Threat Descriptons



Category :


Type :


Aliases :

Oficla, Trojan.Sasfis (Symantec), w32_sasfis.e259!tr (Other)


This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.


Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Trojan-Downloader:W32/Oficla identifies a family of malware that are distributed as attachments to fake email messages.

On installation, the trojan-downloader connects to a remote server and downloads additional files (which are mostly malicious) onto the system. The specific files downloaded will vary depending on the variant.

A representative example of Oficla variant is:


Oficla variants are distributed as executable or zipped files attached to misleading email messages. Some of the most common messages used to deliver this trojan involve fake offers for iTunes Gift certificates or for orders, UPS invoice other attachments are disguised as resumes.

The text in the email message entices the unsuspecting user to open the attached executable; Oficla's actual malicious code is packed (using a custome packer) in a DLL file secretly embedded in the executable file.


Once the attached executable file is launched by the user, it will extract the DLL file into the Windows temporary folder.

The DLL file is saved, usually with the 1.tmp filename:

  • %Temp%\1.tmp

During installation, the 1.tmp file will be executed and injected to a normal process. Subsequently, when running under the normal process it will create a file in the Windows system folder.

The created file uses a somewhat non-standrd extension file, for example:

  • %windir%\system32\fjof.sto

Note: The filename and extension name may change from variant to variant.

Registry Changes

In order for it to automatically start on restart, it modifies the registry:

  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = Explorer.exe


  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = Explorer.exe rundll32.exe [Oficla_dll file] ["parameter"]

Example of a modified registry entry:

  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = Explorer.exe rundll32.exe fjof.sto vffwd
More Support


Ask questions in our Community .

User Guides

Check the user guide for instructions.

Contact Support

Chat with or call an expert.

Submit a Sample

Submit a file or URL for analysis.