Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 10 and March 17. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.

The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Win.Dropper.Locky-9992697-0DropperLocky is ransomware typically distributed via spam emails containing a maliciously crafted Microsoft Word document crafted to trick targets into enabling malicious macros. This family was originally released in 2016 and updated over the years with additional functionality.
Win.Dropper.LokiBot-9992313-0DropperLokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents attached to spam emails.
Win.Dropper.Tofsee-9992775-0DropperTofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator's control.
Win.Dropper.TrickBot-9992835-0DropperTrickBot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
Win.Dropper.Zeus-9992851-0DropperZeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing.
Win.Ransomware.Cerber-9992849-0RansomwareCerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, other file extensions are used.
Win.Virus.Expiro-9992651-0VirusExpiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks.
Win.Malware.Ursu-9993206-0MalwareUrsu is a generic malware that has numerous functions. It contacts a C2 server and performs code injection in the address space of legitimate processes, after which it achieves persistence and collects confidential data. Ursu is usually spread via email.
Win.Dropper.njRAT-9993044-0DroppernjRAT, also known as Bladabindi, is a RAT that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
Win.Dropper.DarkKomet-9992898-0DropperDarkKomet is a freeware remote access trojan that was released by an independent software developer. It provides the same functionality as expected from a remote access tool, such as keylogging, webcam access, microphone access, remote desktop, URL download and program execution.

Threat Breakdown

Win.Dropper.Locky-9992697-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 18 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS17
<HKCU>\Software\Microsoft\<random, matching '[A-Z][a-z]{3,11}'>7
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\VSS\DIAG\VSSAPIPUBLISHER6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}5
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A} 
Value Name: FaviconPath
4
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A} 
Value Name: Deleted
4
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES 
Value Name: DefaultScope
4
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\DIB2
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\DIB\RECENT FILE LIST2
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\DIB\SETTINGS2
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\6C5DD69827FF1ABDECAB932DBD7E0843B635C7F90215ADA0A2091CFCD28F7130\RECENT FILE LIST1
<HKCU>\SOFTWARE\MICROSOFT\IQLUCI 
Value Name: Viuxyxe
1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\6C5DD69827FF1ABDECAB932DBD7E0843B635C7F90215ADA0A2091CFCD28F7130\SETTINGS1
<HKCU>\SOFTWARE\MICROSOFT\BOOCI 
Value Name: Amelfyf
1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\DESKTOP1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\69FAC913942B3BD4F8B5D270EAB4E0853AA303F395E3B0E9CAAF4D065FB102B71
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\DESKTOP\RECENT FILE LIST1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\69FAC913942B3BD4F8B5D270EAB4E0853AA303F395E3B0E9CAAF4D065FB102B7\RECENT FILE LIST1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\58F5DD18D509C4DA0CD87C38EB9E2E3604B743DF73128E6BB70D4BB7F888E8DC1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\DESKTOP\SETTINGS1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\F17E2A581FBDC1937F772D1CB6DE2A1819AE70433A02399580DBBCD02BC24C5C1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\69FAC913942B3BD4F8B5D270EAB4E0853AA303F395E3B0E9CAAF4D065FB102B7\SETTINGS1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\58F5DD18D509C4DA0CD87C38EB9E2E3604B743DF73128E6BB70D4BB7F888E8DC\RECENT FILE LIST1
<HKCU>\SOFTWARE\MICROSOFT\MYYFEK 
Value Name: Paegiziv
1
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\F17E2A581FBDC1937F772D1CB6DE2A1819AE70433A02399580DBBCD02BC24C5C\RECENT FILE LIST1
MutexesOccurrences
qazwsxedc17
Frz_State7
Sandboxie_SingleInstanceMutex_Control7
MicrosoftVirtualPC7UserServiceMakeSureWe'reTheOnlyOneMutex7
<32 random hex characters>7
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_idx.db!16613a85
Y2BfYmRgYl8x1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
91[.]142[.]90[.]554
109[.]248[.]222[.]474
13[.]107[.]21[.]2002
184[.]105[.]192[.]22
176[.]31[.]24[.]272
178[.]17[.]170[.]1331
185[.]14[.]29[.]1401
37[.]187[.]0[.]401
128[.]199[.]248[.]1051
95[.]85[.]9[.]861
89[.]108[.]73[.]1241
91[.]211[.]119[.]981
95[.]46[.]114[.]2051
82[.]146[.]32[.]921
91[.]107[.]107[.]1651
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]bing[.]com5
mynetworkinginc[.]com2
mydnswebs[.]com2
wronig[.]xyz2
brxgpire[.]click2
iiuchklnnmgatboed[.]work2
axjjaljeoopjyxi[.]ru2
dewsqfil[.]pl2
kspliksk[.]org2
ebljuseyhutbj[.]xyz2
josebrmhfiouodlpc[.]biz2
dyxbxbyyftsfvtv[.]xyz2
nxxjpjtgyrbmeomi[.]org2
ceawfapxacmpax[.]work2
vxwndredj[.]pw2
yvkuslknsjcjam[.]su2
rbdtujaxgleucvcq[.]pw2
hubtpfr[.]info2
lfilqricrecvah[.]work2
yabodjkyclgldh[.]info2
madxxabsulkwvud[.]su2
tdwhssrbqednweqts[.]su2
samorensc[.]top1
sportzpro[.]bit1
vfffcjrodbewspv[.]su1

*See JSON for more IOCs

Files and or directories createdOccurrences
\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\_5-INSTRUCTION.html6
\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\_6-INSTRUCTION.html6
\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\_7-INSTRUCTION.html6
\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\_8-INSTRUCTION.html6
\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\_9-INSTRUCTION.html6
\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\_10-INSTRUCTION.html6
\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\_11-INSTRUCTION.html6
\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\_12-INSTRUCTION.html6
\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\_13-INSTRUCTION.html6
\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\_14-INSTRUCTION.html6
\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\_15-INSTRUCTION.html6
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\_16-INSTRUCTION.html6
\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\_17-INSTRUCTION.html6
\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\_18-INSTRUCTION.html6
\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\_19-INSTRUCTION.html6
\MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\_20-INSTRUCTION.html6
%ProgramData%\Adobe\Updater6\_21-INSTRUCTION.html6
%ProgramData%\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\_22-INSTRUCTION.html6
%ProgramData%\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\_24-INSTRUCTION.html6
%ProgramData%\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\_26-INSTRUCTION.html6
%ProgramData%\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\en-US\_25-INSTRUCTION.html6
%ProgramData%\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\_28-INSTRUCTION.html6
%ProgramData%\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\en-US\_27-INSTRUCTION.html6
%ProgramData%\Microsoft\IlsCache\_29-INSTRUCTION.html6
%ProgramData%\Microsoft\User Account Pictures\Default Pictures\_33-INSTRUCTION.html6

*See JSON for more IOCs

File Hashes

03404430c812f7297e6ccf037d95590036c35f3369c84429faf43a112eb3159d
1f39d68c1383404e9ce8c8494a281d109d2fead83f867818c652c7766e6416c6
22bdcf10b4ac46641ef8c1fba64144399fffe227a97b0b786ed9c91c5d581ef3
2883a2a845611b989db2c7483ed997aaae68e382d7be267ea18e7ad0445caba8
3fe30273342b0f10c6add37a464d5f99fcbdc167d1a38b0077ba74a6de904fec
44e5e6bdda44e20f0505724dfa0d7e87773dc611d2dc7e8b761a9c6cdba5cc2e
48fca8118cb07b782cfea98d576daf12149ee938497d511fcbb5241417d02bd2
58f5dd18d509c4da0cd87c38eb9e2e3604b743df73128e6bb70d4bb7f888e8dc
59b1c883ba3ea6dec6ed732a870f226c8353190a78f77691d7d94fee9d6dea36
69fac913942b3bd4f8b5d270eab4e0853aa303f395e3b0e9caaf4d065fb102b7
6c5dd69827ff1abdecab932dbd7e0843b635c7f90215ada0a2091cfcd28f7130
6ffc6676f47c334b781a22e7e54b01e9ae95bd81d6060570f98a0d021fcf38e3
7e0fec39c088ab36d4402f7b9e8a50e9ffc91496bc60e2344937b4b7de1cd916
89dbe6d3a77fbf01b9c794b4616f498ea9af821462967eadc837fcbeeac9f9b1
9f3c9566c3d9316c2d71853a10a8f3f300c2e9b1eef52e6f6d56de61c6f93812
da6f0ce0fc5f0106749a049b46efa6ad0d3a6dc6cc918e0cd57a6df11eb60d25
f17e2a581fbdc1937f772d1cb6de2a1819ae70433a02399580dbbcd02bc24c5c
fabc55649e253e31e1a44a3c34f475a72560a5dcacb80ed7bd351503e881d942

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.LokiBot-9992313-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 31 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\USER SHELL FOLDERS 
Value Name: Startup
1
MutexesOccurrences
Global\<random guid>9
MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}5
Global\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\1\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\2\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\3\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\4\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\5\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\6\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\7\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
Session\8\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}5
3749282D282E1E80C56CAE5A1
b4ababd1041a78e0c10e1f239485aa261
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
179[.]43[.]154[.]2165
185[.]11[.]61[.]1255
45[.]12[.]253[.]563
46[.]148[.]39[.]361
85[.]31[.]45[.]1991
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
sempersim[.]su1
Files and or directories createdOccurrences
\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x735
%APPDATA%\D282E11
%APPDATA%\D282E1\1E80C5.lck1
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c51
\{0cfd3854-32d2-d209-9694-f357f74eb398}1
\{965e0e8b-06f9-999b-2d71-2f8c50a6f3a2}1
\{acaa6a86-be45-08e5-79af-69e1952e99fd}1
\{4fa167ab-f7e2-ff24-2e48-647ef8633960}1
\{1e0b0e53-9094-b1ae-cc0d-9f9c10035e4c}1
%System32%\Tasks\026ade5f55f55a80adfeb99faf24652330cb48610c7cf25df9bb60faab6f246d.exe1
%APPDATA%\nsis_unsf8a8da0a.dll1
%APPDATA%\nsis_unsefc49040.dll1
%APPDATA%\nsis_unseeeaf100.dll1
%APPDATA%\nsis_unsf89f8556.dll1
%APPDATA%\nsis_unsef569933.dll1

File Hashes

026ade5f55f55a80adfeb99faf24652330cb48610c7cf25df9bb60faab6f246d
05d14d976f9266cfa0d3ff95eee3bf004cff0c39a41c1edf77d74fff4fc7d679
05e3406e34247062909a949470252f4063811e030b3ea5d8c1b39c92a7375582
087969b4fec1bfae1b33eb26787984ce0f41b74f683dc85e2448122c9e6e741f
0baa53972ce2be403f9e5d9d3a7f5d7098858a3acd9e16a315f6e4f5e0b2c902
16348b729d2bdff35ff7e63de806e7830b25d6675faa623528860cd907dba649
1c9e1883dd7bd24c169915cbd1f97860d26217b7ff7fb24c074c3798a1bf0fd1
354334c9eb20671e94841fa04d729b28ce5f6a3cfbff5be1675d7f3aaa9666b0
36bded90af0ae1ab040893d92b507584edd026785f64f9f75b46c0ec5734cd87
462eed45dc1290581f17a55adb2f731b9d86e7acab870c3b76a17a5786b5788f
4b0e4fd6806fe1cd9dd277211a3aa9ab0510a3795355190acf8a84f6a2e5a508
53af917ad08d3193143ae5a1d76475bebc70010d4e68081b411ae10baf914376
55da9058a111a99e89dc332fcc1bc050391ca0b55a11bee16ca87d245a9ba3df
6147208f4b1a7f58babe5be217c35692f28ac5f5c1cc3ee24ecfc2a3018e6051
61b369d98c58eb599c2f47b3e96ce2baa46b68e30b8fb4ca6401c6f1c564de84
6330cd9ef47e0dc267be011ac72402ef04bf66df0ebe56833764016d6b5c6eac
6ec88c6d30afcccbb811bb0bc095df2b5ec8ec157451bfd3d13a5340c556a495
7c4774a0b460ff234f93ec5f4c0b74e3b70d5931b5783b04249bbbe016065a15
81cbe91ed74a6fe470374f44eee64544bb40a7e9e7bc20d733efe10d9b06ee23
89bfa492dd655889006b5eea8133f6081c18fda93ff4bf1b3034284b345f50d0
93e16f6b26e069b4863446dcdd12b7e695298624a3e3bed6b85c574cc6ff9a4e
98486c4a7ec955c2aeaea579f8a2d33219d239d55535459748f5e095aef92c2c
9c88be5968b7f8817fe5832fdabfe213d1bc19168c4ee260afffb75651c7939d
a4aa00e22151b6feaade9290ec71759739c6c0bf76d1cc0d8123ffd497c781c1
b40ec204d6bc2143f05504dbd995a1f361f8a498fd13b68598653b7c335dddde
*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.Tofsee-9992775-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 179 samples
Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER 
Value Name: DisableAntiSpyware
117
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND 
Value Name: Start
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 
Value Name: NoAutoRebootWithLoggedOnUsers
117
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV 
Value Name: Start
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 
Value Name: NoAutoUpdate
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION 
Value Name: DisableBehaviorMonitoring
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION 
Value Name: DisableOnAccessProtection
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION 
Value Name: DisableScanOnRealtimeEnable
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION 
Value Name: DisableIOAVProtection
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION 
Value Name: DisableRealtimeMonitoring
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 
Value Name: AUOptions
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 
Value Name: AutoInstallMinorUpdates
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS 
Value Name: DisableNotifications
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 
Value Name: UseWUServer
117
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 
Value Name: DoNotConnectToWindowsUpdateInternetLocations
117
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE 
Value Name: wextract_cleanup0
113
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE 
Value Name: wextract_cleanup1
113
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\FEATURES113
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\FEATURES 
Value Name: TamperProtection
113
MutexesOccurrences
006700e5a2ab05704bbb0c589b88924d113
Global\<random guid>23
{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}9
M5/610HP/STAGE29
Random name4
MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}4
Global\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\1\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\2\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\3\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\4\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\5\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\6\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\7\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
Session\8\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}4
WTfewgNmxpcaVXHKTu1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
193[.]233[.]20[.]28114
31[.]41[.]244[.]200113
149[.]154[.]167[.]9911
162[.]0[.]217[.]2549
185[.]11[.]61[.]1259
95[.]217[.]240[.]2499
176[.]113[.]115[.]1367
80[.]66[.]75[.]2547
80[.]66[.]75[.]47
176[.]113[.]115[.]154/317
176[.]113[.]115[.]2397
176[.]113[.]115[.]1357
108[.]156[.]22[.]1237
80[.]66[.]64[.]1877
142[.]251[.]32[.]1006
157[.]240[.]249[.]1746
45[.]159[.]189[.]1056
104[.]199[.]178[.]2485
20[.]84[.]181[.]625
108[.]156[.]22[.]495
108[.]156[.]22[.]1165
40[.]93[.]212[.]04
23[.]36[.]87[.]1134
20[.]44[.]209[.]2094
45[.]150[.]65[.]44

