Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 24 and March 3. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.

The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Win.Dropper.Nanocore-9988753-1DropperNanocore is a .NET remote access trojan. Its source code has been leaked several times, making it widely available. Like other RATs, it allows full control of the system, including recording video and audio, stealing passwords, downloading files and recording keystrokes.
Win.Dropper.NetWire-9988754-0DropperNetWire is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, remote desktop, and read data from connected USB devices. NetWire is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
Win.Dropper.Raccoon-9988770-0DropperRaccoon is an information-stealer written in C++. It collects system information and a list of installed applications, then steals cookies and autofill form details from various browsers (Chrome, Internet Explorer, Firefox, Waterfox, SeaMonkey and Pale Moon). The malware can also steal credentials from email clients like Outlook, Thunderbird and Foxmail, then scans the infected device for information about valid cryptocurrency wallets.
Win.Dropper.LokiBot-9988785-0DropperLokibot is an information-stealing malware designed to siphon sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from several popular applications. It is commonly pushed via malicious documents delivered via spam emails.
Win.Trojan.Tofsee-9989403-0TrojanTofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and send large volumes of spam messages to infect additional systems and increase the size of the botnet under the operator's control.
Win.Dropper.Glupteba-9988873-0DropperGlupteba is a multi-purpose trojan that is known to use the infected machine to mine cryptocurrency and steals sensitive information like usernames and passwords, spreads over the network using exploits like EternalBlue, and leverages a rootkit component to remain hidden. Glupteba has also been observed using the bitcoin blockchain to store configuration information.
Win.Virus.Ramnit-9988782-0VirusRamnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.
Win.Dropper.Zeus-9988750-0DropperZeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing.

Threat Breakdown

Win.Dropper.Nanocore-9988753-1

Indicators of Compromise

  • IOCs collected from dynamic analysis of 20 samples
Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AutoUpdate
14
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AGP Manager
12
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: WindowsUpdate
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Chrome
7
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: DisableTaskMgr
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: Path
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Explorere
1
<HKCU>\SOFTWARE\RMC-SDW3HE1
<HKCU>\SOFTWARE\RMC-SDW3HE
Value Name: exepath
1
<HKCU>\SOFTWARE\RMC-SDW3HE
Value Name: licence
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 8_28
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: Hash
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: Triggers
1
MutexesOccurrences
GLOBAL\{<random GUID>}14
Rmc-SDW3HE1
fVfjAITAdJZZHOQHre1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]169[.]69[.]264
194[.]5[.]98[.]2194
194[.]5[.]98[.]2133
61[.]77[.]245[.]273
212[.]193[.]30[.]2302
194[.]5[.]98[.]841
208[.]95[.]112[.]11
50[.]87[.]253[.]1251
178[.]237[.]33[.]501
194[.]5[.]98[.]541
37[.]0[.]14[.]2091
194[.]180[.]48[.]2311
37[.]0[.]14[.]2071
194[.]5[.]98[.]1761
35[.]76[.]115[.]1701
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
411speed[.]duckdns[.]org4
lowaspeed[.]ddnsfree[.]com4
nexaustin[.]ddns[.]net3
december2nd[.]ddns[.]net3
december2n[.]duckdns[.]org2
ip-api[.]com1
express104[.]ddns[.]net1
geoplugin[.]net1
mail[.]chabiant[.]az1
lucasjules[.]ddns[.]net1
debtcollector[.]ddns[.]net1
ziggynas10[.]ddns[.]net1
vjhelena[.]duckdns[.]org1
Files and or directories createdOccurrences
%HOMEPATH%\temp20
%TEMP%\RegSvcs.exe18
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C514
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs14
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator14
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat14
%ProgramFiles(x86)%\AGP Manager12
%ProgramFiles(x86)%\AGP Manager\agpmgr.exe12
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\task.dat12
%System32%\Tasks\AGP Manager12
%System32%\Tasks\AGP Manager Task12
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp12
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk1
%TEMP%\2_75\mgaj.exe1
%TEMP%\2_75\mtjgjgeh.ini1
%TEMP%\2_75\nlwwlt.icm1
%TEMP%\2_75\ocpdsfgrnc.exe1
%TEMP%\2_75\pgmacqfvo.icm1
%TEMP%\2_75\qfnsjk.xls1
%TEMP%\2_75\qhipjnx.ini1
%TEMP%\2_75\radrdjo.xl1
%TEMP%\2_75\resv.hpd1
%TEMP%\2_75\rfpigltf.xml1
%TEMP%\2_75\rfvsqumom.dll1
%TEMP%\2_75\rwdwdlsrqb.dll1

