlayout.dll
- %Program Files%\XP_AntiSpyware\pthreadVC2.dll
- %Program Files%\XP_AntiSpyware\Uninstall.exe
- %Program Files%\XP_AntiSpyware\wscui.cpl
- %Program Files%\XP_AntiSpyware\XP_Antispyware.cfg
- %Program Files%\XP_AntiSpyware\XP_AntiSpyware.exe
- %Program Files%\XP_AntiSpyware\data\daily.cvd
- %Program Files%\XP_AntiSpyware\Microsoft.VC80.CRT\Microsoft.VC80.CRT.manifest
- %Program Files%\XP_AntiSpyware\Microsoft.VC80.CRT\msvcm80.dll
- %Program Files%\XP_AntiSpyware\Microsoft.VC80.CRT\msvcp80.dll
- %Program Files%\XP_AntiSpyware\Microsoft.VC80.CRT\msvcr80.dll
XP Antispyware 2009 also adds shortcuts to the current user's Start menu, desktop and quick launch bar, for example:
- %Start menu%\Programs\XP_AntiSpyware\XP_AntiSpyware.lnk
- %Start menu%\Programs\XP_AntiSpyware\Uninstall.lnk
- %Desktop%\XP_AntiSpyware.lnk
- %APPDATA%\Microsoft\Internet Explorer\Quick Launch\XP_AntiSpyware.lnk
Example desktop icon:

XP Antispyware 2009 may also modify the registry in order to ensure that it runs whenever the user's Internet browser is launched from the Start menu.
In subkey: HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command
Sets value: (Default)
With data:"<malware file name>" /START <location of browser>
For example:
In subkey: HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command
Sets value: (Default)
With data: "C:\Documents and Settings\Administrator\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe"
Payload
Displays fake alerts, and fake scanning results
XP Antispyware 2009 adds a registry entry to launch its fake scanner automatically each time Windows starts. For example:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: XP Antispyware 2009
With data: ""%Program Files%\XP_AntiSpyware\XP_AntiSpyware.exe" /hide"
The fake scanner GUI may look like this, for example:

When a "scan" is completed, it displays a message like this:

Periodically it may display fake warning pop-ups from its system tray icon, for example:


XP Antispyware 2009 also installs a control panel applet which imitates the Windows security center:
Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
For example:

Clicking any of the buttons or links in this window merely opens the default browser and opens a page to buy the fake product online.
Analysis by Hamish O'Dea & David Wood