*See JSON for more IOCs

Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
t[.]me11
api[.]2ip[.]ua9
uaery[.]top9
zexeq[.]com9
249[.]5[.]55[.]69[.]bl[.]spamcop[.]net7
249[.]5[.]55[.]69[.]cbl[.]abuseat[.]org7
249[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net7
249[.]5[.]55[.]69[.]in-addr[.]arpa7
249[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org7
249[.]5[.]55[.]69[.]zen[.]spamhaus[.]org7
microsoft-com[.]mail[.]protection[.]outlook[.]com7
microsoft[.]com7
www[.]google[.]com7
www[.]instagram[.]com7
jnb-efz[.]ms-acdc[.]office[.]com7
nidavellir[.]top7
mail[.]zoom-a[.]com5
api[.]twitter[.]com4
steamcommunity[.]com4
in-jsproxy[.]globh[.]com4
i[.]instagram[.]com3
video-weaver[.]lax03[.]hls[.]ttvnw[.]net3
imap[.]mail[.]yahoo[.]com3
api[.]steampowered[.]com3
www[.]ebay[.]com2

*See JSON for more IOCs

Files and or directories createdOccurrences
%LOCALAPPDATA%\Yandex114
%LOCALAPPDATA%\Yandex\YaAddon114
%TEMP%\IXP001.TMP113
%TEMP%\IXP001.TMP\TMP4351$.TMP113
%TEMP%\5975271bda113
%TEMP%\5975271bda\metafor.exe113
%System32%\Tasks\metafor.exe113
%TEMP%\IXP002.TMP104
%TEMP%\IXP002.TMP\TMP4351$.TMP104
%TEMP%\IXP001.TMP\dry40s70.exe75
%TEMP%\IXP001.TMP\film3390.exe75
%TEMP%\IXP002.TMP\bus8956.exe75
%TEMP%\IXP002.TMP\con3920.exe75
%TEMP%\IXP000.TMP\en894441.exe75
%TEMP%\IXP000.TMP\film0968.exe75
%TEMP%\IXP001.TMP\dix60s27.exe18
%TEMP%\IXP001.TMP\film3173.exe18
%TEMP%\IXP002.TMP\bus2289.exe18
%TEMP%\IXP002.TMP\con9203.exe18
%TEMP%\IXP000.TMP\en504805.exe18
%TEMP%\IXP000.TMP\film4417.exe18
\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x7314
%ProgramData%\freebl3.dll9
%ProgramData%\mozglue.dll9
%ProgramData%\msvcp140.dll9

*See JSON for more IOCs

File Hashes
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*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.TrickBot-9992835-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 25 samples
MutexesOccurrences
Global\316D1C7871E1025
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
181[.]129[.]104[.]13911
181[.]140[.]173[.]1864
5[.]182[.]210[.]1324
5[.]2[.]75[.]1374
198[.]23[.]252[.]1173
172[.]82[.]152[.]1363
181[.]113[.]28[.]1462
85[.]143[.]220[.]412
107[.]181[.]187[.]2212
107[.]172[.]208[.]512
23[.]94[.]70[.]122
194[.]5[.]250[.]622
195[.]54[.]162[.]1792
181[.]112[.]157[.]421
107[.]172[.]29[.]1081
107[.]172[.]251[.]1591
64[.]44[.]51[.]1061
198[.]46[.]161[.]2131
195[.]123[.]245[.]1271
184[.]164[.]137[.]1901
202[.]29[.]215[.]1141
Files and or directories createdOccurrences
%System32%\Tasks\System Network Extensions25
%APPDATA%\sysdefragler25
%APPDATA%\sysdefragler\data25
%APPDATA%\sysdefragler\settings.ini25
%APPDATA%\sysdefragler\àâûñ÷âöóûâïï.exe25
%ProgramData%\àâûñ÷âöóûâïï.exe25

