Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
You should also run a full scan. A full scan might find hidden malware.
Use cloud protection
The Microsoft Active Protection Service (MAPS) uses cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10.
This threat is designed to act as an intermediary malware within an infection chain. For example, a user may unwittingly open a malicious email attachment, which may lead to installation of this loader. It may also come in through an exploit kit infection chain.
When executed, it will drop a copy of itself in the %ProgramFiles% folder:
For example, c:\program files\heareilwjiwelgh.exe
This threat also creates a .lnk file in program startup folder:
For example, c:\users\administrator\appdata\roaming\microsoft\windows\start menu\programs\startup\lq1zwa3v3e0uanu.lnk
Payload
Connects to a remote host
We have seen this threat attempt to connect to a remote host:
srconvent.com<> at TCP port 80
Malware can connect to a remote host to do any of the following:
Download and run files (including updates or other malware)
Report a new infection to its author
Receive configuration or other data
Downloads and installs other malware
We have seen this threat download and install other malware. It stores the payload %TEMP% folder. For example, C:\Users\<user name>\AppData\Local\Temp\RFiaD4ViC4JA9rviMnKTPQKDh.exe detected as Ransom:Win32/Locky.