*See JSON for more IOCs

File Hashes
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Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.NetWire-9988754-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 30 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: DisableTaskMgr
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM12
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: WindowsUpdate
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN7
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTELLIFORMS\STORAGE26
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX6
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX\20.0.1 (EN-US)\MAIN6
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA THUNDERBIRD6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\DISCARDABLE\POSTSETUP\COMPONENT CATEGORIES\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\DISCARDABLE\POSTSETUP\COMPONENT CATEGORIES\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\ENUM6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\DISCARDABLE\POSTSETUP\COMPONENT CATEGORIES\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\ENUM
Value Name: Implementing
6
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AutoUpdate
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AGP Manager
4
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER
Value Name: DisableAntiSpyware
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Chrome
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: newapp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 10_91
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 10_210
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 6_104
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 2_51
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 6_84
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 7_72
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 1_1010
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 6_43
1
MutexesOccurrences
Global\{042723c4-0804-4212-bf56-4b1b2669ca7c}4
N0249TQWRV8507C83
L5808CUU0VA1BWEY3
22L8RUBQCAU3-4M82
382O0TAFATX0-HMF2
8-3503835SZBFHHZ1
1L2N233BRY01J7GZ1
J1P86SR380H1-G0M1
S-1-5-21-2580483-124435716687561
224N6440XBBIwH4Y1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
45[.]33[.]6[.]2236
158[.]101[.]44[.]2425
52[.]20[.]78[.]2405
192[.]169[.]69[.]264
194[.]5[.]98[.]2194
77[.]88[.]21[.]1583
107[.]161[.]23[.]473
85[.]10[.]159[.]43
154[.]82[.]84[.]1553
45[.]10[.]154[.]553
66[.]96[.]162[.]1422
66[.]96[.]134[.]422
85[.]187[.]128[.]352
132[.]226[.]247[.]732
195[.]30[.]85[.]1302
34[.]117[.]168[.]2332
142[.]250[.]80[.]512
162[.]213[.]253[.]2362
156[.]254[.]142[.]112
162[.]0[.]233[.]142
45[.]207[.]92[.]232
148[.]251[.]205[.]1882
179[.]43[.]152[.]1622
208[.]91[.]197[.]271
96[.]126[.]123[.]2441

*See JSON for more IOCs

Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
checkip[.]dyndns[.]org9
api[.]ipify[.]org6
www[.]sqlite[.]org6
411speed[.]duckdns[.]org4
lowaspeed[.]ddnsfree[.]com4
smtp[.]yandex[.]com3
www[.]cure-finder[.]org3
www[.]50056[.]top3
www[.]housetelecompro[.]com3
www[.]artshreeinterior[.]com3
www[.]moidvain[.]live2
www[.]odonda[.]com2
www[.]syta-serg[.]com2
www[.]riveratpinny[.]com2
www[.]carparkingtrc[.]com2
www[.]remont-pc-nout-msk[.]online2
www[.]vertiboard[.]live2
www[.]unaandmyriad[.]com2
www[.]jpptraders[.]com2
www[.]ineedmybrain[.]com2
www[.]briarthornoh[.]com2
www[.]maotradersusa[.]com2
www[.]hartmannschneider[.]com2
www[.]aaronmachado[.]com1
www[.]ashakendra[.]org1

*See JSON for more IOCs

Files and or directories createdOccurrences
%HOMEPATH%\temp30
%TEMP%\RegSvcs.exe20
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk12
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp11
%TEMP%\sqlite3.dll6
%TEMP%\sqlite3.def6
%ProgramFiles(x86)%\AGP Manager4
%ProgramFiles(x86)%\AGP Manager\agpmgr.exe4
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C54
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs4
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator4
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat4
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\task.dat4
%System32%\Tasks\AGP Manager4
%System32%\Tasks\AGP Manager Task4
%TEMP%\8_92\nfurkm.ini1
%TEMP%\10_58\pogqmomls.dll1
%TEMP%\8_92\okqem.docx1
%TEMP%\10_58\qgidpskn.ppt1
%TEMP%\8_92\omtehbomd.exe1
%TEMP%\10_58\qhmc.mp31
%TEMP%\8_92\oowwjlp.icm1
%TEMP%\10_58\qjudhi.txt1
%TEMP%\8_92\ovsu.icm1
%TEMP%\10_58\qnlavo.pdf1