File Hashes

0313de637b547f58e37019e1c1e8a4c8c8c379b0cd70e26973fe1964d19370c0
065321daeffa60da415d858b97a047969eefa46b37156e108ddcb9f575413020
0a3afbc780cad1d1362aa1a878dd4b5083aca8dee29612a153d5774f614305c8
11c43a83f4c74b79d4790739fa7268d3f7d881d2f7b6ec360fe04ea1a4d1861e
19181d38dacd716cf20a7a946003be12fb86e6a0c751639ddd6d53efe3efda30
1bff35e3ecf565e6b00a71aa200718f819e7f16ae0f15d0bf02d3b19469e7ae5
1da3627b54308455a08ee0c7438ab351c5401a27658c7aef4107e37c8f3178e5
35fbb53097e23c03420490049f2312459bb39dc7d0b9f938f11d03a6590b8ce9
394426bf9f92de4a9f17fb55e2cf673913f0b3316a835a9997e344c202d11bb8
398bcec3fdcdb9741f0964893f0601e3cffbc7acbe341aa437b41c24df0fe62e
43e0fef28e8043c80d9f55f761024132094667e5f339dfa6058ccd6055ebfd79
455f826f7c7c1e1e457af75b3a1c352e15d59c0550047f6a0bb315018501bc86
4953287f3a0f5f765cc3a829479c95e27d1e88ef1b8307bf768c44e250c4c0da
4e3d6f9482cc48ca25ef232c2561d665f0aac62c6c04bf344c8a8a13d56450b8
55e67ce7c42149309618cedc8e1ea4da6acd01396d8b1cd4019e99fc2007d14c
5c5462890f505c6ca3c85a5b8b147c12a0a09d2904021c572b94de94793eb9b8
5cf5cdda923dc5e45389de58b252df23ba48cfbb640a6061c5fd7e9154e40b48
61dacaba2faa01e74db47dfd948d7a4431be91e6d97950a0c3ad3178b6648bc8
629ce5216f881a8ed29eff04eb8224968e25607259ec4a5c579253bb252c986b
6ccc41ce35ea17f12dce382972eaeb3e6f1ed1a562a22fba64d3fbcc69e0b66e
705ec0aac3f4ce4bda3c9c6beef15b039b22c6c123a40a564d22166003921451
73b79085f4ee914a9b41772c59effae7d372f413e543a53c8f0bea7944567f11
745dfad60a85705913fbea3da445078a4f4a45dd9f4f9d4ac6a9cd316973f77c
756cad16e6999d083a3c2d260ee091738f61423f2036d5d52865350bbb73da2c
76f37200eae123f5c6fe3935ef3c7776c554c8f85e3cb459bf3ac12affe72e71
*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.Zeus-9992851-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 22 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PRIVACY 
Value Name: CleanCookies
8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101 
Value Name: CheckSetting
8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103 
Value Name: CheckSetting
8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100 
Value Name: CheckSetting
8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102 
Value Name: CheckSetting
8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104 
Value Name: CheckSetting
8
<HKCU>\Software\Microsoft\<random, matching '[A-Z][a-z]{3,11}'>8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Ahxesuhi
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Iwagarwas
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Atmuiz
1
<HKCU>\SOFTWARE\MICROSOFT\DAAHI 
Value Name: Xuhowoc
1
<HKCU>\SOFTWARE\MICROSOFT\TOYRAC 
Value Name: Coewbai
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Cewaik
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Saxagoi
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Doixotfees
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Ampyylhy
1
<HKCU>\SOFTWARE\MICROSOFT\WUOFUZ 
Value Name: Yqemxiavu
1
<HKCU>\SOFTWARE\MICROSOFT\LYEFE 
Value Name: Elca
1
<HKCU>\SOFTWARE\MICROSOFT\QEGYL 
Value Name: Ergafoly
1
<HKCU>\SOFTWARE\MICROSOFT\WOHI 
Value Name: Qoawfyali
1
<HKCU>\SOFTWARE\MICROSOFT\NAEX 
Value Name: Zeeple
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Kyyfidt
1
<HKCU>\SOFTWARE\MICROSOFT\UMAT 
Value Name: Laliaxon
1
MutexesOccurrences
Global\{24146835-2A78-0A63-790E-75826EC5FCEA}8
Global\{B16FE7F0-A5BD-9F18-790E-75826EC5FCEA}8
Local\{BAB1B2C6-F08B-94C6-790E-75826EC5FCEA}8
Local\{CB0EC182-83CF-E579-790E-75826EC5FCEA}8
Local\{E695734A-3107-C8E2-790E-75826EC5FCEA}8
GLOBAL\{<random GUID>}8
Local\{<random GUID>}8
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
seantit[.]ru8
programcam[.]ru8
Files and or directories createdOccurrences
%TEMP%\tmp<random, matching '[0-9a-z]{8}'>.bat8
%APPDATA%\<random, matching '[a-z0-9]{3,7}'>8
%APPDATA%\<random, matching '[A-Z][a-z]{3,5}\[a-z]{4,6}'>.exe8
%APPDATA%\Doanih\ryoga.zoy1
%APPDATA%\Obego\yrefy.ehw1
%APPDATA%\Ylqyu\osxy.hag1
%APPDATA%\Yxidc\coel.die1
%APPDATA%\Cyimp\uvog.mom1
%APPDATA%\Uzoxi\wiyg.ygo1
%APPDATA%\Meixa\ewoq.lor1
%APPDATA%\Niugaq\icus.duu1
%APPDATA%\Ehgefu\fuke.xau1
%APPDATA%\Aduwq\bafoi.izk1
%APPDATA%\Iqoqro\umme.gab1
%APPDATA%\Woileb\iburh.tab1
%APPDATA%\Qeomuh\wucau.agf1
%APPDATA%\Foyd\yzdem.uvv1
%APPDATA%\Lete\burey.idc1
%APPDATA%\Humauk\garya.cyi1

File Hashes
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Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityN/A
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Ransomware.Cerber-9992849-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 11 samples
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}11
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
194[.]165[.]16[.]0/2211
17[.]1[.]32[.]0/2711
78[.]15[.]15[.]0/2711
Files and or directories createdOccurrences
%HOMEPATH%\Contacts\Administrator.contact11
%TEMP%\d19ab98911
%TEMP%\d19ab989\4710.tmp11
%TEMP%\d19ab989\a35f.tmp11
%LOCALAPPDATA%\Microsoft\Office\Groove1\System\CSMIPC.dat11
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp11
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp11
%APPDATA%\microsoft\outlook\_README_B74MN_.hta1
%HOMEPATH%\contacts\_README_H6VK_.hta1
%HOMEPATH%\desktop\_README_CHIF_.hta1
%HOMEPATH%\documents\_README_JXC2RA_.hta1
%HOMEPATH%\documents\onenote notebooks\notes\_README_JPGA1Q_.hta1
%HOMEPATH%\documents\onenote notebooks\personal\_README_B153_.hta1
%HOMEPATH%\documents\outlook files\_README_Z5UUMH77_.hta1
%LOCALAPPDATA%\microsoft\office\groove1\system\_README_X9XYQJ6S_.hta1
%LOCALAPPDATA%\microsoft\office\groove\system\_README_I01IR_.hta1
%APPDATA%\microsoft\outlook\_README_F763VNMA_.hta1
%HOMEPATH%\contacts\_README_7SJPVX_.hta1
%HOMEPATH%\desktop\_README_VORHMMO_.hta1
%HOMEPATH%\documents\_README_YC31F5JF_.hta1
%HOMEPATH%\documents\onenote notebooks\notes\_README_Q969WJ_.hta1
%HOMEPATH%\documents\onenote notebooks\personal\_README_UE3L_.hta1
%HOMEPATH%\documents\outlook files\_README_GBMFP_.hta1
%LOCALAPPDATA%\microsoft\office\groove1\system\_README_OK32B_.hta1
%LOCALAPPDATA%\microsoft\office\groove\system\_README_6EDL1F_.hta1

*See JSON for more IOCs

File Hashes

0299f52568e3c3e8a20eed942d9c917abe85706ed632ab41740171032b75ba27
33aa469808a2fac1af7bde02073497141f80d3f979f01ab3a7fc3ea253ad152d
3a91173ac37aa2d6c4e5175571d3c6c3d41519b5854adec234f6a8a019985735
7a5654712c457a298d328527fa233e107666495305bf0c6dce05f92dea718adb
8bf09171baa96b2c3d6a5741b171a94b6140719a18c4f5e4ba198b8ee5c664b9
99e06cf857f018f62505a683f1fbd5fe6176d995953a9f46a64e7ab338a9ff29
ae013908e9d0e586d733badf1dea24f4ae985c98313b47ae62ca0f48562cfaa1
b35c0c351f090cc9267a8dad234a6d5e3c2f086497948baaa8d7088daeff4ee3
c75b676599dfc4f2f2ee3530bbf86dcba3a380ceaf8ab241de0f83ab5629195c
ca95f9b79b39c7d91cb601b56b7cd4bdf3cc30dc0ba851273b33d6a5ecbeddac
cc505d81001d80c66cb7b003e9f7b4605557a981c003301d07500180d3e3b813

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityN/A
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Virus.Expiro-9992651-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 23 samples
MutexesOccurrences
Global\Multiarch.m0yv-98b68e3c311dcc78-inf23
Global\Multiarch.m0yv-98b68e3c311dcc78493cd690-b20
Files and or directories createdOccurrences
%TEMP%\FXSSVCDebugLogFile.txt23
%TEMP%\FXSTIFFDebugLogFile.txt23
%APPDATA%\98b68e3c311dcc78.bin20
%System32%\alg.exe1

File Hashes
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Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityN/A
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Malware.Ursu-9993206-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 10 samples
MutexesOccurrences
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb75
Global\405f0aa1-c411-11ed-9660-00151757fb541
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
120[.]254[.]246[.]2/311
120[.]254[.]246[.]4/301
120[.]254[.]246[.]8/291
120[.]254[.]246[.]16/281
120[.]254[.]246[.]32/271
120[.]254[.]246[.]64/261
120[.]254[.]246[.]128/271
120[.]254[.]246[.]160/301
175[.]26[.]247[.]11
175[.]26[.]247[.]1801
175[.]26[.]247[.]2/311
175[.]26[.]247[.]4/301
175[.]26[.]247[.]8/291
175[.]26[.]247[.]16/281
175[.]26[.]247[.]32/271
175[.]26[.]247[.]64/261
175[.]26[.]247[.]128/271
175[.]26[.]247[.]160/281
175[.]26[.]247[.]176/301
121[.]179[.]217[.]11
121[.]179[.]217[.]2/311
121[.]179[.]217[.]4/301
121[.]179[.]217[.]8/291
121[.]179[.]217[.]16/281
121[.]179[.]217[.]32/271

*See JSON for more IOCs

Files and or directories createdOccurrences
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.CIPHER._AES.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.CIPHER._ARC4.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.CIPHER._DES.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.CIPHER._DES3.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.HASH._MD4.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.HASH._SHA256.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.RANDOM.OSRNG.WINRANDOM.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.UTIL._COUNTER.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\CRYPTO.UTIL.STRXOR.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\MICROSOFT.VC90.CRT.MANIFEST7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\_HASHLIB.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\_SOCKET.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\_SSL.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\BZ2.PYD7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\II.EXE.MANIFEST7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\MSVCM90.DLL7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\MSVCP90.DLL7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\MSVCR90.DLL7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\PYTHON27.DLL7
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\PYWINTYPES27.DLL6
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\SELECT.PYD6
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\UNICODEDATA.PYD6
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\WIN32API.PYD6
%TEMP%\_MEI<pid, matching '[0-9]{1,5}'>\WIN32PIPE.PYD6
%SystemRoot%\temp\m.ps15

*See JSON for more IOCs

File Hashes
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Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.njRAT-9993044-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 25 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A} 
Value Name: FaviconPath
1
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A} 
Value Name: Deleted
1
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES 
Value Name: DefaultScope
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}1
MutexesOccurrences
Global\10ce2141-c380-11ed-9660-0015177eda001
Global\122748a1-c380-11ed-9660-0015174353321
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
13[.]107[.]21[.]2001
104[.]77[.]236[.]1631
104[.]106[.]239[.]831
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
go[.]microsoft[.]com1
www[.]bing[.]com1
learn[.]microsoft[.]com1

File Hashes

030a6b3c97d78dcf19cddaa56b9165aca07c7edc2e2fe20cf6b86ab6e69fd2c7
0d91427189819eca8df5f972b86c34ea1a5843299dce10c5f73acbea6f3f0717
0eb69ecc13d46ddbc01560ba72d09854500533734595f235266157f334c87e7d
164a4cdbfe7162772a75a91c49e9e89ee24ab57cf051169c76ca4d0b198caef8
1663196132f20b428e3f9beb0cba128e552be30bf1f5677ea69ece8abe463965
1af57ca8bf6eef70b75d59de7d69b647f9b95f0591bc3b2e8adca1d33bb30242
21e8bdbd188c62a86f88f3890e16d697b640b92ee73be8cc28727294b488519e
23b98927a89ec4c226a72d5befe4810fa571ba51813c4f773a6cecc1ca4dfa06
2f306b32f0042b3758c4ce40332d298a1e1a7d0acdf8fe08472cade082e35e49
31dc7dd2b37a39a8c1d8498783b9cd706bc65e9cbe301e60d613641dace1853d
3412bd03d47e49c49aaf9045d2097e472e4cef20b8dc898eceff334e4d494435
37901c8304910f76ea8bfead184754c2555f5fbcb5111f78c0796d5e15cb56e8
41b7ba20a6df8d264a91f199587c294d13875552264c8b514518ed30a4a085eb
45a306e503fea7eaed91350d5ef2a2b493348a6389fd8305c2a8e78a4d9cda64
51f4cb7ad0f142626615e0255a43c23cecf7e6c5d4e017342fd29910d0ea8323
52282cd59742a9b1ed4d14749660cab3b4354a9cc759dfbce88744ea7fc05e65
56be94415da328b46f93544135c826d4c7c64b90dfd77f619dba35dbb37db77f
570f3bb75222f6321ea67082f66868e81addf33f3be8d992405da9d029800010
5d66001cce3d271cd04da046f98c8bef59cc7ecb8f0c38e56286e3b8e4902d26
5da60a89e95890861d24c04a7d6357a1886e9189d8d5730a74ef90487d72adc9
6025a61b34bd1a49884e4837f326348930c4a038b18ed8149eab5a69cac668c0
7136de7871922418b93b424899d27b936ced37a21d0d1f68f25d6e2d005c14d4
726764a541aaeefec88d6324716d41b5b659863487a5ee688fdfa8513e1676c5
739768eb609ffbbd3d27dd27325480031ba0a02e7b6cf741ba2b1173e4b3b207
83e3dd77f13be64e3245f7ff00cd330cff616cca5435d4f21a09d270e7908525
*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.DarkKomet-9992898-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 15 samples
Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: WindowsUpdate
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: WindowsCenter
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 
Value Name: Policies
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 
Value Name: Policies
2
<HKCU>\SOFTWARE\XTREMERAT1
<HKCU>\SOFTWARE\WINDOWS1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{B5OJ4L45-IEYJ-5QW6-B8W5-588P2B6V06M7}1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: SearchInstrumentation
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: msnmsgr
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{B5OJ4L45-IEYJ-5QW6-B8W5-588P2B6V06M7} 
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{P001VBYY-IAR1-8I81-VBAD-21LQ82453K22}1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 
Value Name: KeyWindows
1
<HKCU>\SOFTWARE\SNSERVER1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 
Value Name: KeyWindows
1
<HKCU>\SOFTWARE\SNSERVER 
Value Name: FirstExecution
1
<HKCU>\SOFTWARE\SNSERVER 
Value Name: NewIdentification
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{13UUEGCR-1KL1-48G2-S4E1-35H16U3U0CEF}1
<HKCU>\SOFTWARE\XTREMERAT 
Value Name: Mutex
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{P001VBYY-IAR1-8I81-VBAD-21LQ82453K22} 
Value Name: StubPath
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 
Value Name: Windows Key Registrer
1
<HKCU>\SOFTWARE\WINDOWS 
Value Name: FirstExecution
1
<HKCU>\SOFTWARE\WINDOWS 
Value Name: NewIdentification
1
<HKCU>\SOFTWARE\WINDOWS 
Value Name: NewGroup
1
MutexesOccurrences
_x_X_BLOCKMOUSE_X_x_3
_x_X_PASSWORDLIST_X_x_3
_x_X_UPDATE_X_x_3
***MUTEX***2
***MUTEX***_SAIR2
6O060IBVE63W7K1
Global\b3004101-c2ef-11ed-9660-001517b2b8ea1
¡¡¡¡¡¡¡¡¡¡009999996660XXXXXX1
6O060IBVE63W7K_PERSIST1
¡¡¡¡¡¡¡¡¡¡009999996660XXXXXXPERSIST1
6O060IBVE63W7K_SAIR1
¡¡¡¡¡¡¡¡¡¡009999996660XXXXXXEXIT1
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
domo123[.]no-ip[.]org2
fkzkedim[.]redirectme[.]net1
drkufhsdlifuvsdr[.]redirectme[.]net1
Files and or directories createdOccurrences
%TEMP%\XX--XX--XX.txt3
%TEMP%\UuU.uUu3
%TEMP%\XxX.xXx3
%APPDATA%\logs.dat2
%APPDATA%\cglogs.dat1
%SystemRoot%\SysWOW64\system321
%SystemRoot%\SysWOW64\Windows1
%SystemRoot%\SysWOW64\Isass.exe1
%SystemRoot%\SysWOW64\update.exe1
%APPDATA%\Microsoft\Windows\¡¡¡¡¡¡¡¡¡¡009999996660XXXXXX.dat1
%SystemRoot%\SysWOW64\Windows\update.exe1
%SystemRoot%\SysWOW64\system32\Isass.exe1

File Hashes

09c627a80feb17bdd1c691f08304bf3c0919f1d3649b3737e5e73ebfc6cb7a7e
103a4c883a3e5cc1d26dc9e7b23515193897996328f9bda2f27f58ffaf21af49
22d0086aad6339e4c70a5d1a8a52fdfe156be7a9ffd86570a6b71aaaaa71a56b
352e169bdbb62dbee2403fbb6be19cfb5bb31d9be24aa71aaa8c597fbfb1923d
733766323a2a60cc5f1e125d3f10dd1dd5fd435556f8931b93c6e444371b7584
7de1fed73d6386b7e6a8f0ddf3f2fe09f41c177a75dd3196871488b6e47110b4
841b33cd462ebc256e13bc2ea1e0b7f5ce0caf4a92508f41f0bb5250805e2620
886c390b9c6b0ed823c3281d90a2888419ada09bf425dbab5e136676fafd053a
ac0e95e4b26b3123a9254c67f847a58d2a7c76f1b86a4f695890e3e452f727a8
b869f621ada391282aa15ad7ed33c9500f10be50e8d510daccfe9a4fbdd0878d
bf6df03ede9cf7c85f49321221af2764fccf4a7ba41c938f6e3a284ecd1ec148
df8e322d932dcfb9d562f2867cd07f24fbdb0fea5234567c5bd2aeb1179e739a
e59fb24214fe51cebf80fed4ad5833ce896c06c5e5e8aa10eb468ec1a08d3af3
ed7b55eeeb4428a084836790e97511f627c5f34d40b22647c680ef58f67eae70
f5291f52a036f0c6af479557baea52adaf2375a8c0de4d5a5ca074256c287b32

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityN/A
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK