Concrete signature match: PUA for 32-bit Windows platform, family Spigot
PUA:Win32/Spigot is a Potentially Unwanted Application primarily functioning as a browser hijacker and adware. It modifies browser settings, installs unwanted extensions (e.g., 'mybrowserbar.com' in Firefox), and leverages legitimate Windows utilities like rundll32, PowerShell, and scheduled tasks for execution, persistence, and system interference through hooking mechanisms.
Relevant strings associated with this threat: - \Spigot (FOLDERNAME) - \Mozilla\Firefox\Profiles\????????.default\extensions\pdfforge@mybrowserbar.com (FOLDERNAME) - XH.<> (SNID) - F.T#:i (SNID) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
5c196829f37d2efe5ee50771e5feed612b8651d2d7a984b24f2f80fbcf84f9d9Isolate the affected system. Perform a full, updated antivirus scan to remove the PUA and associated components. Manually review and remove any suspicious browser extensions (particularly in Firefox), then reset affected web browsers to their default settings. Additionally, check for and remove any suspicious scheduled tasks or startup entries.