Suspicious#zbot_5 is a Trojan horse that attempts to steal confidential banking information from the compromised computer. It may also download configuration files and updates from the Internet. It is spread mainly through drive-by downloads and phishing schemes. Zbot is also called as Zeus. File Related Changes It drops the following file(s) on the system: - "c:\Users\Admin\AppData\Local\Temp\tmp8ea4106a.bat"
- "c:\Users\Admin\AppData\Roaming\Ozleyx\liywa.exe"
Process Related Changes It creates the following mutex(es): - "Global\{133A51B2-ADF1-0AF4-1A82-B1B97102C981}"
- "IESQMMUTEX_0_208"
It creates the following process(es): - C:\Users\Admin\AppData\Roaming\Ozleyx\liywa.exe
- C:\Windows\system32\cmd.exe
It injects malicious code into the following process(es): - "C:\Windows\system32\taskhost.exe"
- "C:\Windows\system32\Dwm.exe"
- "C:\Windows\system32\SearchProtocolHost.exe"
- "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"
Network Activity It attempts to connect to the following remote servers: - ocsp.verisign.net:80 (199.7.xxxxxx)
- certrevoc.vo.msecnd.net:80 (157.56.xxxxxx)
We observed the following DNS query/queries: - ocsp.verisign.com
- namesservers.org
- mscrl.microsoft.com
- crl.microsoft.com
Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKCU\Software\Microsoft\Windows\CurrentVersion\Run\{a188d4c7-2884-b846-a3bd-f7e6c83d8fde} = C:\Users\Admin\AppData\Roaming\Ozleyx\liywa.exe
|