Security
Headlines
HeadlinesLatestCVEs

Headline

Threat Roundup for July 29 to August 5

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 29 and Aug. 5. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files. The most prevalent threats highlighted in this roundup are:

Threat Name    Type    Description

Win.Dropper.TrickBot-9958804-0 Dropper TrickBot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts. Win.Ransomware.Cerber-9958814-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension “.cerber,” although in more recent campaigns other file extensions are used. Win.Virus.Xpiro-9958895-1 Virus Expiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks. Win.Dropper.Remcos-9960040-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam and capture screenshots. This malware is commonly delivered through Microsoft Office documents with macros sent as attachments on malicious emails. Win.Dropper.Shiz-9958984-0 Dropper Shiz is a remote access trojan that allows an attacker to access an infected machine to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site. Win.Dropper.HawkEye-9959777-0 Dropper HawkEye is an information-stealing malware that targets usernames and passwords stored by web browsers and mail clients on an infected machine. It is commonly spread via email and can also propagate through removable media. Win.Worm.Kuluoz-9959792-0 Worm Kuluoz, sometimes known as “Asprox,” is a modular remote access trojan that is also known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations. Win.Dropper.DarkComet-9959797-1 Dropper DarkComet and related variants are a family of remote access trojans that provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user’s machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system. Win.Dropper.Ramnit-9960101-0 Dropper Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It can also steal browser cookies and attempts to hide from popular antivirus software.

Threat Breakdown

Win.Dropper.TrickBot-9958804-0

Indicators of Compromise

IOCs collected from dynamic analysis of 46 samples

        Mutexes            Occurrences        
                                 
        5502606391408671395            4            
                 
        32899542343072484998            4            
                 
        1124524871971925691            3            
                 
        24112587554236391103            3            
                 
        39744624822682236206            3            
                 
        23819686304274202058            2            
                 
        31572222973474305701            2            
                 
        38648211142506533958            1            
                 
        33656147683147949452            1            
                 
        7918010151544240523            1            
                 
        38748932962513239244            1            
                     
                                
            
        Domain Names contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        wequinc[.]pl            4            
                 
        patardd[.]pl            4            
                 
        rydedun[.]pl            3            
                 
        boristh[.]pl            3            
                 
        lionopp[.]pl            3            
                 
        matesic[.]pl            2            
                 
        zanouns[.]pl            2            
                 
        beryofn[.]pl            1            
                 
        cabolth[.]pl            1            
                 
        risiert[.]pl            1            
                 
        githyet[.]pl            1            

File Hashes

             01a4f86457a252ffc23117ba653a2093902d0160140a3fda03e3cb9595f6d652              04a8a18b801bf158717c49444c3148f56fb1c23b6781b589106b848fad13557f              04d4ecf05a7bcc6ca0f318bacaa6087ea1e5badc14ca9eebec52aaff791718bc              08a004e94ce71ee0d239e38242283544f530996f4785924f85616040b278bef4              094f5c76889cd9f3f9357d72eda49a962eedc8457a77d586459dbd5968f85aef              0c25f673e25e8c9bb066ae56c41a83e28ef40a9da8327c9f7cd09f663b9a4614              0ef6c2cc035d61abd0f221d2bb8d6c0f5fc1e2e87cd5001f47861435fded326b              12eb4eb5dd38c776ec50166596c5e4ffda47108ce709990ae84a33a3a91776ed              1f14d617fd53588a36cd26c19e6f306fad28bac24140e9083986bb0cac607bc5              2184130eb8a891000fee1e343a5634531d72e05a7893fbafd6d53e52350bae19              23d19c57bacf51421505125da6917c815a1aa0d5c7346cf42c47f6667df0599d              2549d2a70d146340d14d981ecd9c33ce384bc743d4ed258f1eb9740c30792429              26851fc35426f83e70d1542cc4f00a3dd16222de418d2e0727a4ab9d5218c22b              28d1f82ea2f237ae643e442adae17449dadb8ad93397bf2299b0b53abeee45cb              2d05858c463ea267870ff964d9f9779def1ca711586dcfea58745ebe6675ff1f              2d1e5cc0f414d6cc94ec251605c68c32c442740e129d7af97f8293844aecca6a              30636b11d051121251b2051971223e6e294dfaf917338239deb5b8edf5bce20b              39d4446bb6b1c8cbf319fe02f1316897f22a6b00633af1b7e6159dbd7b837556              3a0c89d07193ae260ced7a04873117af0213c43407248d2ff7edf95bd3b32421              3b5e722ae23b3656cfb17fcb9fd218b92c5e4f24c241c3f1c37bded99d92c035              3f32a6229d93292633dc3c9af4dcf7360463cd9fcc72bfc68bfc68afa666316d              4f47c12806778d27afa43905ebb5b2079a451da93237899167d6420333cfe9a8              50543f06717e0d022a4b58043861f0a38ab82e068f07414adc5be142a66c6cec              513125bc77c78f24fc6a29a125c0d5373d5b365f476ba496f90d8dc952fd4441              5584279c960a9a7aeb97ececdb90adc01da3dab0f1fe1cbf8c10e67f14d19c0d              

*See JSON for more IOCs

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                     N/A                                                          
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                     N/A                                                          
             
        WSA                                                                     N/A                                                          

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Ransomware.Cerber-9958814-0

Indicators of Compromise

IOCs collected from dynamic analysis of 16 samples

        Registry Keys            Occurrences        
                             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER                          
        Value Name: Run                            16        
             
    <HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR                          
        Value Name: AutoRun                            16        
             
    <HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}                             16        
             
    <HKCU>\PRINTERS\DEFAULTS                             16        
             
    <HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}                          
        Value Name: Component_01                            16        
             
    <HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}                          
        Value Name: Component_00                            16        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: fc                            2        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: fc                            2        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: ntoskrnl                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: ntoskrnl                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: grpconv                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: grpconv                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: hh                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: hh                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: WerFaultSecure                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: WerFaultSecure                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: javaws                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: javaws                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: at                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: at                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: Dism                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: Dism                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: sc                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: sc                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: expand                            1        
                     
                
            
        Mutexes            Occurrences        
                                 
        shell.{381828AA-8B28-3374-1B67-35680555C5EF}            16            
                     
                         
            
        IP Addresses contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        85[.]93[.]0[.]4            16            
                 
        85[.]93[.]0[.]118            16            
                 
        85[.]93[.]0[.]2/31            16            
                 
        85[.]93[.]0[.]92/30            16            
                 
        85[.]93[.]0[.]96/28            16            
                 
        85[.]93[.]0[.]112/30            16            
                 
        85[.]93[.]0[.]116/31            16            
                 
        85[.]93[.]3[.]224/27            16            
                 
        85[.]93[.]4[.]0/25            16            
                 
        85[.]93[.]4[.]128/26            16            
                 
        85[.]93[.]4[.]192/27            16            
                 
        85[.]93[.]4[.]224/29            16            
                 
        85[.]93[.]4[.]232/30            16            
                 
        85[.]93[.]4[.]236/31            16            
                 
        85[.]93[.]39[.]8/29            16            
                 
        85[.]93[.]39[.]16/28            16            
                 
        85[.]93[.]39[.]32/27            16            
                 
        85[.]93[.]39[.]64/26            16            
                 
        85[.]93[.]39[.]128/25            16            
                 
        85[.]93[.]40[.]0/21            16            
                 
        85[.]93[.]48[.]0/24            16            
                 
        85[.]93[.]49[.]0/25            16            
                 
        85[.]93[.]49[.]128/28            16            
                 
        85[.]93[.]49[.]144/31            16            
                     
                                 
            
        Files and or directories created            Occurrences        
                                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}            16            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\fc.lnk            2            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\fc.exe            2            
                 
        %System32%\Tasks\fc            2            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\ntoskrnl.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\ntoskrnl.exe            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\WerFaultSecure.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\WerFaultSecure.exe            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\ndadmin.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\ndadmin.exe            1            
                 
        %System32%\Tasks\ndadmin            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\grpconv.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\grpconv.exe            1            
                 
        %System32%\Tasks\grpconv            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\sdchange.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\sdchange.exe            1            
                 
        %System32%\Tasks\sdchange            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\at.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\at.exe            1            
                 
        %System32%\Tasks\at            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\hh.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\hh.exe            1            
                 
        %System32%\Tasks\hh            1            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\javaws.lnk            1            
                 
        %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\javaws.exe            1            

*See JSON for more IOCs

File Hashes

             13cb0416ecaedac2d05c117c68d7745d2f2ef8d2e41a5522ae28a9fdbe1cc464              18e9f9e0f0584b662165a2c78ca155ec06b59f48bfb09655929aaf6e4d3e04b6              273e649cfa2dba65d23094955a8901b2d8bcabd9d883eb53db97da09b2dc7257              37ce9b3d448b8d7ced3c71deebe8a826aa27095d155bbb08f5fe945edcaa665d              396c12c17e7de26873a87c37724b30ebeee8a246cb9f4dd8c81c4eb28e5a36ec              62e12d7f62c7c9826d8b20334d6bf5a9b9367cc92735c4c0ee0b9b04c68ebb30              636bb6784c21658f113ea4dcc00a82f0aa2c1e68927f3bb398d57ab5fcb6bc53              7017f1de73c8949efa7b04eb9973d73b712af738d2faf268cf32be7dea92b136              73fd26b7ee1d7939a55ee17a0ea15fc4a3aa85d417f9d19ec33230e71d21ac11              80574eb815087be8ead2c679474b8cf100a5a4db41cd3e012eff0c3e50ed900a              910aad5d8e14a47c2882531c587ceb7836af31e2c09296c43877a3ed2cc044e6              a340be1e9fe2140662c6bb04f1280eb91b1b1b1bd76c8e484ab4058ff25d5cf3              c41250c29a915060c509cb390c8dac68029067c1537707742ed211866ae2bff4              caba5cbc3931965b5f478934e02d20775413e15bcc559a684c632cfa9b151583              f6c4639bcabd34e8b2e9cf8323e07416a11bc4d579b910405880a8950128cfb1              fc73adec96749e88de8fb29777f1b4c27439c24690236857576076f545c8deb5              

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                                                                              
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                     N/A                                                          
             
        WSA                                                                     N/A                                                          

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Virus.Xpiro-9958895-1

Indicators of Compromise

IOCs collected from dynamic analysis of 37 samples

        Registry Keys            Occurrences        
                             
    <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER                          
        Value Name: HideSCAHealth                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT                          
        Value Name: Type                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT                          
        Value Name: Start                            37        
             
    <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM                          
        Value Name: EnableSmartScreen                            37        
             
    <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER\SVC\S-1-5-21-2580483871-590521980-3826313501-500                             37        
             
    <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER\SVC\S-1-5-21-2580483871-590521980-3826313501-500                          
        Value Name: EnableNotifications                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32                          
        Value Name: Start                            37        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64                          
        Value Name: Start                            37        
             
    <HKLM>\SOFTWARE\MICROSOFT\.NETFRAMEWORK\V2.0.50727\NGENSERVICE\STATE                          
        Value Name: AccumulatedWaitIdleTime                            37        
             
    <HKLM>\SOFTWARE\MICROSOFT\.NETFRAMEWORK\V2.0.50727\NGENSERVICE\LISTENEDSTATE                          
        Value Name: RootstoreDirty                            37        
             
    <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\.NETFRAMEWORK\V2.0.50727\NGENSERVICE\STATE                          
        Value Name: AccumulatedWaitIdleTime                            37        
                     
                
            
        Mutexes            Occurrences        
                                 
        kkq-vx_mtx61            37            
                 
        kkq-vx_mtx62            37            
                 
        kkq-vx_mtx63            37            
                 
        kkq-vx_mtx64            37            
                 
        kkq-vx_mtx65            37            
                 
        kkq-vx_mtx66            37            
                 
        kkq-vx_mtx67            37            
                 
        kkq-vx_mtx68            37            
                 
        kkq-vx_mtx69            37            
                 
        kkq-vx_mtx70            37            
                 
        kkq-vx_mtx71            37            
                 
        kkq-vx_mtx72            37            
                 
        kkq-vx_mtx73            37            
                 
        kkq-vx_mtx74            37            
                 
        kkq-vx_mtx75            37            
                 
        kkq-vx_mtx76            37            
                 
        kkq-vx_mtx77            37            
                 
        kkq-vx_mtx78            37            
                 
        kkq-vx_mtx79            37            
                 
        kkq-vx_mtx80            37            
                 
        kkq-vx_mtx81            37            
                 
        kkq-vx_mtx82            37            
                 
        kkq-vx_mtx83            37            
                 
        kkq-vx_mtx84            37            
                 
        kkq-vx_mtx85            37            

*See JSON for more IOCs

        Files and or directories created            Occurrences        
                                 
        %CommonProgramFiles%\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE            37            
                 
        %CommonProgramFiles(x86)%\microsoft shared\Source Engine\OSE.EXE            37            
                 
        %ProgramFiles(x86)%\Microsoft Office\Office14\GROOVE.EXE            37            
                 
        %ProgramFiles(x86)%\Mozilla Maintenance Service\maintenanceservice.exe            37            
                 
        %SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe            37            
                 
        %SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe            37            
                 
        %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe            37            
                 
        %SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe            37            
                 
        %System32%\FXSSVC.exe            37            
                 
        %System32%\UI0Detect.exe            37            
                 
        %System32%\alg.exe            37            
                 
        %System32%\dllhost.exe            37            
                 
        %System32%\ieetwcollector.exe            37            
                 
        %System32%\msdtc.exe            37            
                 
        %System32%\msiexec.exe            37            
                 
        %System32%\snmptrap.exe            37            
                 
        %System32%\sppsvc.exe            37            
                 
        %System32%\vds.exe            37            
                 
        %SystemRoot%\ehome\ehrecvr.exe            37            
                 
        %SystemRoot%\ehome\ehsched.exe            37            
                 
        %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.log            37            
                 
        %SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log            37            
                 
        %SystemRoot%\SysWOW64\dllhost.exe            37            
                 
        %SystemRoot%\SysWOW64\msiexec.exe            37            
                 
        %SystemRoot%\SysWOW64\svchost.exe            37            

*See JSON for more IOCs

File Hashes

             013aa31a250e2858846c6f078e12a5132abbc0fad271365d3b67527fa2c2f402              05c2e245c5f3a325472cf34f42093931e48d181c0f17caf9add2b35e7a3e828c              0aee33737e3213c74bb671a1ab7b9485e00ade57ade144e2be354f67506a7290              0af8855eff016554c3ddf0ce82bb61859ac3986ee4136ee06e7fe5d5a6d89788              0ca2f5ca6ce21bacf1b26601c214a36766a0c911320bec0c184b5a18923ece23              128d57cca2eae54f5754a5f1730a05df82d942a11764d0595e6c920498e9565f              1397eff74a13595ea3fcb206a76977d1447997680fdf81163c2b985a009b080c              13dd82a41add2789b1ea617cded11cf9bdbc143082372dcc2b26b2ae2616dbba              14e5e9016d589d815058b09845af3b2fc2781b9815a493499664f29e9832e9fa              16fcdd9f0950eda4799c80afd354767feefb725c58d82022c2d1385e25d48e96              1b0665bd149dd3b9ae9a3b19c7be06b5ddcd53da461f91cda65365b94b7a288b              1cf200ce049a09ea6f18ff56f65c651d519d6096d6eaf94331351c1217d2e002              1f98e6f12d028379751c4e5f6efe96e0fe8a286c7448513dda93c980e3d8acf6              26bd53dc56ec5c20627d67c8bdce2f67c3325bd6421a87319e3694abcf73867e              28664a444ff8d844816b801fcf92199100cad7375ebaedea96020b2f7e2c664b              290be865ff04b744f3f34e17cded589f11519cb10d5d186535cd5a21de8dd650              29e70dc26eb00d9ff16ed8864b2583dde97e70d6f7dc074c50f3665ad7f8b2dc              2c52d85ad0e41acf5112bccbbdde281950692c0e100e499a15b170d66d0154d0              30ed57cfe6626a3e05de88be3207d4524311c62a6a2b5647f9359a620ed22f11              3134096945a4cea5132ea9d0ad9b1a6925da40d2d4e86c8f8c8f4d3795b962ca              35f44b47ad1e072f2030291462cedd654234eb0575883ae8f8d5978c051d78e1              35fcd428c89e9586460cb2701ca4cb378824a32d497366a96fa234caf54d8048              3c8477fdcd2719855d6b38cf29849d36dca6bf90805f996286bf77fff7ba1fa3              3eb5cdb190ee1efbea012512c3ed6afd6215473bf208a1853f37701a3f7ba13a              3f53b25ccced470ef2b1eb2edb4b839099a0ca597f4dbcc3aa590b260d727ab0              

*See JSON for more IOCs

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                     N/A                                                          
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                     N/A                                                          
             
        WSA                                                                     N/A                                                          

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Remcos-9960040-0

Indicators of Compromise

IOCs collected from dynamic analysis of 21 samples

        Registry Keys            Occurrences        
                             
    <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E                          
        Value Name: LanguageList                            7        
             
    <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}                          
        Value Name: FaviconPath                            2        
             
    <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}                          
        Value Name: Deleted                            2        
             
    <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES                          
        Value Name: DefaultScope                            2        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}                             2        
             
    <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVED EXTENSIONS                          
        Value Name: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43}                            2        
             
    <HKCU>\SOFTWARE\REMCOS-SFLVDU                          
        Value Name: licence                            1        
             
    <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E                          
        Value Name: @C:\Windows\system32\DeviceCenter.dll,-2000                            1        
             
    <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E                          
        Value Name: @explorer.exe,-7001                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: mea                            1        
             
    <HKCU>\SOFTWARE\REMCOS-SFLVDU                             1        
             
    <HKCU>\SOFTWARE\REMCOS-SFLVDU                          
        Value Name: exepath                            1        
             
    <HKCU>\SOFTWARE\REMCOS-1MSE40                             1        
             
    <HKCU>\SOFTWARE\REMCOS-1MSE40                          
        Value Name: exepath                            1        
             
    <HKCU>\SOFTWARE\REMCOS-1MSE40                          
        Value Name: licence                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: Un9                            1        
             
    <HKCU>\SOFTWARE\REMCOS-A21G8J                             1        
             
    <HKCU>\SOFTWARE\REMCOS-A21G8J                          
        Value Name: exepath                            1        
             
    <HKCU>\SOFTWARE\REMCOS-A21G8J                          
        Value Name: licence                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: re                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE                          
        Value Name: dr                            1        
                     
                
            
        Mutexes            Occurrences        
                                 
        Remcos_Mutex_Inj            3            
                 
        Local\55C37268-60E9-964A-3299-E2046F3CC613            2            
                 
        Remcos-SFLVDU            1            
                 
        Remcos-1MSE40            1            
                 
        Remcos-A21G8J            1            
                     
                         
            
        IP Addresses contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        13[.]225[.]214[.]71            4            
                 
        13[.]225[.]214[.]108            4            
                 
        37[.]19[.]193[.]217            3            
                 
        95[.]211[.]75[.]16            2            
                 
        162[.]210[.]195[.]111            1            
                 
        13[.]225[.]214[.]91            1            
                     
                          
            
        Domain Names contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        piloresi[.]top            7            
                 
        dioneras[.]top            7            
                 
        downloadmirror[.]intel[.]com            5            
                 
        uniresio[.]top            4            
                 
        emperimen[.]com            3            
                 
        www[.]bing[.]com            2            
                 
        busyboydesign[.]xyz            2            
                 
        toptoptop2[.]site            1            
                 
        toptoptop3[.]site            1            
                 
        toptoptop3[.]online            1            
                 
        toptoptop2[.]online            1            
                 
        lutheatre[.]com            1            
                 
        fallium[.]com            1            
                 
        sheaffic[.]com            1            
                     
                          
            
        Files and or directories created            Occurrences        
                                 
        %SystemRoot%\win.ini            21            
                 
        %LOCALAPPDATA%\Administrator            8            
                 
        %HOMEPATH%\kmm            1            
                 
        %HOMEPATH%\kmm\Cam.exe            1            
                 
        %HOMEPATH%\kmm\Cam.vbs            1            
                 
        %HOMEPATH%\Dul\Slu6.exe            1            
                 
        %HOMEPATH%\Dul\Slu6.vbs            1            
                 
        %HOMEPATH%\Dul            1            
                 
        %HOMEPATH%\Uds            1            
                 
        %HOMEPATH%\Uds\sov.exe            1            
                 
        %HOMEPATH%\Uds\sov.vbs            1            
                 
        %HOMEPATH%\Sv9            1            
                 
        %HOMEPATH%\Sv9\BUT.exe            1            
                 
        %HOMEPATH%\Sv9\BUT.vbs            1            
                 
        %HOMEPATH%\ref            1            
                 
        %HOMEPATH%\ref\Bar.exe            1            
                 
        %HOMEPATH%\ref\Bar.vbs            1            
                 
        %HOMEPATH%\ma\No.exe            1            
                 
        %HOMEPATH%\ma\No.vbs            1            
                 
        %HOMEPATH%\ma            1            
                 
        %HOMEPATH%\Oxy\Bru4.exe            1            
                 
        %HOMEPATH%\Oxy\Bru4.vbs            1            
                 
        %HOMEPATH%\tr\TEL.exe            1            
                 
        %HOMEPATH%\tr\TEL.vbs            1            
                 
        %HOMEPATH%\Oxy            1            

*See JSON for more IOCs

File Hashes

             1990701e4db9f573be94dbfd0e9edcb826c4a0ba858b42249812acb12cea572f              201ecff5a0b06b1401158972176bf3af310e1a25a9f603ea902b340f15262130              667fcc41313580c1c5dd3f74e84f13a4431a8b1daf4e1c60d5f3ab0c657e95ef              6754bcad108371e4192bc126187cf7ac07c39ea3f5ed7d975402a4c20d7fbcd4              68183c5baad715853bf2a38a2384288803a431ef4881be8c33b473f7e97d0186              6f70b508bcf39a1de4371f080c51bbf569ff5be7bf0f91793519c3c511710386              72d305998919d0c14d44659c0427e1130b9cf6539f386d328879c7d416ac085a              7cbbe9909fc023294a209ecf1b3882a02cb198d6841a129471201ce105c10d7f              905d2ba08aa3c839dfb815a373c5e2d0ae71badcbb1a70be1ef2683381dcb257              96eba5d5846bbcb803ffbac64ea5adf52fcb736ebda11abd466d509314dcc216              c2bfc250e5a0f8047d8eeb2bab36669e2d20becf57ddfa1e0ff5c33ff63864d5              cad62477913555b37902a162c9b437af27182fb219aa14647f257a0c48ddd556              d2a181619dc5bce7506d65bd893b411772de00c9ffdcbbcb9e3a78ab029a4997              d6e619e7f6f7578cef21ad4bea1ed94f397c0063aee69df329bc0aab3ea0b177              d9f6c0ffc135785c9c0355bad4cc4b8884f6f655c6e336c14b1b7a27568ddda9              dcd1f707b263fe1c37b94944b8399d92675d215d76aca304f0c7455250627d68              e9877a7c8d2daca6b15131b26a583695e4d5e2c05023b764f24a551666055b0a              f22c91af53fd11dae4ebeeca1886c5a3355f68970cb554be7eb10affbb547341              f57f13ef3d153621588b9aa9a273e08a77069dd2b9b7d5ad08c579f24feedc41              f7ac5679a471bbc48cb5af2fd54ea2e4621f7e825c06fba59a1690fa6745e56f              fd4de71e56062003053b8f93f6bb84188666361a07c415e56a4b015802237289              

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                                                                              
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                                                                              
             
        WSA                                                                                                                              

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Shiz-9958984-0

Indicators of Compromise

IOCs collected from dynamic analysis of 88 samples

        Registry Keys            Occurrences        
                             
    <HKLM>\SOFTWARE\MICROSOFT                          
        Value Name: 67497551a                            33        
             
    <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON                          
        Value Name: 98b68e3c                            33        
             
    <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON                          
        Value Name: userinit                            33        
             
    <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON                          
        Value Name: System                            33        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS                          
        Value Name: load                            33        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS                          
        Value Name: run                            33        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: userinit                            33        
                     
                
            
        Mutexes            Occurrences        
                                 
        Global\674972E3a            33            
                 
        Global\MicrosoftSysenterGate7            33            
                 
        internal_wutex_0x000000e0            33            
                 
        internal_wutex_0x0000038c            33            
                 
        internal_wutex_0x00000448            33            
                 
        internal_wutex_0x<random, matching [0-9a-f]{8}>            29            
                 
        internal_wutex_0x000007d0            12            
                     
                         
            
        IP Addresses contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        13[.]107[.]21[.]200            16            
                 
        45[.]33[.]23[.]183            9            
                 
        96[.]126[.]123[.]244            8            
                 
        198[.]58[.]118[.]167            7            
                 
        45[.]56[.]79[.]23            6            
                 
        45[.]33[.]30[.]197            6            
                 
        45[.]79[.]19[.]196            5            
                 
        173[.]255[.]194[.]134            5            
                 
        72[.]14[.]178[.]174            5            
                 
        72[.]14[.]185[.]43            4            
                 
        45[.]33[.]2[.]79            3            
                 
        45[.]33[.]18[.]44            3            
                 
        45[.]33[.]20[.]235            2            
                 
        85[.]94[.]194[.]169            1            
                     
                          
            
        Domain Names contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        fodakyhijyv[.]eu            33            
                 
        qekusagigyz[.]eu            33            
                 
        maxyjofytyt[.]eu            33            
                 
        xudylenyrob[.]eu            33            
                 
        pufepepazyd[.]eu            33            
                 
        vopibycywow[.]eu            33            
                 
        fotoxysupyd[.]eu            33            
                 
        gaqehysohec[.]eu            33            
                 
        lyxaxududes[.]eu            33            
                 
        rycovuvutiq[.]eu            33            
                 
        kevimudyqec[.]eu            33            
                 
        jewidonevin[.]eu            33            
                 
        tulekuvigij[.]eu            33            
                 
        vocupotusyz[.]eu            33            
                 
        galavozaxog[.]eu            33            
                 
        divufozutog[.]eu            33            
                 
        kefidaxupif[.]eu            33            
                 
        jejykaxymob[.]eu            33            
                 
        xutevexecif[.]eu            33            
                 
        puryxepenek[.]eu            33            
                 
        lysowaxojib[.]eu            33            
                 
        dimigesupew[.]eu            33            
                 
        fobatesohek[.]eu            33            
                 
        ryhadyvigis[.]eu            33            
                 
        qekikyvutic[.]eu            33            

*See JSON for more IOCs

        Files and or directories created            Occurrences        
                                 
        %TEMP%\<random, matching [A-F0-9]{1,4}>.tmp            33            

File Hashes

             0426a2801b985679944d7956d57df0c195e4871cb5fa9ae5d3cb864600883613              06748264e401a4fcf30a802df0f390a75a14a3ff6148b8f064ee3e2585c742d9              09bf6eb80568c5d370d52e77ca1eddea41f0eb7e458549c994620b3e6af3967c              0affbf8c7691eaaab70491418b6db92cced36ff4a0a482673a4ebdd5492ad6c8              0fbe21b7ff8392a707d0d871494c2298e88e723ebcd7a4495c6a037232d4899b              11b3839df1c31d6c2f15591a0fa013c8b41862dd522d106c85876b49e7d561c0              11b6cfd9b8f56c8107511151282335f7b5f5d555665bec7506908515dcb6acab              11c19ec5a341f6a6bfa86170ea383439466f008ff42ec6dc04bd0445a658ba63              1641e6a92c47304c11521b9c875029a387e49b511438b3ac4c122ee7b14519de              1cac14ca2ad5715132446d1bb0503a6f783577d15f8fb97611dac9b7177903cc              1f4e2901cf95c9ca682d9e5c24235c11da57a47153969203e58b5528bd37b411              1f83440aab9dc62a6c4726b35ee58355b1cf76d23d194250397069423b17d281              237bf6bd91b6301dd01456859507771ed5fc2eda62f67e207bea6928f69573b9              253dc24fa6384c2c2757acc74ecfb88a231ab434c718e5b044a47e3fec4515f7              25525b728590f243275c528727c4887c3521fc16c25f60e3b364fb21e8b64dab              2553d02ff7f59fc5e0830783a508b4a5e8daff585bb4e5411c49bb34217f1b3d              259d0e1eb7a6ab82cfef210054b7cedd069d331455d6c0effff450c514fef6b1              2796098904f867adffd735f528461e5fb8be9f33ebd22bc37fb58684c3476112              27de5dc0ae67097bc22a0bcb3381dcebc372c469c4b8effe2b83d87f85f01cc1              2a6f60367dc3d70d2db9926e28dba4d79f20e319ceaf839c094cf85c9850c99a              2c729b76866357b2fae9d51f4d5f69c1554b18b5be35f896300631b7409e49e7              319155806bbb3e74cc753ed768a13455965e1fa7a175155f5862c2e030c2e35a              34b2879998dfd238977cf19e5f4e3d4cbccfa61a9b0688e43a569e19a75a2844              3578be24b2fe30600747846c30c1e286622e1906fce1a801e10b87117bf37ef4              385ddefdb0c298b4cd194b165f82e9ddec8c8e6616160e432125e576dae5603c              

*See JSON for more IOCs

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                                                                              
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                                                                              
             
        WSA                                                                                                                              

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.HawkEye-9959777-0

Indicators of Compromise

IOCs collected from dynamic analysis of 15 samples

        Registry Keys            Occurrences        
                             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED                          
        Value Name: Hidden                            11        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: Windows Update                            10        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON                          
        Value Name: Shell                            5        
             
    <HKCU>\SOFTWARE\[email protected]                             3        
             
    <HKCU>\SOFTWARE\[email protected]                          
        Value Name: NewIdentification                            3        
             
    <HKCU>\SOFTWARE\[email protected]                          
        Value Name: NewGroup                            3        
             
    <HKCU>\SOFTWARE\[email protected]                          
        Value Name: FirstExecution                            3        
                     
                
            
        Mutexes            Occurrences        
                                 
        <random, matching '[A-Z0-9]{14}'>            4            
                 
        X43238C48CI4NY_SAIR            1            
                 
        M21V21V8G7Q66R_SAIR            1            
                 
        05V015TT37XDUJ_SAIR            1            
                 
        Global\07657600-129e-11ed-9660-0015174b6151            1            
                     
                         
            
        IP Addresses contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        104[.]16[.]155[.]36            6            
                 
        104[.]16[.]154[.]36            5            
                 
        77[.]88[.]21[.]158            2            
                 
        142[.]251[.]16[.]109            2            
                 
        208[.]91[.]199[.]224            1            
                 
        208[.]91[.]198[.]143            1            
                 
        208[.]91[.]199[.]223            1            
                 
        192[.]99[.]212[.]64            1            
                     
                          
            
        Domain Names contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        whatismyipaddress[.]com            11            
                 
        kalashas[.]no-ip[.]biz            3            
                 
        smtp[.]gmail[.]com            2            
                 
        smtp[.]yandex[.]ru            2            
                 
        mail[.]siliconsss[.]com            2            
                 
        smtp[.]impexservicesindia[.]com            2            
                 
        smtp[.]vsnl[.]net            1            
                 
        smtp[.]thanawalagroup[.]net            1            
                     
                          
            
        Files and or directories created            Occurrences        
                                 
        %APPDATA%\pid.txt            11            
                 
        %APPDATA%\pidloc.txt            11            
                 
        %TEMP%\holdermail.txt            10            
                 
        %APPDATA%\WindowsUpdate.exe            10            
                 
        \Sys.exe            3            
                 
        \autorun.inf            3            
                 
        E:\autorun.inf            3            
                 
        %TEMP%\Administrator7            3            
                 
        %TEMP%\Administrator8            3            
                 
        %TEMP%\Administrator2.txt            3            
                 
        \directory            3            
                 
        \directory\CyberGate            3            
                 
        \directory\CyberGate\install            3            
                 
        \directory\CyberGate\install\server.exe            3            
                 
        %APPDATA%\Administratorlog.dat            3            
                 
        %TEMP%\SysInfo.txt            3            
                 
        %APPDATA%\Windows Update.exe            3            
                 
        E:\Sys.exe            3            
                 
        %System32%\drivers\etc\hosts            1            
                 
        %TEMP%\oUK6NMZIZls5Ku6i.exe            1            
                 
        %APPDATA%\6tOsSNNvNp7JOgxS            1            
                 
        %APPDATA%\g3h44Njnele2nJzi            1            
                 
        %APPDATA%\g3h44Njnele2nJzi\ZOqlaWVQEXMz.exe            1            
                 
        %APPDATA%\6tOsSNNvNp7JOgxS\ChSV1JzLaHOS.exe            1            
                 
        %APPDATA%\hAtRUbl2c5ywfar3            1            

*See JSON for more IOCs

File Hashes

             04e516d05c22e5489ba47b5e1bd03f6cb8bcf2b084e2b3dae23acbe25d4b4591              21e52c431fce5ea651800127be440f447fafd20c3d74f34b0d712e140b0c138d              21e949c72bc90a7b4647b305dd306e343f732ad2b898dba5e9b920edc33fc9a0              220c6f3ffe28c8c7cd3f3b669b47bccdde30b200ab1de9bd0cca55c475ad62cb              2f656303daecf2322749ed2a4b69b7124433dfea94d658c9e1e18d415db16456              32a841f8eaf7fa85d3c78469a9890988c1c9b90c97cfba674ac8f9f991bd3a94              4000b5bce992bdbdd73174fbe1e8d9b0fd65ad6c88f282889a8604dfa9fe0f59              5291c5d0bd7eaee2402fb660be1b8501c3a712471e9d66062b6728794909263a              5393c5a558225a02a03ee8ea46968d53a72b57194261e17dc7e35f0bd9b630ea              628eb845ab8309303d0ebb7448063dbafd36954a66596977a272d5806cacaeca              656d25151b846944e11c7ba03ce4fae066f7a8c29cdce84d0b241d4305a4245c              6d155125192252b756c6af33bca25810ab9a19be347e5793b534802662eb00a4              9a8797b6c2753e70ce0888185473510f40d3c0ff45b81b639dc8c077cb3679ec              ad52ce9456cb87f713ad43de89835e0c882fd3a77389bb41ab50396efd59088a              c4bf7dbe799d71e8e16c1aa5ca3f3af04f174b91e1a357a02e38b0155a46a600              

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                                                                              
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                                                                              
             
        WSA                                                                                                                              

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Worm.Kuluoz-9959792-0

Indicators of Compromise

IOCs collected from dynamic analysis of 26 samples

        Registry Keys            Occurrences        
                             
    <HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'>                             26        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: uecguckk                            1        
             
    <HKCU>\SOFTWARE\AEAKVJGE                          
        Value Name: ujaduqcw                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: cuhmadmx                            1        
             
    <HKCU>\SOFTWARE\UDVFKDFC                          
        Value Name: vdqcxwxs                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: lhelwsfg                            1        
             
    <HKCU>\SOFTWARE\SFLQPFKG                          
        Value Name: pvgxfqel                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: wrbmmivh                            1        
             
    <HKCU>\SOFTWARE\SMXPKGUG                          
        Value Name: cdjmiong                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: agokwqgv                            1        
             
    <HKCU>\SOFTWARE\NGWWUMBN                          
        Value Name: fpesjwgk                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: bomrkrmk                            1        
             
    <HKCU>\SOFTWARE\LSCPUEQM                          
        Value Name: lsekxadg                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: bxvvsgvr                            1        
             
    <HKCU>\SOFTWARE\HIDBXWKK                          
        Value Name: wudcreed                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: snwmmmvf                            1        
             
    <HKCU>\SOFTWARE\TCUDAEVA                          
        Value Name: dfvkflcs                            1        
             
    <HKCU>\SOFTWARE\MNQGHNOP                          
        Value Name: dlirvvqw                            1        
             
    <HKCU>\SOFTWARE\MNFTGNBG                          
        Value Name: csfqppjx                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: imcfhgpa                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: oqpeifcm                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: lhxptbjv                            1        
             
    <HKCU>\SOFTWARE\HQMHIWJP                          
        Value Name: durqeakc                            1        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: hsrhcrvj                            1        
             
    <HKCU>\SOFTWARE\CGOEUIAE                          
        Value Name: htpvdufk                            1        
                     
                
            
        Mutexes            Occurrences        
                                 
        2GVWNQJz1            26            
                     
                         
            
        IP Addresses contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        173[.]203[.]97[.]13            15            
                 
        76[.]74[.]184[.]127            13            
                 
        37[.]59[.]82[.]218            13            
                 
        94[.]32[.]67[.]214            13            
                 
        212[.]45[.]17[.]15            13            
                 
        142[.]4[.]60[.]242            13            
                 
        50[.]57[.]139[.]41            12            
                 
        82[.]150[.]199[.]140            12            
                 
        92[.]240[.]232[.]232            10            
                 
        113[.]53[.]247[.]147            10            
                 
        203[.]157[.]142[.]2            9            
                 
        176[.]31[.]181[.]76            9            
                 
        188[.]165[.]192[.]116            7            
                     
                                 
            
        Files and or directories created            Occurrences        
                                 
        %LOCALAPPDATA%\<random, matching '[a-z]{8}'>.exe            26            

File Hashes

             01d6c50b70eb28d693e74b7ad15158707b8f57a9711e35c07d3d1c4ee7f630ee              08c25287e368a2158b029684e74626ba867a606837cce07ea2837b6ed78857a4              09bb26d956e0eb8aba714e836c041d844ac01eb4ccb3e498382c07ae3e267ff4              0bf1e31c2a0fe232876deef8bad8cbe1e08a3ad377db920ffc27c4852ef1dc89              0c6ec5510575da4416321eb58b20d3e447746e0cea1ffd06241f8a1e6bbb2837              0dd0361ead8f0e962be7a115dd8a4fa9d1a12b88c11633f82cfeae655a59f809              0fb3d456de4717b29c3a332e29a10cc9c52c94c92f6438f32791f5a5785b603b              1052ac160c67084f7dae6af5d9ee545fb0df20b99b8e989177ffb795a32aa35c              192d087160aad1afdb5ed06eb4128d997e578af554a626887746d91e66bc688a              1f4a448e60174255ef3d7492e60464ef4cfd84f65acb8c9824493b71d6864b8f              1f7810a638c2f1825276f2784cf557d7610ca0eabb463d06e6b25597fd077043              230a54a47fed1921adb452b5e88f1467e021dd85aac8f0d60a5a41912b991d28              26cad8fc0603c849db06f59e46b452bb4c3fe5cadfd46e344ce9a7f10365ddb8              276bb12ea62aa7f7ffce0531b84bbe1f7f2e6a19f4150ca6a7b1c69f4662b595              286bc1cee4c188350c8bb50812e30f7bec0b794efca5a2eb0b12368b479211b3              2938109eee69fe708fa15752e0723d110a01ee4e3e1e804cc97bbde01267fdb8              2a850531aeb725e5f138b9b1158640fe41c05a25560e2550fa2b070d96490a8e              31266599481409d70b317821d5af1aea693e7c1c7cedd04fd5dec0008bd816a7              384b51772d288e63038e146446e6e84b1f737cd3d8d34c3871d875fda77ff29a              38e1edffa779f9e2dd16104c35fc7a6c4a21dff7f3ad9bc8233b5817e8666441              3949d166ce5f75648fcb66ea3f9aaf251aa9847d576aef7d10b2830a295e2096              3ffee22fa7f00e260b92385c8cda56eee17c133b7c47cb33cf701d0c9e2ae89e              419c33660b59de42d150f8c1163873db94fa59e8d684bb44d0ec866eaebd00a7              441c34ba7b9ee2d7b0506013a2fb9fd5c5b517d38a66e1228edf4d7e1e20b9e8              446d8276a7008c24317b101c5d7050da5f1a51301a47842cd35f5d8a362eee83              

*See JSON for more IOCs

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                     N/A                                                          
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                     N/A                                                          
             
        WSA                                                                     N/A                                                          

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.DarkComet-9959797-1

Indicators of Compromise

IOCs collected from dynamic analysis of 11 samples

        Registry Keys            Occurrences        
                             
    <HKCU>\SOFTWARE\DC3_FEXEC                             11        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM                          
        Value Name: EnableLUA                            11        
             
    <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER                          
        Value Name: AntiVirusDisableNotify                            11        
             
    <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON                          
        Value Name: UserInit                            11        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: MicroUpdate                            11        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM                             11        
             
    <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E                          
        Value Name: LanguageList                            11        
                     
                
            
        Mutexes            Occurrences        
                                 
        DCPERSFWBP            11            
                 
        DC_MUTEX-01SYFCM            11            
                     
                                
            
        Domain Names contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        zapto666[.]zapto[.]org            11            
                 
        sildelanoe2[.]zapto[.]org            11            
                     
                          
            
        Files and or directories created            Occurrences        
                                 
        %ProgramData%\Microsoft\Windows\Start Menu\Programs\MSDCSC            11            
                 
        %ProgramData%\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsc.exe            11            

File Hashes

             236c360d988e5b28b1a4eee229d0f3b5baa203043fc5ae8f016519f753e6b6bf              27990599b2e3ae192d5a897ed30cb98a20eae1d3ed8506dac8d82fef9ed9442e              53cd48d7d092d55fdc35966cfbd01861bf7304f9dc694237d322ff189adb32a4              55754ae53d9555a67d25be9cd73b5d85141d4ef43cd55ae2cf237be1cfa0d965              5dcd64134e33496cdd5ad13012b35834164d59d470a17359710a335469fdf35a              6e0d5bd7c55c9ec287377f8cadd342768c887a8901d015253996112442ff5d6f              a53ebd4f480bdf3cf2199692af1d27c2864fc5c038fefed214688416cc2a1066              acaf2d6a74e24b2ab85338fa62efc85d76f6ec9c1cd11657230d975fd0dcde42              c4c677ab5115a0a568d1817528005ad24d0dc06ddd9d738d5f1fb75a3074b3f0              d2e83abd3d779b825e4088f53b43aa8521131a9ebd0dad8006e70fcc0e249e8d              eea1adee202040b2c06dfb226eacd4c662b57714f44ffcc0561ff8cb2ec2a6d6              

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                     N/A                                                          
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                     N/A                                                          
             
        WSA                                                                     N/A                                                          

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Ramnit-9960101-0

Indicators of Compromise

IOCs collected from dynamic analysis of 15 samples

        Registry Keys            Occurrences        
                             
    <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM                          
        Value Name: EnableLUA                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT                          
        Value Name: AlternateShell                            15        
             
    <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON                          
        Value Name: Userinit                            15        
             
    <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN                          
        Value Name: WlkSgauv                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: Type                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: ErrorControl                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: ImagePath                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: DisplayName                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: WOW64                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: DeleteFlag                            15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                             15        
             
    <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE                          
        Value Name: Start                            15        
                     
                
            
        Mutexes            Occurrences        
                                 
        {79345B6A-421F-2958-EA08-07396ADB9E27}            15            
                 
        {7934684F-421F-2958-EA08-07396ADB9E27}            15            
                 
        {7934723B-421F-2958-EA08-07396ADB9E27}            15            
                 
        {7934684E-421F-2958-EA08-07396ADB9E27}            15            
                 
        {<random GUID>}            15            
                     
                         
            
        IP Addresses contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        82[.]112[.]184[.]197            15            
                 
        72[.]26[.]218[.]70            15            
                 
        195[.]201[.]179[.]207            15            
                 
        208[.]100[.]26[.]245            15            
                 
        35[.]205[.]61[.]67            15            
                 
        142[.]250[.]80[.]14            15            
                 
        75[.]2[.]18[.]233            15            
                 
        172[.]105[.]157[.]192            15            
                 
        46[.]165[.]220[.]150            15            
                     
                          
            
        Domain Names contacted by malware. Does not indicate maliciousness            Occurrences        
                                 
        kbadlfpgtec[.]com            15            
                 
        ymcwineqkj[.]com            15            
                 
        tupexbvpmsc[.]com            15            
                 
        mwsjitqbf[.]com            15            
                 
        ccsnpnqxii[.]com            15            
                 
        dpdadshi[.]com            15            
                 
        eljmrnwualb[.]com            15            
                 
        hjxrksvo[.]com            15            
                 
        lfnjosunfd[.]com            15            
                 
        paoxlrmbg[.]com            15            
                 
        qekgxfrk[.]com            15            
                 
        uhjwxipj[.]com            15            
                 
        mkmngqxwk[.]com            15            
                 
        ybmhumhymqj[.]com            15            
                 
        qopdypfxhda[.]com            15            
                 
        pfkilgedjhq[.]com            15            
                 
        sgimiytkanu[.]com            15            
                 
        leqnxekmi[.]com            15            
                 
        ieugluxmlx[.]com            15            
                 
        elieidkolpc[.]com            15            
                 
        oluddrbaeb[.]com            15            
                 
        skroackqs[.]com            15            
                 
        pbfttfgw[.]com            15            
                 
        ujypninrop[.]com            15            
                 
        qpvvabbaqcn[.]com            15            

*See JSON for more IOCs

        Files and or directories created            Occurrences        
                                 
        %LOCALAPPDATA%\wblmbpwi.log            15            
                 
        %LOCALAPPDATA%\xrpatmbf.log            15            
                 
        %LOCALAPPDATA%\ntqipnfr            15            
                 
        %LOCALAPPDATA%\ntqipnfr\wlksgauv.exe            15            
                 
        %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\wlksgauv.exe            15            
                 
        %TEMP%\dljcankv.sys            15            
                 
        %TEMP%\oqinictcdtumygeo.exe            15            
                 
        %LOCALAPPDATA%\ntqipnfr\px1F71.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px26AF.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px203A.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px1CC1.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2B70.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2BFD.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px1EB4.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px1B98.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2365.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2307.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px28A3.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px25C5.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2DD1.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2BED.tmp            1            
                 
        %LOCALAPPDATA%\ntqipnfr\px2529.tmp            1            

File Hashes

             10df6ef7114ab16c25690d0183960e51d80488690e4f52680be2cf38d4aeb85b              1b39ecf9dc61b7e01c410b02eb8cb5c01ccdb1346474c62d7b916a9fb136681e              25354347217865d4e0a18080a942021de378cdcdff3633edc32583d892639569              265febc90d4163d2d1f29c0f07c8b003002ec7ee9ca4a3f8607ca5364cf06dc3              370c3bdde1b51bf0b9d079e644871b79848ac588c37ea7f89c94a2e2c3103642              3b955ab71c4147497bb1aa0fd65ee9b94bb1cbc897a0be46427f0f66a829de5d              55835f514e7ab6da28a6c69a3ffbe2d356b8ca987a274bc7a190689a57cbfbf2              615c3bfaa531cda8c1ac55bf9d5d93598617cd208702a7ce4c26cd94b2f2d4fd              61657d27b739df7dd856194cc29354ebf9d4a9abe3cb37d8782b5e6bddcba23c              7227840a73bce222d285d89cb1f528a5f5caf230af943a78f85f5e07136f1c4f              91cec64e347f7355c3dabb30b6e70c73d8a16890aa698ef526476930b998dd78              b70d31148f0b79548b7a2fd3a16228b32b0c52432b19b9d651fc9d6f9458c845              b7841d3db93f9a48887fdb82d3492b43f33f36ee8959e4f26a74c77962793e65              e80bad25222ffce33d1fa8c5962b235fecdce744b6dcf9c35db869844802573c              ee4d65ec638095b28ec9c1290bf3edac8c767fb2a094c00925fabcde83dfb205              

Coverage

        Product            Protection        
                     
        Secure Endpoint                                                                                                                              
             
        Cloudlock                                                                     N/A                                                          
             
        CWS                                                                                                                              
             
        Email Security                                                                                                                              
             
        Network Security                                                                                                                              
             
        Stealthwatch                                                                     N/A                                                          
             
        Stealthwatch Cloud                                                                     N/A                                                          
             
        Secure Malware Analytics                                                                                                                              
             
        Umbrella                                                                                                                              
             
        WSA                                                                                                                              

Screenshots of Detection

Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

TALOS
#xss#vulnerability#web#mac#windows#microsoft#js#git#java#intel#sap

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 29 and Aug. 5. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.

The most prevalent threats highlighted in this roundup are:

Threat Name

Type

Description

Win.Dropper.TrickBot-9958804-0

Dropper

TrickBot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.

Win.Ransomware.Cerber-9958814-0

Ransomware

Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension “.cerber,” although in more recent campaigns other file extensions are used.

Win.Virus.Xpiro-9958895-1

Virus

Expiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks.

Win.Dropper.Remcos-9960040-0

Dropper

Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam and capture screenshots. This malware is commonly delivered through Microsoft Office documents with macros sent as attachments on malicious emails.

Win.Dropper.Shiz-9958984-0

Dropper

Shiz is a remote access trojan that allows an attacker to access an infected machine to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.

Win.Dropper.HawkEye-9959777-0

Dropper

HawkEye is an information-stealing malware that targets usernames and passwords stored by web browsers and mail clients on an infected machine. It is commonly spread via email and can also propagate through removable media.

Win.Worm.Kuluoz-9959792-0

Worm

Kuluoz, sometimes known as “Asprox,” is a modular remote access trojan that is also known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations.

Win.Dropper.DarkComet-9959797-1

Dropper

DarkComet and related variants are a family of remote access trojans that provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user’s machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system.

Win.Dropper.Ramnit-9960101-0

Dropper

Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It can also steal browser cookies and attempts to hide from popular antivirus software.

Threat Breakdown****Win.Dropper.TrickBot-9958804-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 46 samples

Mutexes

Occurrences

5502606391408671395

4

32899542343072484998

4

1124524871971925691

3

24112587554236391103

3

39744624822682236206

3

23819686304274202058

2

31572222973474305701

2

38648211142506533958

1

33656147683147949452

1

7918010151544240523

1

38748932962513239244

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

wequinc[.]pl

4

patardd[.]pl

4

rydedun[.]pl

3

boristh[.]pl

3

lionopp[.]pl

3

matesic[.]pl

2

zanouns[.]pl

2

beryofn[.]pl

1

cabolth[.]pl

1

risiert[.]pl

1

githyet[.]pl

1

File Hashes

    01a4f86457a252ffc23117ba653a2093902d0160140a3fda03e3cb9595f6d652

    04a8a18b801bf158717c49444c3148f56fb1c23b6781b589106b848fad13557f

    04d4ecf05a7bcc6ca0f318bacaa6087ea1e5badc14ca9eebec52aaff791718bc

    08a004e94ce71ee0d239e38242283544f530996f4785924f85616040b278bef4

    094f5c76889cd9f3f9357d72eda49a962eedc8457a77d586459dbd5968f85aef

    0c25f673e25e8c9bb066ae56c41a83e28ef40a9da8327c9f7cd09f663b9a4614

    0ef6c2cc035d61abd0f221d2bb8d6c0f5fc1e2e87cd5001f47861435fded326b

    12eb4eb5dd38c776ec50166596c5e4ffda47108ce709990ae84a33a3a91776ed

    1f14d617fd53588a36cd26c19e6f306fad28bac24140e9083986bb0cac607bc5

    2184130eb8a891000fee1e343a5634531d72e05a7893fbafd6d53e52350bae19

    23d19c57bacf51421505125da6917c815a1aa0d5c7346cf42c47f6667df0599d

    2549d2a70d146340d14d981ecd9c33ce384bc743d4ed258f1eb9740c30792429

    26851fc35426f83e70d1542cc4f00a3dd16222de418d2e0727a4ab9d5218c22b

    28d1f82ea2f237ae643e442adae17449dadb8ad93397bf2299b0b53abeee45cb

    2d05858c463ea267870ff964d9f9779def1ca711586dcfea58745ebe6675ff1f

    2d1e5cc0f414d6cc94ec251605c68c32c442740e129d7af97f8293844aecca6a

    30636b11d051121251b2051971223e6e294dfaf917338239deb5b8edf5bce20b

    39d4446bb6b1c8cbf319fe02f1316897f22a6b00633af1b7e6159dbd7b837556

    3a0c89d07193ae260ced7a04873117af0213c43407248d2ff7edf95bd3b32421

    3b5e722ae23b3656cfb17fcb9fd218b92c5e4f24c241c3f1c37bded99d92c035

    3f32a6229d93292633dc3c9af4dcf7360463cd9fcc72bfc68bfc68afa666316d

    4f47c12806778d27afa43905ebb5b2079a451da93237899167d6420333cfe9a8

    50543f06717e0d022a4b58043861f0a38ab82e068f07414adc5be142a66c6cec

    513125bc77c78f24fc6a29a125c0d5373d5b365f476ba496f90d8dc952fd4441

    5584279c960a9a7aeb97ececdb90adc01da3dab0f1fe1cbf8c10e67f14d19c0d

*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Ransomware.Cerber-9958814-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 16 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER

        Value Name: Run

16

<HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR

        Value Name: AutoRun

16

<HKCU>\PRINTERS\DEFAULTS{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}

16

<HKCU>\PRINTERS\DEFAULTS

16

<HKCU>\PRINTERS\DEFAULTS{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}

        Value Name: Component_01

16

<HKCU>\PRINTERS\DEFAULTS{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}

        Value Name: Component_00

16

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: fc

2

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: fc

2

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: ntoskrnl

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: ntoskrnl

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: grpconv

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: grpconv

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: hh

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: hh

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: WerFaultSecure

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: WerFaultSecure

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: javaws

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: javaws

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: at

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: at

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: Dism

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: Dism

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: sc

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: sc

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: expand

1

Mutexes

Occurrences

shell.{381828AA-8B28-3374-1B67-35680555C5EF}

16

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

85[.]93[.]0[.]4

16

85[.]93[.]0[.]118

16

85[.]93[.]0[.]2/31

16

85[.]93[.]0[.]92/30

16

85[.]93[.]0[.]96/28

16

85[.]93[.]0[.]112/30

16

85[.]93[.]0[.]116/31

16

85[.]93[.]3[.]224/27

16

85[.]93[.]4[.]0/25

16

85[.]93[.]4[.]128/26

16

85[.]93[.]4[.]192/27

16

85[.]93[.]4[.]224/29

16

85[.]93[.]4[.]232/30

16

85[.]93[.]4[.]236/31

16

85[.]93[.]39[.]8/29

16

85[.]93[.]39[.]16/28

16

85[.]93[.]39[.]32/27

16

85[.]93[.]39[.]64/26

16

85[.]93[.]39[.]128/25

16

85[.]93[.]40[.]0/21

16

85[.]93[.]48[.]0/24

16

85[.]93[.]49[.]0/25

16

85[.]93[.]49[.]128/28

16

85[.]93[.]49[.]144/31

16

Files and or directories created

Occurrences

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}

16

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\fc.lnk

2

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\fc.exe

2

%System32%\Tasks\fc

2

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\ntoskrnl.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\ntoskrnl.exe

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\WerFaultSecure.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\WerFaultSecure.exe

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\ndadmin.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\ndadmin.exe

1

%System32%\Tasks\ndadmin

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\grpconv.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\grpconv.exe

1

%System32%\Tasks\grpconv

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\sdchange.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\sdchange.exe

1

%System32%\Tasks\sdchange

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\at.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\at.exe

1

%System32%\Tasks\at

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\hh.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\hh.exe

1

%System32%\Tasks\hh

1

%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\javaws.lnk

1

%APPDATA%{6F885251-E36F-0FE6-9629-63208157D7A2}\javaws.exe

1

*See JSON for more IOCs

File Hashes

    13cb0416ecaedac2d05c117c68d7745d2f2ef8d2e41a5522ae28a9fdbe1cc464

    18e9f9e0f0584b662165a2c78ca155ec06b59f48bfb09655929aaf6e4d3e04b6

    273e649cfa2dba65d23094955a8901b2d8bcabd9d883eb53db97da09b2dc7257

    37ce9b3d448b8d7ced3c71deebe8a826aa27095d155bbb08f5fe945edcaa665d

    396c12c17e7de26873a87c37724b30ebeee8a246cb9f4dd8c81c4eb28e5a36ec

    62e12d7f62c7c9826d8b20334d6bf5a9b9367cc92735c4c0ee0b9b04c68ebb30

    636bb6784c21658f113ea4dcc00a82f0aa2c1e68927f3bb398d57ab5fcb6bc53

    7017f1de73c8949efa7b04eb9973d73b712af738d2faf268cf32be7dea92b136

    73fd26b7ee1d7939a55ee17a0ea15fc4a3aa85d417f9d19ec33230e71d21ac11

    80574eb815087be8ead2c679474b8cf100a5a4db41cd3e012eff0c3e50ed900a

    910aad5d8e14a47c2882531c587ceb7836af31e2c09296c43877a3ed2cc044e6

    a340be1e9fe2140662c6bb04f1280eb91b1b1b1bd76c8e484ab4058ff25d5cf3

    c41250c29a915060c509cb390c8dac68029067c1537707742ed211866ae2bff4

    caba5cbc3931965b5f478934e02d20775413e15bcc559a684c632cfa9b151583

    f6c4639bcabd34e8b2e9cf8323e07416a11bc4d579b910405880a8950128cfb1

    fc73adec96749e88de8fb29777f1b4c27439c24690236857576076f545c8deb5

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Virus.Xpiro-9958895-1****Indicators of Compromise

  • IOCs collected from dynamic analysis of 37 samples

Registry Keys

Occurrences

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER

        Value Name: HideSCAHealth

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT

        Value Name: Type

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT

        Value Name: Start

37

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM

        Value Name: EnableSmartScreen

37

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER\SVC\S-1-5-21-2580483871-590521980-3826313501-500

37

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER\SVC\S-1-5-21-2580483871-590521980-3826313501-500

        Value Name: EnableNotifications

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32

        Value Name: Start

37

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64

        Value Name: Start

37

<HKLM>\SOFTWARE\MICROSOFT.NETFRAMEWORK\V2.0.50727\NGENSERVICE\STATE

        Value Name: AccumulatedWaitIdleTime

37

<HKLM>\SOFTWARE\MICROSOFT.NETFRAMEWORK\V2.0.50727\NGENSERVICE\LISTENEDSTATE

        Value Name: RootstoreDirty

37

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT.NETFRAMEWORK\V2.0.50727\NGENSERVICE\STATE

        Value Name: AccumulatedWaitIdleTime

37

Mutexes

Occurrences

kkq-vx_mtx61

37

kkq-vx_mtx62

37

kkq-vx_mtx63

37

kkq-vx_mtx64

37

kkq-vx_mtx65

37

kkq-vx_mtx66

37

kkq-vx_mtx67

37

kkq-vx_mtx68

37

kkq-vx_mtx69

37

kkq-vx_mtx70

37

kkq-vx_mtx71

37

kkq-vx_mtx72

37

kkq-vx_mtx73

37

kkq-vx_mtx74

37

kkq-vx_mtx75

37

kkq-vx_mtx76

37

kkq-vx_mtx77

37

kkq-vx_mtx78

37

kkq-vx_mtx79

37

kkq-vx_mtx80

37

kkq-vx_mtx81

37

kkq-vx_mtx82

37

kkq-vx_mtx83

37

kkq-vx_mtx84

37

kkq-vx_mtx85

37

*See JSON for more IOCs

Files and or directories created

Occurrences

%CommonProgramFiles%\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

37

%CommonProgramFiles(x86)%\microsoft shared\Source Engine\OSE.EXE

37

%ProgramFiles(x86)%\Microsoft Office\Office14\GROOVE.EXE

37

%ProgramFiles(x86)%\Mozilla Maintenance Service\maintenanceservice.exe

37

%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

37

%SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

37

%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

37

%SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

37

%System32%\FXSSVC.exe

37

%System32%\UI0Detect.exe

37

%System32%\alg.exe

37

%System32%\dllhost.exe

37

%System32%\ieetwcollector.exe

37

%System32%\msdtc.exe

37

%System32%\msiexec.exe

37

%System32%\snmptrap.exe

37

%System32%\sppsvc.exe

37

%System32%\vds.exe

37

%SystemRoot%\ehome\ehrecvr.exe

37

%SystemRoot%\ehome\ehsched.exe

37

%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

37

%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

37

%SystemRoot%\SysWOW64\dllhost.exe

37

%SystemRoot%\SysWOW64\msiexec.exe

37

%SystemRoot%\SysWOW64\svchost.exe

37

*See JSON for more IOCs

File Hashes

    013aa31a250e2858846c6f078e12a5132abbc0fad271365d3b67527fa2c2f402

    05c2e245c5f3a325472cf34f42093931e48d181c0f17caf9add2b35e7a3e828c

    0aee33737e3213c74bb671a1ab7b9485e00ade57ade144e2be354f67506a7290

    0af8855eff016554c3ddf0ce82bb61859ac3986ee4136ee06e7fe5d5a6d89788

    0ca2f5ca6ce21bacf1b26601c214a36766a0c911320bec0c184b5a18923ece23

    128d57cca2eae54f5754a5f1730a05df82d942a11764d0595e6c920498e9565f

    1397eff74a13595ea3fcb206a76977d1447997680fdf81163c2b985a009b080c

    13dd82a41add2789b1ea617cded11cf9bdbc143082372dcc2b26b2ae2616dbba

    14e5e9016d589d815058b09845af3b2fc2781b9815a493499664f29e9832e9fa

    16fcdd9f0950eda4799c80afd354767feefb725c58d82022c2d1385e25d48e96

    1b0665bd149dd3b9ae9a3b19c7be06b5ddcd53da461f91cda65365b94b7a288b

    1cf200ce049a09ea6f18ff56f65c651d519d6096d6eaf94331351c1217d2e002

    1f98e6f12d028379751c4e5f6efe96e0fe8a286c7448513dda93c980e3d8acf6

    26bd53dc56ec5c20627d67c8bdce2f67c3325bd6421a87319e3694abcf73867e

    28664a444ff8d844816b801fcf92199100cad7375ebaedea96020b2f7e2c664b

    290be865ff04b744f3f34e17cded589f11519cb10d5d186535cd5a21de8dd650

    29e70dc26eb00d9ff16ed8864b2583dde97e70d6f7dc074c50f3665ad7f8b2dc

    2c52d85ad0e41acf5112bccbbdde281950692c0e100e499a15b170d66d0154d0

    30ed57cfe6626a3e05de88be3207d4524311c62a6a2b5647f9359a620ed22f11

    3134096945a4cea5132ea9d0ad9b1a6925da40d2d4e86c8f8c8f4d3795b962ca

    35f44b47ad1e072f2030291462cedd654234eb0575883ae8f8d5978c051d78e1

    35fcd428c89e9586460cb2701ca4cb378824a32d497366a96fa234caf54d8048

    3c8477fdcd2719855d6b38cf29849d36dca6bf90805f996286bf77fff7ba1fa3

    3eb5cdb190ee1efbea012512c3ed6afd6215473bf208a1853f37701a3f7ba13a

    3f53b25ccced470ef2b1eb2edb4b839099a0ca597f4dbcc3aa590b260d727ab0

*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Remcos-9960040-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 21 samples

Registry Keys

Occurrences

<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E

        Value Name: LanguageList

7

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES{0633EE93-D776-472F-A0FF-E1416B8B2E3A}

        Value Name: FaviconPath

2

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES{0633EE93-D776-472F-A0FF-E1416B8B2E3A}

        Value Name: Deleted

2

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES

        Value Name: DefaultScope

2

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}

2

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVED EXTENSIONS

        Value Name: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43}

2

<HKCU>\SOFTWARE\REMCOS-SFLVDU

        Value Name: licence

1

<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E

        Value Name: @C:\Windows\system32\DeviceCenter.dll,-2000

1

<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E

        Value Name: @explorer.exe,-7001

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: mea

1

<HKCU>\SOFTWARE\REMCOS-SFLVDU

1

<HKCU>\SOFTWARE\REMCOS-SFLVDU

        Value Name: exepath

1

<HKCU>\SOFTWARE\REMCOS-1MSE40

1

<HKCU>\SOFTWARE\REMCOS-1MSE40

        Value Name: exepath

1

<HKCU>\SOFTWARE\REMCOS-1MSE40

        Value Name: licence

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: Un9

1

<HKCU>\SOFTWARE\REMCOS-A21G8J

1

<HKCU>\SOFTWARE\REMCOS-A21G8J

        Value Name: exepath

1

<HKCU>\SOFTWARE\REMCOS-A21G8J

        Value Name: licence

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: re

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE

        Value Name: dr

1

Mutexes

Occurrences

Remcos_Mutex_Inj

3

Local\55C37268-60E9-964A-3299-E2046F3CC613

2

Remcos-SFLVDU

1

Remcos-1MSE40

1

Remcos-A21G8J

1

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

13[.]225[.]214[.]71

4

13[.]225[.]214[.]108

4

37[.]19[.]193[.]217

3

95[.]211[.]75[.]16

2

162[.]210[.]195[.]111

1

13[.]225[.]214[.]91

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

piloresi[.]top

7

dioneras[.]top

7

downloadmirror[.]intel[.]com

5

uniresio[.]top

4

emperimen[.]com

3

www[.]bing[.]com

2

busyboydesign[.]xyz

2

toptoptop2[.]site

1

toptoptop3[.]site

1

toptoptop3[.]online

1

toptoptop2[.]online

1

lutheatre[.]com

1

fallium[.]com

1

sheaffic[.]com

1

Files and or directories created

Occurrences

%SystemRoot%\win.ini

21

%LOCALAPPDATA%\Administrator

8

%HOMEPATH%\kmm

1

%HOMEPATH%\kmm\Cam.exe

1

%HOMEPATH%\kmm\Cam.vbs

1

%HOMEPATH%\Dul\Slu6.exe

1

%HOMEPATH%\Dul\Slu6.vbs

1

%HOMEPATH%\Dul

1

%HOMEPATH%\Uds

1

%HOMEPATH%\Uds\sov.exe

1

%HOMEPATH%\Uds\sov.vbs

1

%HOMEPATH%\Sv9

1

%HOMEPATH%\Sv9\BUT.exe

1

%HOMEPATH%\Sv9\BUT.vbs

1

%HOMEPATH%\ref

1

%HOMEPATH%\ref\Bar.exe

1

%HOMEPATH%\ref\Bar.vbs

1

%HOMEPATH%\ma\No.exe

1

%HOMEPATH%\ma\No.vbs

1

%HOMEPATH%\ma

1

%HOMEPATH%\Oxy\Bru4.exe

1

%HOMEPATH%\Oxy\Bru4.vbs

1

%HOMEPATH%\tr\TEL.exe

1

%HOMEPATH%\tr\TEL.vbs

1

%HOMEPATH%\Oxy

1

*See JSON for more IOCs

File Hashes

    1990701e4db9f573be94dbfd0e9edcb826c4a0ba858b42249812acb12cea572f

    201ecff5a0b06b1401158972176bf3af310e1a25a9f603ea902b340f15262130

    667fcc41313580c1c5dd3f74e84f13a4431a8b1daf4e1c60d5f3ab0c657e95ef

    6754bcad108371e4192bc126187cf7ac07c39ea3f5ed7d975402a4c20d7fbcd4

    68183c5baad715853bf2a38a2384288803a431ef4881be8c33b473f7e97d0186

    6f70b508bcf39a1de4371f080c51bbf569ff5be7bf0f91793519c3c511710386

    72d305998919d0c14d44659c0427e1130b9cf6539f386d328879c7d416ac085a

    7cbbe9909fc023294a209ecf1b3882a02cb198d6841a129471201ce105c10d7f

    905d2ba08aa3c839dfb815a373c5e2d0ae71badcbb1a70be1ef2683381dcb257

    96eba5d5846bbcb803ffbac64ea5adf52fcb736ebda11abd466d509314dcc216

    c2bfc250e5a0f8047d8eeb2bab36669e2d20becf57ddfa1e0ff5c33ff63864d5

    cad62477913555b37902a162c9b437af27182fb219aa14647f257a0c48ddd556

    d2a181619dc5bce7506d65bd893b411772de00c9ffdcbbcb9e3a78ab029a4997

    d6e619e7f6f7578cef21ad4bea1ed94f397c0063aee69df329bc0aab3ea0b177

    d9f6c0ffc135785c9c0355bad4cc4b8884f6f655c6e336c14b1b7a27568ddda9

    dcd1f707b263fe1c37b94944b8399d92675d215d76aca304f0c7455250627d68

    e9877a7c8d2daca6b15131b26a583695e4d5e2c05023b764f24a551666055b0a

    f22c91af53fd11dae4ebeeca1886c5a3355f68970cb554be7eb10affbb547341

    f57f13ef3d153621588b9aa9a273e08a77069dd2b9b7d5ad08c579f24feedc41

    f7ac5679a471bbc48cb5af2fd54ea2e4621f7e825c06fba59a1690fa6745e56f

    fd4de71e56062003053b8f93f6bb84188666361a07c415e56a4b015802237289

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

WSA

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Shiz-9958984-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 88 samples

Registry Keys

Occurrences

<HKLM>\SOFTWARE\MICROSOFT

        Value Name: 67497551a

33

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON

        Value Name: 98b68e3c

33

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON

        Value Name: userinit

33

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON

        Value Name: System

33

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS

        Value Name: load

33

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS

        Value Name: run

33

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: userinit

33

Mutexes

Occurrences

Global\674972E3a

33

Global\MicrosoftSysenterGate7

33

internal_wutex_0x000000e0

33

internal_wutex_0x0000038c

33

internal_wutex_0x00000448

33

internal_wutex_0x<random, matching [0-9a-f]{8}>

29

internal_wutex_0x000007d0

12

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

13[.]107[.]21[.]200

16

45[.]33[.]23[.]183

9

96[.]126[.]123[.]244

8

198[.]58[.]118[.]167

7

45[.]56[.]79[.]23

6

45[.]33[.]30[.]197

6

45[.]79[.]19[.]196

5

173[.]255[.]194[.]134

5

72[.]14[.]178[.]174

5

72[.]14[.]185[.]43

4

45[.]33[.]2[.]79

3

45[.]33[.]18[.]44

3

45[.]33[.]20[.]235

2

85[.]94[.]194[.]169

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

fodakyhijyv[.]eu

33

qekusagigyz[.]eu

33

maxyjofytyt[.]eu

33

xudylenyrob[.]eu

33

pufepepazyd[.]eu

33

vopibycywow[.]eu

33

fotoxysupyd[.]eu

33

gaqehysohec[.]eu

33

lyxaxududes[.]eu

33

rycovuvutiq[.]eu

33

kevimudyqec[.]eu

33

jewidonevin[.]eu

33

tulekuvigij[.]eu

33

vocupotusyz[.]eu

33

galavozaxog[.]eu

33

divufozutog[.]eu

33

kefidaxupif[.]eu

33

jejykaxymob[.]eu

33

xutevexecif[.]eu

33

puryxepenek[.]eu

33

lysowaxojib[.]eu

33

dimigesupew[.]eu

33

fobatesohek[.]eu

33

ryhadyvigis[.]eu

33

qekikyvutic[.]eu

33

*See JSON for more IOCs

Files and or directories created

Occurrences

%TEMP%<random, matching [A-F0-9]{1,4}>.tmp

33

File Hashes

    0426a2801b985679944d7956d57df0c195e4871cb5fa9ae5d3cb864600883613

    06748264e401a4fcf30a802df0f390a75a14a3ff6148b8f064ee3e2585c742d9

    09bf6eb80568c5d370d52e77ca1eddea41f0eb7e458549c994620b3e6af3967c

    0affbf8c7691eaaab70491418b6db92cced36ff4a0a482673a4ebdd5492ad6c8

    0fbe21b7ff8392a707d0d871494c2298e88e723ebcd7a4495c6a037232d4899b

    11b3839df1c31d6c2f15591a0fa013c8b41862dd522d106c85876b49e7d561c0

    11b6cfd9b8f56c8107511151282335f7b5f5d555665bec7506908515dcb6acab

    11c19ec5a341f6a6bfa86170ea383439466f008ff42ec6dc04bd0445a658ba63

    1641e6a92c47304c11521b9c875029a387e49b511438b3ac4c122ee7b14519de

    1cac14ca2ad5715132446d1bb0503a6f783577d15f8fb97611dac9b7177903cc

    1f4e2901cf95c9ca682d9e5c24235c11da57a47153969203e58b5528bd37b411

    1f83440aab9dc62a6c4726b35ee58355b1cf76d23d194250397069423b17d281

    237bf6bd91b6301dd01456859507771ed5fc2eda62f67e207bea6928f69573b9

    253dc24fa6384c2c2757acc74ecfb88a231ab434c718e5b044a47e3fec4515f7

    25525b728590f243275c528727c4887c3521fc16c25f60e3b364fb21e8b64dab

    2553d02ff7f59fc5e0830783a508b4a5e8daff585bb4e5411c49bb34217f1b3d

    259d0e1eb7a6ab82cfef210054b7cedd069d331455d6c0effff450c514fef6b1

    2796098904f867adffd735f528461e5fb8be9f33ebd22bc37fb58684c3476112

    27de5dc0ae67097bc22a0bcb3381dcebc372c469c4b8effe2b83d87f85f01cc1

    2a6f60367dc3d70d2db9926e28dba4d79f20e319ceaf839c094cf85c9850c99a

    2c729b76866357b2fae9d51f4d5f69c1554b18b5be35f896300631b7409e49e7

    319155806bbb3e74cc753ed768a13455965e1fa7a175155f5862c2e030c2e35a

    34b2879998dfd238977cf19e5f4e3d4cbccfa61a9b0688e43a569e19a75a2844

    3578be24b2fe30600747846c30c1e286622e1906fce1a801e10b87117bf37ef4

    385ddefdb0c298b4cd194b165f82e9ddec8c8e6616160e432125e576dae5603c

*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

WSA

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.HawkEye-9959777-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 15 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED

        Value Name: Hidden

11

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: Windows Update

10

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON

        Value Name: Shell

5

<HKCU>\SOFTWARE\[email protected]

3

<HKCU>\SOFTWARE\[email protected]

        Value Name: NewIdentification

3

<HKCU>\SOFTWARE\[email protected]

        Value Name: NewGroup

3

<HKCU>\SOFTWARE\[email protected]

        Value Name: FirstExecution

3

Mutexes

Occurrences

<random, matching '[A-Z0-9]{14}’>

4

X43238C48CI4NY_SAIR

1

M21V21V8G7Q66R_SAIR

1

05V015TT37XDUJ_SAIR

1

Global\07657600-129e-11ed-9660-0015174b6151

1

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

104[.]16[.]155[.]36

6

104[.]16[.]154[.]36

5

77[.]88[.]21[.]158

2

142[.]251[.]16[.]109

2

208[.]91[.]199[.]224

1

208[.]91[.]198[.]143

1

208[.]91[.]199[.]223

1

192[.]99[.]212[.]64

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

whatismyipaddress[.]com

11

kalashas[.]no-ip[.]biz

3

smtp[.]gmail[.]com

2

smtp[.]yandex[.]ru

2

mail[.]siliconsss[.]com

2

smtp[.]impexservicesindia[.]com

2

smtp[.]vsnl[.]net

1

smtp[.]thanawalagroup[.]net

1

Files and or directories created

Occurrences

%APPDATA%\pid.txt

11

%APPDATA%\pidloc.txt

11

%TEMP%\holdermail.txt

10

%APPDATA%\WindowsUpdate.exe

10

\Sys.exe

3

\autorun.inf

3

E:\autorun.inf

3

%TEMP%\Administrator7

3

%TEMP%\Administrator8

3

%TEMP%\Administrator2.txt

3

\directory

3

\directory\CyberGate

3

\directory\CyberGate\install

3

\directory\CyberGate\install\server.exe

3

%APPDATA%\Administratorlog.dat

3

%TEMP%\SysInfo.txt

3

%APPDATA%\Windows Update.exe

3

E:\Sys.exe

3

%System32%\drivers\etc\hosts

1

%TEMP%\oUK6NMZIZls5Ku6i.exe

1

%APPDATA%\6tOsSNNvNp7JOgxS

1

%APPDATA%\g3h44Njnele2nJzi

1

%APPDATA%\g3h44Njnele2nJzi\ZOqlaWVQEXMz.exe

1

%APPDATA%\6tOsSNNvNp7JOgxS\ChSV1JzLaHOS.exe

1

%APPDATA%\hAtRUbl2c5ywfar3

1

*See JSON for more IOCs

File Hashes

    04e516d05c22e5489ba47b5e1bd03f6cb8bcf2b084e2b3dae23acbe25d4b4591

    21e52c431fce5ea651800127be440f447fafd20c3d74f34b0d712e140b0c138d

    21e949c72bc90a7b4647b305dd306e343f732ad2b898dba5e9b920edc33fc9a0

    220c6f3ffe28c8c7cd3f3b669b47bccdde30b200ab1de9bd0cca55c475ad62cb

    2f656303daecf2322749ed2a4b69b7124433dfea94d658c9e1e18d415db16456

    32a841f8eaf7fa85d3c78469a9890988c1c9b90c97cfba674ac8f9f991bd3a94

    4000b5bce992bdbdd73174fbe1e8d9b0fd65ad6c88f282889a8604dfa9fe0f59

    5291c5d0bd7eaee2402fb660be1b8501c3a712471e9d66062b6728794909263a

    5393c5a558225a02a03ee8ea46968d53a72b57194261e17dc7e35f0bd9b630ea

    628eb845ab8309303d0ebb7448063dbafd36954a66596977a272d5806cacaeca

    656d25151b846944e11c7ba03ce4fae066f7a8c29cdce84d0b241d4305a4245c

    6d155125192252b756c6af33bca25810ab9a19be347e5793b534802662eb00a4

    9a8797b6c2753e70ce0888185473510f40d3c0ff45b81b639dc8c077cb3679ec

    ad52ce9456cb87f713ad43de89835e0c882fd3a77389bb41ab50396efd59088a

    c4bf7dbe799d71e8e16c1aa5ca3f3af04f174b91e1a357a02e38b0155a46a600

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

WSA

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Worm.Kuluoz-9959792-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 26 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE<random, matching '[a-zA-Z0-9]{5,9}’>

26

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: uecguckk

1

<HKCU>\SOFTWARE\AEAKVJGE

        Value Name: ujaduqcw

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: cuhmadmx

1

<HKCU>\SOFTWARE\UDVFKDFC

        Value Name: vdqcxwxs

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: lhelwsfg

1

<HKCU>\SOFTWARE\SFLQPFKG

        Value Name: pvgxfqel

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: wrbmmivh

1

<HKCU>\SOFTWARE\SMXPKGUG

        Value Name: cdjmiong

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: agokwqgv

1

<HKCU>\SOFTWARE\NGWWUMBN

        Value Name: fpesjwgk

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: bomrkrmk

1

<HKCU>\SOFTWARE\LSCPUEQM

        Value Name: lsekxadg

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: bxvvsgvr

1

<HKCU>\SOFTWARE\HIDBXWKK

        Value Name: wudcreed

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: snwmmmvf

1

<HKCU>\SOFTWARE\TCUDAEVA

        Value Name: dfvkflcs

1

<HKCU>\SOFTWARE\MNQGHNOP

        Value Name: dlirvvqw

1

<HKCU>\SOFTWARE\MNFTGNBG

        Value Name: csfqppjx

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: imcfhgpa

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: oqpeifcm

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: lhxptbjv

1

<HKCU>\SOFTWARE\HQMHIWJP

        Value Name: durqeakc

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: hsrhcrvj

1

<HKCU>\SOFTWARE\CGOEUIAE

        Value Name: htpvdufk

1

Mutexes

Occurrences

2GVWNQJz1

26

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

173[.]203[.]97[.]13

15

76[.]74[.]184[.]127

13

37[.]59[.]82[.]218

13

94[.]32[.]67[.]214

13

212[.]45[.]17[.]15

13

142[.]4[.]60[.]242

13

50[.]57[.]139[.]41

12

82[.]150[.]199[.]140

12

92[.]240[.]232[.]232

10

113[.]53[.]247[.]147

10

203[.]157[.]142[.]2

9

176[.]31[.]181[.]76

9

188[.]165[.]192[.]116

7

Files and or directories created

Occurrences

%LOCALAPPDATA%<random, matching '[a-z]{8}’>.exe

26

File Hashes

    01d6c50b70eb28d693e74b7ad15158707b8f57a9711e35c07d3d1c4ee7f630ee

    08c25287e368a2158b029684e74626ba867a606837cce07ea2837b6ed78857a4

    09bb26d956e0eb8aba714e836c041d844ac01eb4ccb3e498382c07ae3e267ff4

    0bf1e31c2a0fe232876deef8bad8cbe1e08a3ad377db920ffc27c4852ef1dc89

    0c6ec5510575da4416321eb58b20d3e447746e0cea1ffd06241f8a1e6bbb2837

    0dd0361ead8f0e962be7a115dd8a4fa9d1a12b88c11633f82cfeae655a59f809

    0fb3d456de4717b29c3a332e29a10cc9c52c94c92f6438f32791f5a5785b603b

    1052ac160c67084f7dae6af5d9ee545fb0df20b99b8e989177ffb795a32aa35c

    192d087160aad1afdb5ed06eb4128d997e578af554a626887746d91e66bc688a

    1f4a448e60174255ef3d7492e60464ef4cfd84f65acb8c9824493b71d6864b8f

    1f7810a638c2f1825276f2784cf557d7610ca0eabb463d06e6b25597fd077043

    230a54a47fed1921adb452b5e88f1467e021dd85aac8f0d60a5a41912b991d28

    26cad8fc0603c849db06f59e46b452bb4c3fe5cadfd46e344ce9a7f10365ddb8

    276bb12ea62aa7f7ffce0531b84bbe1f7f2e6a19f4150ca6a7b1c69f4662b595

    286bc1cee4c188350c8bb50812e30f7bec0b794efca5a2eb0b12368b479211b3

    2938109eee69fe708fa15752e0723d110a01ee4e3e1e804cc97bbde01267fdb8

    2a850531aeb725e5f138b9b1158640fe41c05a25560e2550fa2b070d96490a8e

    31266599481409d70b317821d5af1aea693e7c1c7cedd04fd5dec0008bd816a7

    384b51772d288e63038e146446e6e84b1f737cd3d8d34c3871d875fda77ff29a

    38e1edffa779f9e2dd16104c35fc7a6c4a21dff7f3ad9bc8233b5817e8666441

    3949d166ce5f75648fcb66ea3f9aaf251aa9847d576aef7d10b2830a295e2096

    3ffee22fa7f00e260b92385c8cda56eee17c133b7c47cb33cf701d0c9e2ae89e

    419c33660b59de42d150f8c1163873db94fa59e8d684bb44d0ec866eaebd00a7

    441c34ba7b9ee2d7b0506013a2fb9fd5c5b517d38a66e1228edf4d7e1e20b9e8

    446d8276a7008c24317b101c5d7050da5f1a51301a47842cd35f5d8a362eee83

*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.DarkComet-9959797-1****Indicators of Compromise

  • IOCs collected from dynamic analysis of 11 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\DC3_FEXEC

11

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM

        Value Name: EnableLUA

11

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER

        Value Name: AntiVirusDisableNotify

11

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON

        Value Name: UserInit

11

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: MicroUpdate

11

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM

11

<HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E

        Value Name: LanguageList

11

Mutexes

Occurrences

DCPERSFWBP

11

DC_MUTEX-01SYFCM

11

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

zapto666[.]zapto[.]org

11

sildelanoe2[.]zapto[.]org

11

Files and or directories created

Occurrences

%ProgramData%\Microsoft\Windows\Start Menu\Programs\MSDCSC

11

%ProgramData%\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsc.exe

11

File Hashes

    236c360d988e5b28b1a4eee229d0f3b5baa203043fc5ae8f016519f753e6b6bf

    27990599b2e3ae192d5a897ed30cb98a20eae1d3ed8506dac8d82fef9ed9442e

    53cd48d7d092d55fdc35966cfbd01861bf7304f9dc694237d322ff189adb32a4

    55754ae53d9555a67d25be9cd73b5d85141d4ef43cd55ae2cf237be1cfa0d965

    5dcd64134e33496cdd5ad13012b35834164d59d470a17359710a335469fdf35a

    6e0d5bd7c55c9ec287377f8cadd342768c887a8901d015253996112442ff5d6f

    a53ebd4f480bdf3cf2199692af1d27c2864fc5c038fefed214688416cc2a1066

    acaf2d6a74e24b2ab85338fa62efc85d76f6ec9c1cd11657230d975fd0dcde42

    c4c677ab5115a0a568d1817528005ad24d0dc06ddd9d738d5f1fb75a3074b3f0

    d2e83abd3d779b825e4088f53b43aa8521131a9ebd0dad8006e70fcc0e249e8d

    eea1adee202040b2c06dfb226eacd4c662b57714f44ffcc0561ff8cb2ec2a6d6

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Ramnit-9960101-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 15 samples

Registry Keys

Occurrences

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM

        Value Name: EnableLUA

15

<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT

        Value Name: AlternateShell

15

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON

        Value Name: Userinit

15

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN

        Value Name: WlkSgauv

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: Type

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: ErrorControl

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: ImagePath

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: DisplayName

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: WOW64

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: DeleteFlag

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

15

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MICORSOFT WINDOWS SERVICE

        Value Name: Start

15

Mutexes

Occurrences

{79345B6A-421F-2958-EA08-07396ADB9E27}

15

{7934684F-421F-2958-EA08-07396ADB9E27}

15

{7934723B-421F-2958-EA08-07396ADB9E27}

15

{7934684E-421F-2958-EA08-07396ADB9E27}

15

{<random GUID>}

15

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

82[.]112[.]184[.]197

15

72[.]26[.]218[.]70

15

195[.]201[.]179[.]207

15

208[.]100[.]26[.]245

15

35[.]205[.]61[.]67

15

142[.]250[.]80[.]14

15

75[.]2[.]18[.]233

15

172[.]105[.]157[.]192

15

46[.]165[.]220[.]150

15

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

kbadlfpgtec[.]com

15

ymcwineqkj[.]com

15

tupexbvpmsc[.]com

15

mwsjitqbf[.]com

15

ccsnpnqxii[.]com

15

dpdadshi[.]com

15

eljmrnwualb[.]com

15

hjxrksvo[.]com

15

lfnjosunfd[.]com

15

paoxlrmbg[.]com

15

qekgxfrk[.]com

15

uhjwxipj[.]com

15

mkmngqxwk[.]com

15

ybmhumhymqj[.]com

15

qopdypfxhda[.]com

15

pfkilgedjhq[.]com

15

sgimiytkanu[.]com

15

leqnxekmi[.]com

15

ieugluxmlx[.]com

15

elieidkolpc[.]com

15

oluddrbaeb[.]com

15

skroackqs[.]com

15

pbfttfgw[.]com

15

ujypninrop[.]com

15

qpvvabbaqcn[.]com

15

*See JSON for more IOCs

Files and or directories created

Occurrences

%LOCALAPPDATA%\wblmbpwi.log

15

%LOCALAPPDATA%\xrpatmbf.log

15

%LOCALAPPDATA%\ntqipnfr

15

%LOCALAPPDATA%\ntqipnfr\wlksgauv.exe

15

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\wlksgauv.exe

15

%TEMP%\dljcankv.sys

15

%TEMP%\oqinictcdtumygeo.exe

15

%LOCALAPPDATA%\ntqipnfr\px1F71.tmp

1

%LOCALAPPDATA%\ntqipnfr\px26AF.tmp

1

%LOCALAPPDATA%\ntqipnfr\px203A.tmp

1

%LOCALAPPDATA%\ntqipnfr\px1CC1.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2B70.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2BFD.tmp

1

%LOCALAPPDATA%\ntqipnfr\px1EB4.tmp

1

%LOCALAPPDATA%\ntqipnfr\px1B98.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2365.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2307.tmp

1

%LOCALAPPDATA%\ntqipnfr\px28A3.tmp

1

%LOCALAPPDATA%\ntqipnfr\px25C5.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2DD1.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2BED.tmp

1

%LOCALAPPDATA%\ntqipnfr\px2529.tmp

1

File Hashes

    10df6ef7114ab16c25690d0183960e51d80488690e4f52680be2cf38d4aeb85b

    1b39ecf9dc61b7e01c410b02eb8cb5c01ccdb1346474c62d7b916a9fb136681e

    25354347217865d4e0a18080a942021de378cdcdff3633edc32583d892639569

    265febc90d4163d2d1f29c0f07c8b003002ec7ee9ca4a3f8607ca5364cf06dc3

    370c3bdde1b51bf0b9d079e644871b79848ac588c37ea7f89c94a2e2c3103642

    3b955ab71c4147497bb1aa0fd65ee9b94bb1cbc897a0be46427f0f66a829de5d

    55835f514e7ab6da28a6c69a3ffbe2d356b8ca987a274bc7a190689a57cbfbf2

    615c3bfaa531cda8c1ac55bf9d5d93598617cd208702a7ce4c26cd94b2f2d4fd

    61657d27b739df7dd856194cc29354ebf9d4a9abe3cb37d8782b5e6bddcba23c

    7227840a73bce222d285d89cb1f528a5f5caf230af943a78f85f5e07136f1c4f

    91cec64e347f7355c3dabb30b6e70c73d8a16890aa698ef526476930b998dd78

    b70d31148f0b79548b7a2fd3a16228b32b0c52432b19b9d651fc9d6f9458c845

    b7841d3db93f9a48887fdb82d3492b43f33f36ee8959e4f26a74c77962793e65

    e80bad25222ffce33d1fa8c5962b235fecdce744b6dcf9c35db869844802573c

    ee4d65ec638095b28ec9c1290bf3edac8c767fb2a094c00925fabcde83dfb205

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

WSA

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

TALOS: Latest News

CISA is warning us (again) about the threat to critical infrastructure networks