W32/VBKrypt.MBW!tr
Analysis
- Creates another process instance of itself, injects malicious codes into it, and executes it.
- Creates a copy of itself to the System folder and then registers itself to run at each Windows startup by adding an entry with a random name to the following registry subkey:
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Attempts to download and execute malicious files.
Recommended Action
FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extended | |
FortiClient | |
Extreme | |
FortiAPS | |
FortiAPU | |
FortiMail | |
Extreme | |
FortiSandbox | |
Extreme | |
FortiWeb | |
Extreme | |
Web Application Firewall | |
Extreme | |
FortiIsolator | |
Extreme | |
FortiDeceptor | |
Extreme | |
FortiEDR |