*See JSON for more IOCs

File Hashes
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*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.Raccoon-9988770-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 14 samples
Registry KeysOccurrences
<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E
Value Name: LanguageList
14
MutexesOccurrences
CS_CONFIDENCE_MEM_NUTEX14
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
165[.]193[.]78[.]23414
18[.]238[.]4[.]84/316
18[.]238[.]4[.]794
18[.]238[.]4[.]824
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
dpd[.]securestudies[.]com14
post[.]securestudies[.]com14
Files and or directories createdOccurrences
%LOCALAPPDATA%\Programs14
%LOCALAPPDATA%\Programs\Common14
%TEMP%\<random, matching '[a-z]{3}[A-F0-9]{3,4}'>.tmp14
%TEMP%\is-7237K.tmp\_isetup\_setup64.tmp1
%TEMP%\is-IJV12.tmp\rkinstaller.exe1
%TEMP%\is-7237K.tmp\itdownload.dll1
%TEMP%\is-IJV12.tmp\rkverify.exe1
%TEMP%\is-7237K.tmp\rkinstaller.exe1
%TEMP%\is-7237K.tmp\rkverify.exe1
%TEMP%\is-9QBB7.tmp\ec09c5b928cb50415355ff8fe2e3bc9600c7f5b88576e5f8c567df13790a7ab0.tmp1
%TEMP%\is-C1N07.tmp\fd8920c28fd2160ecd246fcf526acf3a23229001957d583b51301eb555830cc2.tmp1
%TEMP%\is-H93HR.tmp\b02b72bc93bf09f7986a98b461c33d7a55fc742b98997fd21688162f8d6d86be.tmp1
%TEMP%\is-C8UFO.tmp\19ff84f10af4e7f4960207a56a1f75eeb71cdcf3fd66339f72d28db735818571.tmp1
%TEMP%\is-70JO4.tmp\cff82abf5bc773973dc5dc12949a5957f0dd72b7e8120ead9dc3ef9c53221f43.tmp1
%TEMP%\is-2F8U3.tmp\RKBanner.bmp1
%TEMP%\is-2F8U3.tmp\_isetup\_setup64.tmp1
%TEMP%\is-2F8U3.tmp\itdownload.dll1
%TEMP%\is-2F8U3.tmp\rkinstaller.exe1
%TEMP%\is-II8FN.tmp\RKBanner.bmp1
%TEMP%\is-2F8U3.tmp\rkverify.exe1
%TEMP%\is-II8FN.tmp\_isetup\_setup64.tmp1
%TEMP%\is-II8FN.tmp\itdownload.dll1
%TEMP%\is-II8FN.tmp\rkinstaller.exe1
%TEMP%\is-II8FN.tmp\rkverify.exe1
%TEMP%\is-Q4D1S.tmp\942597777531fe8e56d8384e93e2255b60b4dc4794d0f05155f495f287b7984c.tmp1

*See JSON for more IOCs

File Hashes
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Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.LokiBot-9988785-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 34 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: SysHelper
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: SysHelper
5
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER
Value Name: DisableAntiSpyware
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoRebootWithLoggedOnUsers
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableBehaviorMonitoring
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableOnAccessProtection
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableScanOnRealtimeEnable
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableIOAVProtection
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES
Value Name: TamperProtection
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableRealtimeMonitoring
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: AUOptions
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: AutoInstallMinorUpdates
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS
Value Name: DisableNotifications
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: UseWUServer
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DoNotConnectToWindowsUpdateInternetLocations
3
MutexesOccurrences
Global\<random guid>17
{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}5
M5/610HP/STAGE25
MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}3
Global\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\1\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\2\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\3\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\4\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\5\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\6\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\7\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
Session\8\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}3
3749282D282E1E80C56CAE5A1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
149[.]154[.]167[.]995
162[.]0[.]217[.]2545
78[.]47[.]226[.]245
185[.]11[.]61[.]1254
179[.]43[.]154[.]2163
190[.]229[.]19[.]72
193[.]233[.]20[.]202
211[.]104[.]254[.]1392
109[.]98[.]58[.]981
175[.]119[.]10[.]2311
175[.]120[.]254[.]91
222[.]236[.]49[.]1241
211[.]119[.]84[.]1121
185[.]95[.]186[.]581
46[.]148[.]39[.]361
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
t[.]me5
api[.]2ip[.]ua5
uaery[.]top5
jiqaz[.]com5
sempersim[.]su1
Files and or directories createdOccurrences
%ProgramData%\freebl3.dll5
%ProgramData%\mozglue.dll5
%ProgramData%\msvcp140.dll5
%ProgramData%\nss3.dll5
%ProgramData%\softokn3.dll5
%ProgramData%\vcruntime140.dll5
%APPDATA%\Microsoft\Network5
I:\5d2860c89d774.jpg5
\SystemID5
\SystemID\PersonalID.txt5
%LOCALAPPDATA%\bowsakkdestx.txt5
%System32%\Tasks\Time Trigger Task5
%System32%\Tasks\Azure-Update-Task5
%APPDATA%\Microsoft\Network\mstsca.exe5
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed655
\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x734
%LOCALAPPDATA%\Yandex2
%LOCALAPPDATA%\Yandex\YaAddon2
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa12622
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa1262\build2.exe2
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa1262\build3.exe2
%APPDATA%\D282E1\1E80C5.lck1
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c51
%LOCALAPPDATA%\8e9cfb64-0179-441e-8dff-4b7c453e48cd\build2.exe1
%LOCALAPPDATA%\fdc94fe5-09a5-427c-8fd6-709a6287f394\build2.exe1

*See JSON for more IOCs

File Hashes
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*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Trojan.Tofsee-9989403-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 35 samples
Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: SysHelper
6
<HKU>\.DEFAULT\CONTROL PANEL\BUSES5
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoRebootWithLoggedOnUsers
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableBehaviorMonitoring
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableOnAccessProtection
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableScanOnRealtimeEnable
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableIOAVProtection
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES
Value Name: TamperProtection
3
MutexesOccurrences
Global\<random guid>9
{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}6
MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}2
Global\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\1\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\2\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\3\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\4\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\5\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\6\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\7\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
Session\8\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}2
WTfewgNmxpcaVXHKTu1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
149[.]154[.]167[.]999
162[.]0[.]217[.]2546
78[.]46[.]235[.]1096
31[.]13[.]65[.]525
46[.]173[.]218[.]2095
176[.]113[.]115[.]1365
142[.]251[.]40[.]1005
80[.]66[.]75[.]2545
80[.]66[.]75[.]45
176[.]113[.]115[.]154/315
176[.]113[.]115[.]2395
176[.]113[.]115[.]1355
31[.]13[.]65[.]1744
142[.]251[.]40[.]1314
185[.]11[.]61[.]1254
95[.]158[.]162[.]2004
212[.]227[.]17[.]1703
217[.]69[.]139[.]603
193[.]233[.]20[.]243
45[.]155[.]204[.]133
212[.]227[.]17[.]1782
104[.]47[.]53[.]362
66[.]254[.]114[.]412
37[.]1[.]217[.]1722
104[.]244[.]42[.]662

*See JSON for more IOCs

Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
t[.]me9
api[.]2ip[.]ua6
uaery[.]top6
jiqaz[.]com6
249[.]5[.]55[.]69[.]bl[.]spamcop[.]net5
249[.]5[.]55[.]69[.]cbl[.]abuseat[.]org5
249[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net5
249[.]5[.]55[.]69[.]in-addr[.]arpa5
249[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org5
249[.]5[.]55[.]69[.]zen[.]spamhaus[.]org5
i[.]instagram[.]com5
microsoft-com[.]mail[.]protection[.]outlook[.]com5
microsoft[.]com5
www[.]google[.]com5
svartalfheim[.]top5
www[.]instagram[.]com4
www[.]google[.]it4
auth[.]mail[.]ru3
imap[.]web[.]de3
imap[.]gmx[.]net3
work[.]a-poster[.]info2
www[.]google[.]co[.]uk2
www[.]google[.]com[.]au2
www[.]tiktok[.]com2
www[.]google[.]com[.]tr2

*See JSON for more IOCs

Files and or directories createdOccurrences
%ProgramData%\freebl3.dll6
%ProgramData%\mozglue.dll6
%ProgramData%\msvcp140.dll6
%ProgramData%\nss3.dll6
%ProgramData%\softokn3.dll6
%ProgramData%\vcruntime140.dll6
I:\5d2860c89d774.jpg6
\SystemID6
\SystemID\PersonalID.txt6
%System32%\Tasks\Time Trigger Task6
\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x736
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed656
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa12626
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa1262\build2.exe6
%SystemRoot%\SysWOW64\config\systemprofile5
%SystemRoot%\SysWOW64\config\systemprofile:.repos5
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>5
%TEMP%\<random, matching '[a-z]{8}'>.exe5
%LOCALAPPDATA%\Yandex4
%LOCALAPPDATA%\Yandex\YaAddon4
\{4feb3bef-c8f9-d16c-dfb8-933e58354094}1
\{ef6007c6-a5d2-ddd4-8b35-1c2c1f5d4a96}1
%APPDATA%\nsis_unscc28dda9.dll1
%APPDATA%\nsis_unscc29ad46.dll1
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed65\6585b2ca812353618b651b010fba7b6e509c0a2ecbe835b139b47a7cefbbe022.exe1

*See JSON for more IOCs

File Hashes

07208125e50054249217e23d23cb0f1c60902b79039eada521e580a9874367c1
0e983029bc6537eadbb83c37bf4efb101bf2476223fecd1edc34f6834cede275
243536284047d671c497feebc41ffab5b1d2989d10d83de822cab17162189060
2d19ffc8092b613bd178b1d0cfb180a9ebe78c47c0f748fe2afeec4308948dbe
309cfe7002f5ba9a69acb5de1057fbaa8b69e9b241717d86c2af2607ce32b6d7
41e4b903ce4dcf1e0a138ce1edb1280d6fe2b50a222c925d3600903c4eb2fae2
49c47cdeb7a96f18843adc2c93765147823d9cc3b741766f1cc3257d19e6e81b
4ce2353420b3fef9a268a018a0b8bb5d4389bd7ff288c1168af812dd81b2d54a
5deb46b26699093388dbe8924984ff6989a9e3cd77d0d7aa2082d2b857e2001a
645450dca48ce4a23d042d0ca06e084b511019e2876663828163ef176023fce2
6585b2ca812353618b651b010fba7b6e509c0a2ecbe835b139b47a7cefbbe022
680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
6a0c5287d68e8420000b47bf39348a10ca9cb6e3ec9b737d80b4a26081139013
75d147c30c0b66e05b4e56a40f816de462668850d945e03dbe393feebc4746c7
75e4549d520b05828fa5b3d5e8907c26b37cbcb0e98887bce5a18d1d9b4820ed
82c5eea49d1201505fe3346262c2ddf21d8f0a76c58b7c5922362b79d91e3716
85dc2a941050a6000b3bc6fed7fd47730d7bb6d7b7fb761b769a6e0e6b5012c9
8692802882838289b211bdbd397caf4c1c5e298aa1702764c6264d511fafedc2
8a7b8e7243c5aa78ce2415d735a3c4b9adb5f0760d935efbb62d6fb6870e9fff
9550bd7e6baa67c488e005edc23aa29bcfa3dbe8dd643ad7165d5c90394ac6e5
acf04fb26693384ef1090ab6854df66c2e4cef24a310a44a652330902d0bdef3
b0d58abdf40c6e922ecad36224a0c65bc3f87fcd36c781566f5d7733b72e608b
b2dc0720b0e858b49bd451a799fc531027ad712cf924d5e6599bdea94a2d53bc
b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
b8368b4ce775b6e356334342e6daed7cd1623c9d8b35dd04b6c5e53de35efc4c
*See JSON for more IOCs

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.Glupteba-9988873-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 18 samples
Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
3
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER
Value Name: DisableAntiSpyware
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoRebootWithLoggedOnUsers
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableBehaviorMonitoring
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableOnAccessProtection
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableScanOnRealtimeEnable
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableIOAVProtection
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES
Value Name: TamperProtection
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableRealtimeMonitoring
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: AUOptions
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: AutoInstallMinorUpdates
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS
Value Name: DisableNotifications
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: UseWUServer
2
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DoNotConnectToWindowsUpdateInternetLocations
2
<HKCU>\SOFTWARE\MICROSOFT\A1890984
Value Name: PatchTime
1
<HKCU>\SOFTWARE\MICROSOFT\A1890984
Value Name: PGDSE
1
MutexesOccurrences
Global\<random guid>5
{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}1
Global\SetupLog1
Global\WdsSetupLogInit1
Global\h48yorbq6rm87zot1
Global\xmrigMUTEX313371
WininetConnectionMutex1
M5/610HP/STAGE21
Global\qtxp9g8w1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
77[.]73[.]133[.]622
62[.]204[.]41[.]1592
204[.]79[.]197[.]2191
148[.]251[.]87[.]1121
162[.]159[.]134[.]2331
185[.]199[.]111[.]1331
190[.]117[.]75[.]911
162[.]0[.]217[.]2541
167[.]172[.]42[.]311
142[.]250[.]112[.]1271
20[.]60[.]161[.]2251
91[.]215[.]85[.]1551
45[.]15[.]156[.]2021
190[.]141[.]35[.]31
185[.]165[.]170[.]191
89[.]13[.]103[.]1861
89[.]58[.]60[.]2081
98[.]207[.]124[.]1631
109[.]123[.]233[.]1381
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
raw[.]githubusercontent[.]com1
msdl[.]microsoft[.]com1
vsblobprodscussu5shard35[.]blob[.]core[.]windows[.]net1
vsblobprodscussu5shard60[.]blob[.]core[.]windows[.]net1
cdn[.]discordapp[.]com1
api[.]2ip[.]ua1
stun[.]l[.]google[.]com1
bitcoin[.]dermichi[.]com1
electrum[.]leblancnet[.]us1
lavahost[.]org1
fulcrum[.]grey[.]pw1
uaery[.]top1
drampik[.]com1
fortress[.]qtornado[.]com1
electrumx[.]info1
vmd104012[.]contaboserver[.]net1
7326f935-56c7-404a-850e-453ee192e743[.]uuid[.]dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad[.]onion1
Files and or directories createdOccurrences
%LOCALAPPDATA%\Yandex4
%LOCALAPPDATA%\Yandex\YaAddon4
\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x732
%SystemRoot%\Logs\CBS\CBS.log1
%SystemRoot%\rss1
%SystemRoot%\rss\csrss.exe1
%APPDATA%\Microsoft\Network1
I:\5d2860c89d774.jpg1
\SystemID1
\SystemID\PersonalID.txt1
%LOCALAPPDATA%\bowsakkdestx.txt1
%System32%\Tasks\Time Trigger Task1
%TEMP%\csrss1
%TEMP%\csrss\dsefix.exe1
%TEMP%\csrss\patch.exe1
%System32%\drivers\Winmon.sys1
%System32%\drivers\WinmonFS.sys1
%System32%\drivers\WinmonProcessMonitor.sys1
%TEMP%\Symbols1
%TEMP%\Symbols\ntkrnlmp.pdb1
%TEMP%\Symbols\ntkrnlmp.pdb\9E22A5947A15489895CE716436B45BE021
%TEMP%\Symbols\ntkrnlmp.pdb\9E22A5947A15489895CE716436B45BE02\download.error1
%TEMP%\Symbols\pingme.txt1
%TEMP%\Symbols\winload_prod.pdb1
%TEMP%\Symbols\winload_prod.pdb\B7B16B17E078406E806A050C8BEE2E3611

*See JSON for more IOCs

File Hashes

0376b5ee34d46a7ab1ad3452365fbd44020fb67988a28cdd52735b5b8c302711
048589ea3018e664d6fdc3faa93d652b6461e76e8353290ebde5df1b483f8c60
1d319f7e8db796613d3e9496cf26290a3a443158bec07226fd9c5c2b9966db6d
23345f908b3895111ae284cfc4858887da2fe4640ed698c8fd9204c1384786fb
250ed797d37c163a04589c7767db6865aaedd5b40a575bf06cc4675d1ce24869
267d055f0fbae4dbdadefb989a99566d754233806bc00a7ca63f7dc377e085c6
46f334adfbad0b9ed2e259ba4da1379c626043b206ba2ce610872688e8914c84
5fe1badcbe953df5a0ef020647950ddbe437fd56191d6e75ea88919af4d5da28
7bc325495c9e3bfb94c3a652fa3c6a4e40207ceb3585ae4935bd27af341b0449
935a798cfc4114c215688cf6d7b052491a4c24ff75ad7d04f62c066dd2bc9182
a3333fe0c9924291ab54145fb772e785f9f5678a44d9c1254e36c710f28d53e7
ba67657f3cf8b2ef26406717f012090363c33e1d439488d4afb0b18d37215c45
cb886be0530f96ba6b95136e2134e79d40427ac37703236fe8455073d570b736
d35a0b59e360c8ee6bccb1c07fd29592c4b2ec9a1a1aadbe2a3f91655eba5316
dbce2ca6121577b89cb7fe355eb92c8a7bb8690672956a2ca58c111d9561758f
ec7dffd2498bc699649335dfde360c8f96acdb619fb9ae94b6bdd7d02caef8e6
eed1f296204360f8f563e9dbceca4628aef8d7c4437c6359ac20d1bfc6fc9573
fd81eb4c53e788ac14584f8fd628304c710db8f5cfe22a99aa4876f19d9858bf

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Virus.Ramnit-9988782-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 21 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}
Value Name: FaviconPath
21
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}
Value Name: Deleted
21
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES
Value Name: DefaultScope
21
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}21
MutexesOccurrences
KyUffThOkYwRRtgPP21
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
13[.]107[.]21[.]20010
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]bing[.]com21
Files and or directories createdOccurrences
%ProgramFiles(x86)%\Microsoft21
%ProgramFiles(x86)%\Microsoft\DesktopLayer.exe21
%SystemRoot%\SysWOW64\rundll32Srv.exe21
%ProgramFiles(x86)%\Microsoft\px7366.tmp2
%ProgramFiles(x86)%\Microsoft\px703B.tmp2
%ProgramFiles(x86)%\Microsoft\px8039.tmp1
%ProgramFiles(x86)%\Microsoft\px6FAE.tmp1
%ProgramFiles(x86)%\Microsoft\px73C3.tmp1
%ProgramFiles(x86)%\Microsoft\px702B.tmp1
%ProgramFiles(x86)%\Microsoft\px73D3.tmp1
%ProgramFiles(x86)%\Microsoft\px6FCD.tmp1
%ProgramFiles(x86)%\Microsoft\px771D.tmp1
%ProgramFiles(x86)%\Microsoft\px6E28.tmp1
%ProgramFiles(x86)%\Microsoft\px7192.tmp1
%ProgramFiles(x86)%\Microsoft\px70F6.tmp1
%ProgramFiles(x86)%\Microsoft\px71EF.tmp1
%ProgramFiles(x86)%\Microsoft\px6FFC.tmp1
%ProgramFiles(x86)%\Microsoft\px7911.tmp1
%ProgramFiles(x86)%\Microsoft\px728B.tmp1
%ProgramFiles(x86)%\Microsoft\px71A1.tmp1
%ProgramFiles(x86)%\Microsoft\px7115.tmp1
%ProgramFiles(x86)%\Microsoft\px6E67.tmp1

File Hashes

0c33bc8a10f6a48bf12e8df5262143d5cc5a4c7cfa6cadf82253b5517b2bec67
17aef698ae9fd21f6ca4d973013ba565bfb869c729d89154ebf86b0ecbc63428
4e5d405a2e0be49aea162a6a2026ca997d420d58697b029bde0f85ed8d644167
5542a9398f257317cc69b32b046392a38b1f70fb2ad6396a5f08d0c9e073e0a9
632a6c249cb8eeacc68c0ff9f624435230113762dcb3d6b0d2c1329be82ee574
6cbef0d719b5e47482d34e88a2fe4148b6816f3b482ba7e5ef6add28e8bb3d1d
77b7aba8c4bc053f1dddbe4c267140a077be44f0bd040411c0ddfeb7c3e11e4d
7b2ce3cf6c741a7fa5b1821f7d129382de6abe62f408467ca49884d9aa477075
a46b04ebd27304cbef9f95dbd7606b480e1877fa3b0a2cda4edfb06302f67225
a8cc4ae486f9149baadd5d998a8df360d4b45746d6833928c40cae5df933b438
c3a8e97f914a1463534d8cfae9506c4a06d73ba9a2e44f90c3bc6c0e5aee3428
cb946b8506091b0e31961a6ccad86a423d777629e6961a3f7d2616bb777ba541
da812431fbc8469f869fcb5b83d2f09a13d9a3adb1f806d52491db16f830f712
ded85d07d86dd3adcc23b21b1a37896a3a300e8710135dc920027663ef54b775
e563dcb69817516eb88c4d896820047d97bb3f1a36f9f247ef3c510cc94e03d9
e67f9d504fb931f908cfb2f5e8cb5af37e08ede82d5415e30b6d6197b7d44627
e6813af7335f70cf2b05a3a05bdb398183ff4f5abe02bfad60de4733d8ebf10b
f8bcc28164d3f4f1c3082e96e263038faafcc50e1d8749971deee447627e0e50
f90d93f548a163f61764bccba91df85c9db6970666d8763333c4162a70b72615
fe7785671e6ccb0b6e1361de8fd1f25ba8da76d956670552e54a484cae725748
fef1705eea70e1de25c5ae65f18f7d2b0bba8e6dd3fafaebb86e535bc066adaa

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityN/A
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK


Win.Dropper.Zeus-9988750-0

Indicators of Compromise

  • IOCs collected from dynamic analysis of 13 samples
Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PRIVACY
Value Name: CleanCookies
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\UBVIY1
<HKCU>\SOFTWARE\MICROSOFT\UBVIY
Value Name: Uwwuycd
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: {A6EB954B-36CE-6D51-9914-7AFC0F4D2293}
1
MutexesOccurrences
Local\{40FFE960-4AE5-8B45-9914-7AFC0F4D2293}1
Local\{6B598C52-2FD7-A0E3-9914-7AFC0F4D2293}1
Local\{40FFE963-4AE6-8B45-9914-7AFC0F4D2293}1
GLOBAL\{<random GUID>}1
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ehsbgroups[.]com1
Files and or directories createdOccurrences
%TEMP%\tmp8b1ba708.bat1
%APPDATA%\Feyk1
%APPDATA%\Feyk\tued.ecu1
%APPDATA%\Itku1
%APPDATA%\Itku\unvoe.exe1

File Hashes

01a9202e01857ee31377711c893d5986672a4d090e16f0a4b379b35dda652a24
087c75d498912b2e0037c5a23c203152d1e8cb521d744b1d1e2d3fd0e6e062df
1f00b921d9b2678183af1bddc7bf00292f023c0c3b12c90571a1d961b7c50091
48360a8b4dfd126db752d460ed8ceb40648c67db762459126f8df9a817df2bf2
6738a80543cbbf92d09122797cf787c144e0fb731b2563f2ee0856b6d004bae9
8687477c766f0fa9e440110916fa2df3bcbfe47c912026b896c10ff6dcf3eb50
8b3b348436737e08f6b1645e8e8b66bd3f81ee9b6070e4a61f01e4dba4d133b9
8f5a293c6153c6d223f942ee9f25434bc8237a248a653c1d9a2c6d100d78e4bd
946422e0bb62a87310bb0645d19d22a007cc416b2f1d94029667efb96b1dc62a
b22deb5464a94d5eb973664697ce0aa6d70b2d538747f30e45d45f3452c6aa29
c40bfc195e4c12017fb7937fec5b03873408127e957a392d2dc59128a4a59bf3
d661bed2c2d1613a03974d188aef1f74b7937674dd60ac63a2725f1c9f603e8b
eb6f7a2f954530cea44e1237c21285e88a2e7768b2943c220870e4fdce3eeee9

Coverage

ProductProtection
Secure EndpointThis has coverage
CloudlockN/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityN/A
StealthwatchN/A
Stealthwatch CloudN/A
Secure Malware AnalyticsThis has coverage
UmbrellaN/A
WSAN/A

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK