{ "query": "A user opened an email attachment that executed an .exe which copied user files to AppData\\Roaming and retrieved additional components from a remote host. Which type of malware does this behavior indicate?", "options": [ { "text": "Ransomware", "explanation": "Ransomware encrypts files or denies access and then demands payment for restoration.", "correct": false, "selected": false }, { "text": "Trojan", "explanation": "A Trojan disguises itself as legitimate software and performs hidden malicious actions such as data exfiltration and payload retrieval.", "correct": true, "selected": false }, { "text": "Worm", "explanation": "A worm self-replicates and spreads across networks without requiring user installation.", "correct": false, "selected": false } ], "answer": "
The correct answer is Trojan.
A Trojan is malicious software that relies on a user to run what appears to be a legitimate file and then performs hidden actions. The scenario describes an emailed attachment that executed an .exe, copied user files into AppData\\Roaming, and retrieved additional components from a remote host, and that behavior matches a Trojan because it requires user execution and then downloads or unpacks further payloads from a command and control source.
Ransomware is incorrect because ransomware primarily encrypts or otherwise blocks access to files to demand payment, and the description does not mention file encryption or an extortion demand. Copying files and fetching components alone does not indicate the extortion behavior that defines Ransomware.
Worm is incorrect because worms are self propagating and spread across networks without needing a user to run an attachment. The infection here began with a user executing an emailed .exe, which points away from a self spreading Worm and toward a payload that required user action, which is characteristic of a Trojan.
", "batch_id": "2439", "answerCode": "2", "type": "multiple-choice", "originalQuery": "You received an email attachment named \"salary_hike_15052013.zip\", and upon opening the zip file, you discover that it contains a .exe file. You unknowingly execute this .exe file, and malware secretly started copying data to the APPDATA\\local directory and establishing a connection to another server to download additional malicious files. This type of malware is known as:", "originalOptions": "A. A. RansomwareRead the question for clues about how the malware spread and whether user action was required. If an attachment had to be executed and the program then contacted a remote host to download more components think Trojan.
", "references": [ "https://learn.microsoft.com/en-us/windows/security/threat-protection/intelligence/malware-types", "https://www.kaspersky.com/resource-center/threats/trojans", "https://www.sophos.com/en-us/what-is/malware" ], "video_url": "https://certificationation.com/videos/others/eccouncil/ethical-hacker/eccouncil-named-salary-hike-15052013-zip-and-upon-opening-exam-1786.html", "url": "https://certificationation.com/questions/others/eccouncil/ethical-hacker/eccouncil-named-salary-hike-15052013-zip-and-upon-opening-exam-1786.html" }