W32/Yakes.B!tr
Analysis
- It copies itself to undefinedWindowsundefined\Installer\[Random GUID]\syshost.exe.
- It adds the following registry entries:
- HKLM\SYSTEM\CurrentControlSet\Services\syshost32
- ImagePath = "undefinedWindowsundefined\Installer\[Random GUID]\syshost.exe" /service
- HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
- EnableFirewall = 00000000
- DoNotAllowExceptions = 00000000
- HKLM\SYSTEM\CurrentControlSet\Services\syshost32
- It tries to access the following URLs:
- germ{Removed}.com
- 0.{Removed}ol.ntp.org
- It may perform DNS requests of URLs, such as the following:
- facebook.com
- microsoft.com
- other randomly generated URLs, such as uyeccwnehvkqb{Removed}.com
- It deletes itself from the current directory.
Recommended Action
- FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extended | |
FortiClient | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |