Friday, September 16, 2022

Threat Roundup for September 9 to September 16


Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 9 and Sept. 16. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.

The most prevalent threats highlighted in this roundup are:

Threat Name Type Description
Win.Dropper.LokiBot-9969312-0 Dropper Lokibot is an information-stealing malware designed to siphon sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from several popular applications. It is commonly pushed via malicious documents delivered via spam emails.
Win.Dropper.Zeus-9969310-0 Dropper Zeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing.
Win.Dropper.Nanocore-9969309-0 Dropper Nanocore is a .NET remote access trojan. Its source code has been leaked several times, making it widely available. Like other RATs, it allows full control of the system, including recording video and audio, stealing passwords, downloading files and recording keystrokes.
Win.Ransomware.Cerber-9969274-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber." In more recent campaigns, other file extensions are used.
Win.Dropper.DarkKomet-9969269-0 Dropper DarkKomet is a freeware remote access trojan released by an independent software developer. It provides the same functionality expected from a trojan, such as keylogging, webcam access, microphone access, remote desktop, URL download and program execution.
Win.Dropper.Ramnit-9969260-0 Dropper Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It can also steal browser cookies and hides from popular antivirus software.
Win.Dropper.Kuluoz-9969050-0 Dropper Kuluoz, sometimes known as "Asprox," is a modular remote access trojan known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations.
Win.Dropper.Remcos-9969014-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam and capture screenshots. It is commonly delivered through Microsoft Office documents with macros sent as attachments on malicious emails.

Threat Breakdown

Win.Dropper.LokiBot-9969312-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 15 samples
Registry Keys Occurrences
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: LanguageList
3
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTELLIFORMS\STORAGE2 2
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX 2
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX\20.0.1 (EN-US)\MAIN 2
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA THUNDERBIRD 2
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: @C:\Windows\system32\DeviceCenter.dll,-2000
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\DISCARDABLE\POSTSETUP\COMPONENT CATEGORIES\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\DISCARDABLE\POSTSETUP\COMPONENT CATEGORIES\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\ENUM 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\OWUZ370WDG 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\DISCARDABLE\POSTSETUP\COMPONENT CATEGORIES\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\ENUM
Value Name: Implementing
1
Mutexes Occurrences
3749282D282E1E80C56CAE5A 1
-1L3OO7B8T5U3Hz8 1
86R24Q1820DI8G-5 1
0-RAP0BC8AFXV5YK 1
O926B232S79XBxBC 1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences
111[.]118[.]215[.]251 2
104[.]18[.]114[.]97 2
85[.]159[.]66[.]93 1
149[.]154[.]167[.]220 1
217[.]26[.]48[.]101 1
81[.]17[.]18[.]196 1
151[.]101[.]2[.]159 1
2[.]57[.]90[.]16 1
66[.]235[.]200[.]147 1
3[.]64[.]163[.]50 1
34[.]117[.]168[.]233 1
183[.]90[.]232[.]14 1
64[.]190[.]63[.]111 1
162[.]213[.]253[.]236 1
103[.]63[.]2[.]157 1
109[.]123[.]121[.]243 1
66[.]225[.]241[.]38 1
149[.]129[.]252[.]201 1
162[.]240[.]46[.]240 1
209[.]159[.]145[.]117 1
81[.]161[.]229[.]75 1
104[.]21[.]81[.]107 1
160[.]121[.]173[.]6 1
129[.]226[.]173[.]87 1
66[.]96[.]162[.]150 1
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness Occurrences
icanhazip[.]com 2
mail[.]mayhighfilms[.]com 2
www[.]awesomegih[.]net 1
www[.]european-resilience[.]org 1
www[.]eminefendipsikoloji[.]xyz 1
www[.]solutionsdr[.]website 1
www[.]jeuxjetx[.]fr 1
www[.]mjmedia[.]online 1
www[.]ct666666[.]com 1
www[.]aceyourexams[.]org 1
www[.]famallcameroon[.]com 1
www[.]kevinandboots[.]com 1
www[.]grupoprius[.]com 1
www[.]6298vip15[.]com 1
www[.]goinuffies[.]com 1
www[.]strcktunkea[.]xyz 1
www[.]wettenunseam[.]xyz 1
www[.]998899[.]lc 1
www[.]gurilab[.]com 1
www[.]825766[.]com 1
www[.]agenlexispkr[.]xyz 1
www[.]randrconstruction[.]site 1
mail[.]nu-meqa[.]com 1
www[.]tbwtaobao[.]org 1
www[.]nineodesign[.]com 1
*See JSON for more IOCs
Files and or directories created Occurrences
%ProgramFiles%\Microsoft DN1 1
%LOCALAPPDATA%\Microsoft Vision 1
%APPDATA%\D282E1 1
%APPDATA%\D282E1\1E80C5.lck 1
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5 1
%APPDATA%\ndwgxitf.y2z 1
%APPDATA%\Microsoft\Windows\TEMPLA~1\fgfhgf.exe 1
%APPDATA%\ndwgxitf.y2z\Firefox 1
%APPDATA%\ndwgxitf.y2z\Firefox\Profiles 1
%APPDATA%\ndwgxitf.y2z\Firefox\Profiles\1lcuq8ab.default 1
%APPDATA%\ndwgxitf.y2z\Firefox\Profiles\1lcuq8ab.default\cookies.sqlite 1
%APPDATA%\A1EB383543D3F00657D7 1
%APPDATA%\Microsoft\Windows\Templates\BCRHYN5A.zip 1
\TEMP\f400n12e.0.cs 1
\TEMP\f400n12e.cmdline 1
\TEMP\f400n12e.err 1
\TEMP\f400n12e.out 1
\TEMP\f400n12e.tmp 1
\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x52\x6f\x61\x6d\x69\x6e\x67\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x6f\x77\x73\x5c\x54\x65\x6d\x70\x6c\x61\x74\x65\x73\x5c\xac0e\xac27\xac09\xac17\xac18\xac18\xac10\xac0f\xac20\xac15\x2e\xac02\xac12\xac27\xac14\xac16\xac0d\xac05\xac1e\xac26\xac05 1
%APPDATA%\rxbyry3j.lyu 1
%APPDATA%\rxbyry3j.lyu\Firefox 1
%APPDATA%\rxbyry3j.lyu\Firefox\Profiles 1
%APPDATA%\rxbyry3j.lyu\Firefox\Profiles\1lcuq8ab.default 1
%APPDATA%\rxbyry3j.lyu\Firefox\Profiles\1lcuq8ab.default\cookies.sqlite 1
%APPDATA%\gmzjfop1.kr5 1
*See JSON for more IOCs

File Hashes

00fdc4ec48b20f242022329109dc1e46b881a9f044f8d3d2c41c5071f13f284f 0a3b4186c412949b09fb35b24d0b7cfaab2726008c9dfd9ded81042678656a79 0bcfde1f70aeca56465e84252d3fed352a44686c52f1201e4474d5c126888842 17c40b93caacb07d7cb74d9bc9613780f3d346f5211323baa996e6516f830761 209ae4bb19c3fa5f5fd635e0bf9488ffc1b996edca12dcbd3771c5f6c560f9f9 2f64045ea223d08dd7556ac4d77b48153a96f881a0809e1c8ead0db9f6233884 36b098518b9abac620afde7568f084a592d1b43d50abdd8c70e030bca546b0e9 385203173d2547ac9df7af8711b18f9bff87c085e578e09a9a0999e2410a8744 41779f5ac5669c9d785d8348ee0cd0c03b31e0b260325995734cf67196eaa335 46ef92bfc91030701e6b5518deb8aba193a86e07ab8c63c0502a22e8acd9bc15 477038c22b79299bdd29784b5fa4d666735b962011b70f86fb6576fb690614b9 60214bf0cf8621867b6c69ffe98b203b8bec0c8f4a2144874b01f9f8c8a1cee6 a7157198068ee89caac77d8174b1e75bd71a42e0b3bb66ecbf9cbf05533f2153 bfdf0c6aa301a9305c58a7f3c4ef2a6b5ae2b3125600368acb8d0fb677e1b8a3 e602d598e6a30b8a9970e32469a499576fdc8bb987995add758221aa63142ed0

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security This has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella This has coverage
WSA This has coverage

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Dropper.Zeus-9969310-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 25 samples
Registry Keys Occurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PRIVACY
Value Name: CleanCookies
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: {45E760AF-9D6C-3717-3BC0-7CBFD652F80C}
1
<HKCU>\SOFTWARE\MICROSOFT\HOESWE 1
<HKCU>\SOFTWARE\MICROSOFT\HOESWE
Value Name: Riiky
1
Mutexes Occurrences
Local\{825579BC-847F-F0A5-3BC0-7CBFD652F80C} 1
Local\{A3F31C8C-E14F-D103-3BC0-7CBFD652F80C} 1
Local\{A3F31C8D-E14E-D103-3BC0-7CBFD652F80C} 1
GLOBAL\{<random GUID>} 1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences
193[.]143[.]97[.]30 1
Files and or directories created Occurrences
%TEMP%\tmp100f6b7d.bat 1
%APPDATA%\Epxesy 1
%APPDATA%\Epxesy\veof.okx 1
%APPDATA%\Tioxp 1
%APPDATA%\Tioxp\quem.exe 1

File Hashes

06c09f8aaad2f106a4c64e96906b086bd033cebd96ca266d95bf729f8a68e3b8 0c45a6f787fcb67d8828be0a93b2e5cc9ff08d9a87e68bebc5d6d5d431e0b433 0edf80d5a575a23a2928a6ae7c4a97b2a11a1a9cb40c23521a6de75d8bcf39c8 1db78d1906bfc5ba8367a285c80fd8c67cea7acacd5eb116a7bbd18e77a59023 23905382d08a21e3611db1c290cc86cb22e0f1b493ea2a45f3ca44752a8303d7 2a1b0e3c895993130118782d79dd65b019c660e7b8a4c8af575cde7a5698ae00 2e985914ac0afb33fcbd4311383156af1a79bbe83f57e1225cb86583e6149966 38643489ca7412c15f8d7467d2e1fc622c00b3f6a93ef8ed574c70380de198a7 3e0092e6e6e825556a9e706fd8e3a083001bde9b8a08d8a1dd446ac9f0961cd8 5249e5dc425ceceb4ffd10e04be8fa78ffc8afc4d778fb2773c17f1aa695061c 59d35e5a1e59c4bf032381eeac422223979cbecbd8f668fd917d3bfcea3b7be2 5f897dd59f0621ccd91dfa1d2eb4f965da1b908d9553b4027cd774a18571d15f 65486a839b1c8ff2d4d008ccf33fab7e0404c6a4696fafc5c15961c3816862b8 6cab4306e33f527984b265383d0dea1d11a897b0924b015a2a62700af289edc0 712870bb11fc63cf3d4388668d0c0e707b47c4fc95ff7a0e9b737a50ea3b1c55 8507eafa7e63dc4095cf3424fba1d1a2674752fca8f1d452558d9cbfd0273500 8ac89088823963b316a78e2d5352c06126b1bf176d6a57ceed115cd91d45256b 8c32a4f95a5d1e3eaf9d0ce259f5eea51b4f4d5fb8d75b593e45bb7a776485ea 90c3de2ee8669c7b0cdb3fb57ad911dd40bc0825b32ca3df28687bf22c37098e 92e22ceaf491476477b5962eb64dd52bb7aff8a8e74ebb2dba253604df7525ad b2e2d4451bf745e602446d4d68e76aa1e2e05fde70bee1dcdd283e2f691fd420 b8b6845966466ac1f25c737e86025dc4f5e82fa03947637089ebae7e43c62617 d19a0a01af2ced3e486cf0497204a03fbf2894dca6ef44e680678eed0350b5e9 d515963a214ea51cb885d73263feb275efb94aea759ad92eb395f668f11e1b86 dc792ed152e13f16d0bb6da06dd41091d26d2ad6e724c188bee6c9895ab112ef
*See JSON for more IOCs

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Dropper.Nanocore-9969309-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 15 samples
Registry Keys Occurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AGP Manager
3
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: LanguageList
3
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: @explorer.exe,-7001
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: UqRhmjYGcw
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoControlPanel
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: FmjwSAKZ\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: pdb
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: wMxdYNJI\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: kai
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ZeNNLCQY\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: TpuuyrDY\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: pbr
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: zSCGySDZ\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: CoZNunCT\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: zrVxOFxs\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: PntmHtOf\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: UzTQIQBw\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HpnSIvIw\
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: FPZeexxA\
1
Mutexes Occurrences
GLOBAL\{<random GUID>} 9
54b220f4544a7115f31b 2
2AC1A572DB6944B0A65C38C4140AF2F46386E886134 1
Global\534b56e0-35b0-11ed-9660-00151795f450 1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences
107[.]191[.]99[.]95 2
107[.]191[.]99[.]221 2
192[.]198[.]87[.]78 2
132[.]226[.]247[.]73 2
216[.]38[.]7[.]236 2
95[.]140[.]125[.]73 1
185[.]101[.]34[.]84 1
158[.]101[.]44[.]242 1
95[.]140[.]125[.]64 1
95[.]140[.]125[.]105 1
162[.]248[.]244[.]15 1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences
checkip[.]dyndns[.]org 3
monerohash[.]com 2
Files and or directories created Occurrences
\<random, matching [a-z]{7,15}> 11
\<random, matching [a-z]{7,15}\[a-z]{7,25}>.exe 11
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5 9
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs 9
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator 9
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat 9
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\task.dat 9
%System32%\Tasks\AGP Manager 9
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp 9
%ProgramFiles(x86)%\AGP Manager 3
%ProgramFiles(x86)%\AGP Manager\agpmgr.exe 3
%System32%\Tasks\AGP Manager Task 3
%TEMP%\test.vbs 2
%LOCALAPPDATA%\AIMDKitteh 2
%LOCALAPPDATA%\AIMDKitteh\mymonero.exe 2
%APPDATA%\pdb 1
%APPDATA%\pdb\pdb.exe 1
%TEMP%\Fp7.exe 1
%APPDATA%\Microsoft\Windows\Templates\4HIM1_BUR_CHOCK_RUBBER_SPACER.pdf 1
%APPDATA%\kai 1
%APPDATA%\kai\kai.exe 1
%APPDATA%\pbr 1
%APPDATA%\pbr\pbr.exe 1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\zGMpWbpk.exe.lnk 1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\SyYwhHOl.exe.lnk 1
*See JSON for more IOCs

File Hashes

10da4db37896cf6b8caa342cf459b7d8f1c441395777bf91f08244d17781f303 1337715195d96f0e051b8da7c6bd4ceec714c780706d195cb44a7da8d8026bc3 24867d30ca0b7ff5aa56efad0007f2dd61f257d9c94f4f65104321756add8c5d 54a92443ad92b755492232393c79a650f38fbcc8e4c5e7edb4a740386be57685 54ef1dcdabc6abd29138ad60375b06c94e9adcf055668187ede39dd7af72d551 618fe651ef4c851931517d762d1d625d8a91dc8ec37c1b4cf1f810ee7107d4eb 652a8000a682aa0e6d66a81e88ebd2d16e67344a500223485e315b3d5b3725d5 8bc4a28c2ace03795a77a619fd9d1fe2b113852a65c5147fe76706549eecdd00 905518b072f0c8f6074a9ea3ef8b2571f949b2a2eec4be87d3d228575050db2e 9c7ddd3eb292885e83f583ee3a84d1a2750c85a62c5ef082f0e8adc45044ebe7 a31e5d93083043137148a1a50547f8f6812cf36e88211a1f371fab588238bd75 d225168def78f1460f3d9599b62267217eef5a36c5e816ee8e5cc0f9059fcf7b e43ed7e08d4b9724bc7653156794825f5a5c12952fdd864e4adcfa530c5f9528 f889ca5350f42fdffeeb49395d7fa2cacadb33e0a909d6a839d4148167ba6c7d f8d613ed7073e4c6aa721caa838af36e8a224eafe998b51dd065ec8745a9b289

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security This has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella N/A
WSA This has coverage

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Ransomware.Cerber-9969274-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 26 samples
Mutexes Occurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF} 26
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences
31[.]184[.]234[.]0/23 26
Files and or directories created Occurrences
%TEMP%\d19ab989 26
%TEMP%\d19ab989\4710.tmp 26
%TEMP%\d19ab989\a35f.tmp 26

File Hashes

001887448cac3a58f89bb4f1a8cc8ec45f628706da4e15ebe65429660b2cf825 0033255bc7041027253dc517866af84413f255c5552bcc47fd7e8e660838feed 039fc087b3471228b0be1f67091597e17f33e4cd04b0d2b4be5428657e314631 04097126ab04eef29679935eeaf4c411f04b7a9dfdf3f10bdb5ef7453e6b8692 056ad6d6e3bbd58774ed1ca65fd9b983504185993112a13c5aa54c65be2ca375 05dfa32796c95f0c0ea13074db213d53fab488fdde9afab36ed98c430bc1a930 06e837716cb81498c37c0b621c87acbd2e00d11cf60e27f628ce966702f1a11e 08ce2dac33264f90d5ad8d89bbe56ad0346fc32854a184ed23b15c1cfac81a63 09204adcfbb5041640705d9f80148a1b08ee206ba78d98e071dcdcea77aaf2ad 099ed53d97ba687736ae6e6bcf14c5cc39f65ee933115205c3237cfe19c81015 0b64ca7807d2836760e06c5b4f543d0ae52fa3029552a6e373656770f8eb53f7 109f7711ff16346888c05dbad80214832525d2f962456626e51b90675f4b5e4c 163ecfa1ca0dd985d0487bb496948eb43e2a37ff44a1f833ae1c92b38e269548 19fd3a451086711c12e345a717f0361db12cc8f4a88a3efa66bfa22c96c0e6d7 1a6f8c9f5ab69bfe50d01ab3c321468c6f7ae73091245efe5ec55a4e03f40002 1c09cbf3f181b08879c3cff05c31d0708a9331fddf0eba03e3bbe07ae220a8f8 1cf1dd029fff1b33bd7951e45b7304038c31547e082cabefa656b42e7349ae82 1f27597b0c1b7887511b302efc5fb94b8a241e9736295aeabf84f199f6ccee31 249d96a706928e747acaee7f2bbfa5650f58c957819c262b2cd25e6821f8ece0 270c413b723228cd91400050fbcd8c2eb549f17456f36ff8ad41b63deeb2870c 29598e11fac3a66758910e03c38bb17da6771141a968a1aaf99ae4520bf6c60c 2dde0afe1cf38036b2436a9ca80be179dce9371115ed882bbeb9278563f8d14a 301ca6accba0406fa35115716889892002e30ed8b9d84920b9c5cc2766b0c7f5 30d19efc5ed887ec148f4c280fe5daf01dd6b0098a81d99a864dce3bc8a5f8e4 3b4e4e8fc9b2bf6f7750cd8ed310f8bb4cd7d56ed9989e0fdd929aa5ee27debf
*See JSON for more IOCs

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Dropper.DarkKomet-9969269-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 25 samples
Registry Keys Occurrences
<HKU>\<User SID> 23
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: LanguageList
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\UNBUR 1
<HKCU>\SOFTWARE\MICROSOFT\UNBUR
Value Name: Ryuplucyc
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: hyybo.exe
1
<HKCU>\SOFTWARE\MICROSOFT\UNBUR
Value Name: Yqtayfxe
1
Mutexes Occurrences
Global\{08995C04-83FA-2613-1053-58F3B048D958} 23
Global\8bf66b81-fa0d-11ec-b5f8-00501e3ae7b6 1
GLOBAL\{<random GUID>} 1
Local\{<random GUID>} 1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences
alchemistrywork[.]com 1
Files and or directories created Occurrences
%TEMP%\tmp25673c86.bat 1
%APPDATA%\Otufux 1
%APPDATA%\Otufux\hyybo.exe 1
%APPDATA%\Vooqwo 1
%APPDATA%\Vooqwo\bayk.qua 1

File Hashes

01a66cc3487f0d7e2f27d5a8e69f0c234bdf3304b9ca06fd147fb004a50929f3 03f815c5390528e96c9abf400ce167582eadb1649589b00d39d29b433b03c7b0 2059a4cffd04bc3e04955e20fdd5df1d5d9908d6b9214f8e4c80e10321be77eb 2279feff7534923353197e71c57e3945b8a1efd80d66dcd8e146bcbf1f554a70 3948d73d942c6164c716b5d69041e0ecf9df653e6ece61555e507a745006a3fd 44b484fb9343f45c670e63f286313b09ae005edf5ca0168fb94229dcbd9388aa 4b7e1f682cb8d5dba918cc565714e04d2147663b18ecb9f90deae9ab28bf8f1b 52ccf7455c103e6db02356727227e4bb45d718e0205f28f89349c671997c6c09 62fb8f5173958bb58b2f84a854d08899f14706a6e20e57e3b906965ebd7db6f4 63d42b3e5da3c55a03d2f9b04456632a2f675547b853f142b8245c91bf15100d 68ffff6405e7baecff7f87af41afbbde02844a917a52660a87f36cff3635ccd2 6a0d55b4ed40a705c9e8af25cac6133b4fbb043909e509b1fce274238def0b07 7432dbc42a6785ad8f0cdfbecabcaa38c291e51b3aac8863b3bdfdb1cc1163fd 8350295d5dc2ae0d23d8a4831b461e4103abde3928b9d0f380eb83679fcbf26d 91dc25a40e00e8cc9f5d1074ff80a66ed5c927036e062ce0311a92e5e4b94480 a49071fdf4d34aaf88300a3703227c1fdcd532f9054f848dfbc5c1f15b6fef45 b76165ed0f3f9e8ac42394cf8700e8d8e8c7f4ee89b11c01e81d29b0b4006220 c0bc17998bde718499954f3cf7319b1633405452873b606671204889051cf1a0 c159a657fef9189a28461ac6725bd0a9d6cb1cf4311a3a7d6d95e06130eb629a c42edcd2dbcc690da04afb0d2bb771f2d4aef1e188aa3b8a096c051340b52ab4 c6f4e464c49730bfa10f56fb52a892793cd17f52dbbfc3e60a97a6bc270db136 c88d6a155c90a01b76884456c34f9f9d2670deb255b67e5111a8898ecee06d3c cb03a653a5d69f18b89a24e80b9294c86a08ba48a8bb6fb12223dc2f2b8b45a7 e71370e84a0973f799a58b0ef1e06b4c6343df99343cb778efd26e8257792c0c f574238919b3f09297232f706ab3a0f633aa7259657a0965d2a46a181a3ba266

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Dropper.Ramnit-9969260-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 25 samples
Registry Keys Occurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
7
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: LanguageList
7
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 6
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: @explorer.exe,-7001
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
4
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
4
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
4
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
4
<HKCU>\SOFTWARE\APPDATALOW\GOOGLE UPDATER
Value Name: LastUpdate
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\PUBLICPROFILE
Value Name: EnableFirewall
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SSDPSRV
Value Name: Start
3
Mutexes Occurrences
{7930D12C-1D38-EB63-89CF-4C8161B79ED4} 4
60F16AAB662B6A5DA3F649835F6E212598B68E3C 4
777OurStarterProcessMutex777 2
888OurMainProcessMutex888 2
999OurBrother1ProcessMutex999 2
000OurBrother2ProcessMutex000 2
A9MTX7ERFAMKLQ 1
A9ZLO3DAFRVH1WAE 1
B81XZCHO7OLPA 1
BSKLZ1RVAUON 1
GJLAAZGJI156R 1
I106865886KMTX 1
IGBIASAARMOAIZ 1
J8OSEXAZLIYSQ8J 1
LXCV0IMGIXS0RTA1 1
MKS8IUMZ13NOZ 1
NLYOPPSTY 1
OPLXSDF19WRQ 1
PLAX7FASCI8AMNA 1
RGT70AXCNUUD3 1
TEKL1AFHJ3 1
TXA19EQZP13A6JTR 1
VSHBZL6SWAG0C 1
flowblink90x33 1
22887842DFA648B38E6C28C844FF2BE798B68E3C 1
*See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences
13[.]107[.]21[.]200 5
195[.]201[.]179[.]207 4
142[.]250[.]65[.]206 3
185[.]121[.]177[.]177 2
130[.]255[.]78[.]223 2
185[.]121[.]177[.]53 2
144[.]76[.]133[.]38 2
45[.]63[.]25[.]55 2
27[.]100[.]36[.]191 2
89[.]18[.]27[.]34 2
178[.]63[.]145[.]230 2
104[.]168[.]144[.]17 2
62[.]113[.]203[.]55 2
46[.]165[.]221[.]154 2
85[.]13[.]157[.]3 2
193[.]23[.]244[.]244 1
194[.]109[.]206[.]212 1
154[.]35[.]32[.]5 1
171[.]25[.]193[.]9 1
172[.]217[.]165[.]142 1
65[.]21[.]85[.]98 1
64[.]225[.]91[.]73 1
23[.]47[.]64[.]115 1
104[.]108[.]124[.]205 1
104[.]72[.]157[.]175 1
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness Occurrences
www[.]bing[.]com 6
google[.]com 4
bunikabatedoba13[.]top 4
bvnotike[.]667[.]top 4
jokimutinke[.]net 4
opiutunuza11[.]net 4
ujnuyteeej[.]top 4
nerdasss33[.]top 4
drdrfdd[.]cat 3
eaxsess[.]cat 3
gagaxx[.]cat 3
huhujoo[.]cat 3
nknkd[.]cat 3
nknkdd[.]cat 3
nknkddx[.]cat 3
nknkddx2[.]cat 3
sdsdfg[.]cat 3
trtr44[.]cat 3
erwwbasmhtm[.]com 2
fbnurqhsbun[.]com 2
h37eyrba720ui[.]com 2
jdnpwbnnya[.]com 2
jhaiujfprlsbpyov[.]com 2
mngawiyhlyo[.]com 2
oxxvnflhtpomjmwst[.]com 2
*See JSON for more IOCs
Files and or directories created Occurrences
%LOCALAPPDATA%\bolpidti 4
%LOCALAPPDATA%\bolpidti\judcsgdy.exe 4
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe 4
%APPDATA%\Microsoft\gawbgrrs 4
%APPDATA%\Microsoft\gawbgrrs\jisgivdt.exe 4
%ProgramData%\Device Driver Setup 3
\$Recycle.Bin\S-1-5-~2\!WhatHappenedWithMyFiles!.rtf 2
%HOMEPATH%\Documents and Settings\!WhatHappenedWithMyFiles!.rtf 2
\$Recycle.Bin\<User SID>\!WhatHappenedWithMyFiles!.rtf 2
%APPDATA%\!WhatHappenedWithMyFiles!.rtf 2
%HOMEPATH%\Documents\!WhatHappenedWithMyFiles!.rtf 2
\Users\All Users\Microsoft\RAC\PublishedData\!WhatHappenedWithMyFiles!.rtf 2
\Users\All Users\Microsoft\RAC\StateData\!WhatHappenedWithMyFiles!.rtf 2
%ProgramData%\Microsoft\RAC\PublishedData\!WhatHappenedWithMyFiles!.rtf 2
%ProgramData%\Microsoft\RAC\StateData\!WhatHappenedWithMyFiles!.rtf 2
%ProgramData%\Microsoft\RAC\PUBLIS~1\!WhatHappenedWithMyFiles!.rtf 2
\Users\ALLUSE~1\Microsoft\RAC\PUBLIS~1\!WhatHappenedWithMyFiles!.rtf 2
%ProgramData%\Microsoft\RAC\STATED~1\!WhatHappenedWithMyFiles!.rtf 2
\Users\ALLUSE~1\Microsoft\RAC\STATED~1\!WhatHappenedWithMyFiles!.rtf 2
%TEMP%\<random, matching '[0-9a-z]{8}'>.exe 2
%APPDATA%\SjyNBvm6RTID\9x56BxjU.cmd 1
%APPDATA%\Microsoft\cciihiec\jisgivdt.exe 1
%APPDATA%\SjyNBvm6RTID\XvNigAX3.cmd 1
%APPDATA%\SJYNBV~1\165TprqR.exe 1
%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\165TprqR.lnk 1
*See JSON for more IOCs

File Hashes

0b2ad4aa2b64aae559973ec324330f137fd4c9546aeb2c2f9c35b5617b180c05 102092d52e39ed386a890d2687b4e80da6a0372f89ee2b83a8c29b3a13d22788 147569cb85cffa13769376d5da1c8ec7487443b710faf19afab24a021a58913b 25727f1d115764349d0cbd828598d52140640be6eade12e62ff3438525004630 5280855d2a67a6ba91900af80c235b1bafb51151cba3f7bff7566efda8d0ee09 5462ceb3fbab158b53c3c247d939183c89eb96229c8f78fdc61e44f1a939bfa4 60a52492d31994057a2d0566ccf469393fad834cabe943a89bbdb9d07852626a 7234d6a648ff98721f0045dcda255767f0f6d19a1cccea8c8e7db97f594da4bd 72d6c6b95eeaae1b2777d70ac14b122ca72874f1d98680d52dc9b27b2b66ded0 72f5a9c942d7d5efd18390cb99539d7f411983bb9c41f8137f0a2c5a7bb66152 73ed34beba387409f4bdfd3413079d3a50e49380a1ad39c5f8d67b1ea4d04aaf 7cb1a756133840264574c4683e437accbe24b254e853a17588a5c67e7858369a 868dc997d2fa2123e8035eb565d940542b9d7b363c54e177cc85dcd89529ab94 8cbebde91c55c93149db657c63fc480e5639f85f6f072a538b0155d3a5bec4bd 93cd72fbca2dbb3d75f972cfac420aaf1d007824b073f6bef7944108543c5c5b 9e67e77db32641775ebdcce463fe21b195539417d20168fac7209908825578d7 a2d53ce7f45959e6ca5786f0d0704a5f9056789b4d7afaf7bf93bc74ddf3e5dc a67bc1d4129d487029cbd0836241425213ed5b57806a089d427703d69b87a80a b48b525ec88d26ca83b1a80e16fc90bfe163e09e183df73009c8f6de39c24f99 bc703ff3117b8088ce29ba90a2a25708a845503b6a76946082f86787f53f6d93 bca38bba430425ae06eeff67707b04730cabdab8c28c5d7edb73a704d9a12ab0 c3a619f1b3493485405947c2eb13ade0def13b84ea9350def3a936c916dc9755 c71a94e585e6a8f225e97df8e8c5ee8d8224fdd265731205e9179f979e6d5787 c9702ab60a3acdb6319b30c7723ba448e544f72c9658e7169753d2ba6033f74b d677ac549428b51974e92573bd1aeb3869d58b2a23d3cc0e116473213678f237
*See JSON for more IOCs

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security This has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella This has coverage
WSA This has coverage

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Dropper.Kuluoz-9969050-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 15 samples
Registry Keys Occurrences
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'> 15
<HKCU>\SOFTWARE\SQFRVCDX
Value Name: qbdiucws
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vecqtanl
1
<HKCU>\SOFTWARE\QMBDQAJI
Value Name: mrwduoeq
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: cegwtkiq
1
<HKCU>\SOFTWARE\XSCWKWTB
Value Name: uaclqbul
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ucbqtutu
1
<HKCU>\SOFTWARE\JBDLTTQA
Value Name: mrwedtqx
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vqutjntj
1
<HKCU>\SOFTWARE\JFXJSONS
Value Name: fecipfcv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: arwphoht
1
<HKCU>\SOFTWARE\PCJDWGMU
Value Name: cjpxnmpf
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: nhloowrs
1
<HKCU>\SOFTWARE\USMUVJEA
Value Name: hbijvefk
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: conoxmsr
1
<HKCU>\SOFTWARE\UBVPEQTD
Value Name: bvqcqshx
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ukvchxne
1
<HKCU>\SOFTWARE\HBTTNUTT
Value Name: aeulprit
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: frrvhaca
1
<HKCU>\SOFTWARE\VUSJFBBT
Value Name: mpxwxiew
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: uejoeofv
1
<HKCU>\SOFTWARE\FMOPLQAL
Value Name: iqmwiqfj
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: wjrmnejf
1
<HKCU>\SOFTWARE\RKDPGLPX
Value Name: qmjertge
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mbmgmhmo
1
Mutexes Occurrences
aaAdministrator 15
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences
141[.]105[.]121[.]139 13
74[.]221[.]221[.]58 10
91[.]109[.]2[.]132 9
101[.]255[.]36[.]171 8
58[.]83[.]159[.]94 8
93[.]189[.]95[.]148 7
94[.]199[.]242[.]85 6
82[.]165[.]152[.]226 4
Files and or directories created Occurrences
%LOCALAPPDATA%\<random, matching '[a-z]{8}'>.exe 15

File Hashes

09650f5a6dbe38fc54c1d17e05955612e37e9268d3d821726fad65e5d13a127e 17b2f61b057168ed4414a71ec6c4f9cbaa78c96cfec6bd6330e7f8c298c715d5 235be690210e2d9c368f9028e47572dcc120b7f597877573af43ecaeb70e615f 2e61d7e17915a3359a01fd959b4383fdd2441b8544d457bb185fa2509e699d41 36f8895998b854c4276c0b2318baa41c947ea64f5bcc6666f634111ea62b6505 4bbaeba54a1b65e90b4d24714a45dbe37ec407364097a8c889f9f61d679e2fcd 51324e089d7b1ee9cf85837c719d993cea5dd928cc1e932aa2f17d3e758509e6 535a4f9cef7aef421ad38986f14de66251e72aba2dea5dd6ca666ab38f10f7db 55d37fae592c2d00bef0ff48e15dbe52f68edcd098c679233fd61d319d32c64b 5f050eaf9f0f3b9c2cddc84bbcf53115932932da4151f719169e5d2c8e672764 6cc11bd407b5882290b839eedae377cd63ec3a4d3cbc87f8686dd63e233922da 72b3b8bf3ce9c0bb3831e453fcfdcdf37e44e183eb1cdba383d5196e90829935 7cb0202a99a14882e1108c5c7deb738289873b99dec43172bbe6ee39136bd9fe 9ef1750fce26d1ef5908b3d7f7304a54edee5207282ffedcf525a8c714bb5ac8 d699fe8f3c9f2925101e85dfacaca00550fe2a7cf4ef22aff827bc88900f5a18

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





Win.Dropper.Remcos-9969014-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 13 samples
Registry Keys Occurrences
<HKCU>\SOFTWARE\ZANGARMARSH-228I7H 13
<HKCU>\SOFTWARE\ZANGARMARSH-228I7H
Value Name: EXEpath
13
Mutexes Occurrences
Remcos_Mutex_Inj 13
Zangarmarsh-228I7H 13
Domain Names contacted by malware. Does not indicate maliciousness Occurrences
ezpz1[.]xyz 13
Files and or directories created Occurrences
%SystemRoot%\win.ini 13
%APPDATA%\csrss.exe 13
%System32%\Tasks\csrss 13
%APPDATA%\javacache 13
%APPDATA%\javacache\logs.dat 13

File Hashes

02d30b6a94180708d4d525914a917cd9370190926e549fada8d93b4fd033e906 0c335742c2a239dddbe7467946c481609d1840dca5b67a80ea071d4a593b4ad0 216c429a096cbc58d595d015dd82f9c2be8a89af1d295e511a9ae8431c889710 4a01a7d09fe699b3d699463a6f76b445e0a07dc0d8360ba4fca4ddcda7a2af66 4a86b0a93ce30688176f4f745c52cec56cd023a924c58f8a27d36570871ab580 5af743dffb813faf071cf185f39c3d258864556a154cfa12ac1b8a56607bd2ce 608bd3bada966b94ecff736b0811278b7db6cef97c0133e296a5d8bad2ac725d 7ac6edfc10a8361d20fee7f561d4fce8b3ea0e963cfc44c0421ca0fd8501c851 b4c77021bc5641683caa3280fe115fea383141b5722f215e6dcb4ad2913cc02f b4e9902d2d44051e6620b458c43514e552df4c8f5a6aebdfd5363b3ac9e344a0 ceec2d534fe22ef53ae86302717458922993cccb16a5cfbabfb40d1956ee2415 f4a212b3bdc04c7be624a5955e43acf7f836dc9a14852d2fddda48095c017e6b ff804004e7082fcf4802beb7d8b4d4b03867de1b746af1021a703767c2728c4b

Coverage

Product Protection
Secure Endpoint This has coverage
Cloudlock N/A
CWS This has coverage
Email Security This has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Secure Malware Analytics This has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

Secure Endpoint



Secure Malware Analytics



MITRE ATT&CK





No comments:

Post a Comment

Note: Only a member of this blog may post a comment.