Zbot.FM is a Trojan horse that attempts to steal confidential banking information from the compromised computer. It may also download configuration files and updates from the Internet. It is spread mainly through drive-by downloads and phishing schemes. Zbot is also called as Zeus. File Related Changes It drops the following file(s) on the system: - "C:\WINDOWS\system32\drivers\1212a.sys"
- "C:\Documents and Settings\Admin\Local Settings\Temp\VBWF3D.bat"
Process Related Changes It creates the following mutex(es): - {1F6BADA5-4AF0-BA6D-9A67-B06D8416937F}"
- MPSWABOlkStoreNotifyMutex"
- {1F6BADA5-4AF0-BA6D-D267-B06DCC16937F}"
- {1F6BADA5-4AF0-BA6D-A660-B06DB811937F}"
- {E58D6685-81D0-408B-AFDE-CE27B1AFED35}"
- {1F6BADA5-4AF0-BA6D-CE60-B06DD011937F}"
- MPSWabDataAccessMutex"
- {8FB585AF-62FA-2AB3-AFDE-CE27B1AFED35}"
- {1F6BADA5-4AF0-BA6D-6266-B06D7C17937F}"
- {1F6BADA5-4AF0-BA6D-3666-B06D2817937F}"
- {1F6BADA5-4AF0-BA6D-A664-B06DB815937F}"
- {8359529D-B5C8-265F-AFDE-CE27B1AFED35}"
- {1F6BADA5-4AF0-BA6D-1660-B06D0811937F}"
- {70EC73C7-9492-D5EA-AFDE-CE27B1AFED35}"
- {1F6BADA5-4AF0-BA6D-AA64-B06DB415937F}"
- {1F6BADA5-4AF0-BA6D-D263-B06DCC12937F}"
- {1F6BADA5-4AF0-BA6D-8661-B06D9810937F}"
- {1F6BADA5-4AF0-BA6D-0261-B06D1C10937F}"
- {1F6BADA5-4AF0-BA6D-2E67-B06D3016937F}"
- {1F6BADA5-4AF0-BA6D-C661-B06DD810937F}"
- {1F6BADA5-4AF0-BA6D-1A63-B06D0412937F}"
- {1F6BADA5-4AF0-BA6D-1262-B06D0C13937F}"
- {1F6BADA5-4AF0-BA6D-AE66-B06DB017937F}"
- {1F6BADA5-4AF0-BA6D-5663-B06D4812937F}"
- {EE5333BD-D4E8-4B55-AFDE-CE27B1AFED35}"
- {555F64AE-83FB-F059-AFDE-CE27B1AFED35}"
- {1F6BADA5-4AF0-BA6D-8E60-B06D9011937F}"
- {1F6BADA5-4AF0-BA6D-0661-B06D1810937F}"
- {1F6BADA5-4AF0-BA6D-1E65-B06D0014937F}"
- MSIdent Logon"
- {CFF5568C-B1D9-6AF3-AFDE-CE27B1AFED35}"
- SHIMLIB_LOG_MUTEX"
- {EE5333BC-D4E9-4B55-AFDE-CE27B1AFED35}"
- {1F6BADA5-4AF0-BA6D-6665-B06D7814937F}"
- {8FB585A8-62FD-2AB3-AFDE-CE27B1AFED35}"
It creates the following process(es): - C:\WINDOWS\Temp\76fe3432c75ee724a8f20ea97696bd17.exe [ \c:\windows\temp\76fe3432c75ee724a8f20ea97696bd17.exe ]
- C:\WINDOWS\system32\cmd.exe
- C:\Documents and Settings\Admin\Local Settings\Temp\Oczu\ajobo.exe
It injects malicious code into the following process(es): - "C:\Documents and Settings\Admin\Local Settings\Temp\Oczu\ajobo.exe"
- "C:\WINDOWS\system32\ctfmon.exe"
- "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"
- "C:\WINDOWS\system32\rundll32.exe"
- "C:\WINDOWS\explorer.exe"
Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKLM\system\CurrentControlSet\Services\sharedaccess\parameters\firewallpolicy\standardprofile\disablenotifications =
|