Analysis
-
max time kernel
584s -
max time network
368s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
13/11/2021, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
lock.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
lock.exe
Resource
win10-en-20211104
General
-
Target
lock.exe
-
Size
2.2MB
-
MD5
fc93ecb882fbc1bac46aaf4232ce9b66
-
SHA1
e4cfd33fc8f20f05b07299845268a54dd33ffced
-
SHA256
7f65f443d129dcfc59b3c2a001b5a1f3cda092b3008e62a73ab87ba8f782b215
-
SHA512
2fffaf9f8c2305be7c55bc23b8822dab5ce961332833e0bffbb6cbbee01f97907e4b5b4e573b682f66b5309d462302e1db7df0f6df3b34dccaf323357dc2efca
Malware Config
Extracted
\??\c:\users\Admin\Desktop\readme.txt
http://y2cyumvhavcecc6kr5tpat5gdnz2lsw5ucjxbv7s2ggxsh7gj57omuyd.onion/6667
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SelectRead.png.dst lock.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\org-netbeans-modules-profiler_visualvm.jar.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\cpu.css.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\drag.png.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DATETIME.JPG.dst lock.exe File created C:\Program Files\Microsoft Games\Purble Place\PurblePlace.dll.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpuzzle_plugin.dll.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\settings.html.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_pitch_plugin.dll.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libstl_plugin.dll.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libt140_plugin.dll.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_vc1_plugin.dll.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system.png.dst lock.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\info.png.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.HTM.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert.zh_CN_5.5.0.165303.jar.dst lock.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-math-l1-1-0.dll.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\librtp_plugin.dll.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\service.js.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png.dst lock.exe File created C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_tr.dll.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\VIEW.ICO.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_hov.png.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css.dst lock.exe File created C:\Program Files\VideoLAN\VLC\README.txt.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewFrame.html.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OUTLFLTR.DLL.dst lock.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.VisualC.STLCLR.dll.dst lock.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.DataSetExtensions.Resources.dll.dst lock.exe File created C:\Program Files\Windows Journal\MSPVWCTL.DLL.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\drag.png.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\square_s.png.dst lock.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_SelectionSubpicture.png.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar.dst lock.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_up.png.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_AutoMask.bmp.dst lock.exe File created C:\Program Files\7-Zip\Lang\ne.txt.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-api-caching_ja.jar.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10268_.GIF.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_HighMask.bmp.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\settings.css.dst lock.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedbck2.gif.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\liboldrc_plugin.dll.dst lock.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_es_plugin.dll.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_pressed.gif.dst lock.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\PresentationBuildTasks.resources.dll.dst lock.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_ja_4.4.0.v20140623020002.jar.dst lock.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\Video-48.png.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange.css.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR13F.GIF.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\BUTTON.JPG.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePage.html.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\MANUAL.ICO.dst lock.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\title_stripe.png.dst lock.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BABY_01.MID.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01244_.GIF.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsDoNotTrust.html.dst lock.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\clock.html.dst lock.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationClientsideProviders.resources.dll.dst lock.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14710_.GIF.dst lock.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1540 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 472 lock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 472 wrote to memory of 1124 472 lock.exe 29 PID 472 wrote to memory of 1124 472 lock.exe 29 PID 472 wrote to memory of 1124 472 lock.exe 29 PID 1124 wrote to memory of 1656 1124 cmd.exe 30 PID 1124 wrote to memory of 1656 1124 cmd.exe 30 PID 1124 wrote to memory of 1656 1124 cmd.exe 30 PID 1124 wrote to memory of 1896 1124 cmd.exe 31 PID 1124 wrote to memory of 1896 1124 cmd.exe 31 PID 1124 wrote to memory of 1896 1124 cmd.exe 31 PID 472 wrote to memory of 360 472 lock.exe 33 PID 472 wrote to memory of 360 472 lock.exe 33 PID 472 wrote to memory of 360 472 lock.exe 33 PID 472 wrote to memory of 1340 472 lock.exe 32 PID 472 wrote to memory of 1340 472 lock.exe 32 PID 472 wrote to memory of 1340 472 lock.exe 32 PID 472 wrote to memory of 540 472 lock.exe 34 PID 472 wrote to memory of 540 472 lock.exe 34 PID 472 wrote to memory of 540 472 lock.exe 34 PID 472 wrote to memory of 632 472 lock.exe 35 PID 472 wrote to memory of 632 472 lock.exe 35 PID 472 wrote to memory of 632 472 lock.exe 35 PID 472 wrote to memory of 484 472 lock.exe 36 PID 472 wrote to memory of 484 472 lock.exe 36 PID 472 wrote to memory of 484 472 lock.exe 36 PID 472 wrote to memory of 316 472 lock.exe 37 PID 472 wrote to memory of 316 472 lock.exe 37 PID 472 wrote to memory of 316 472 lock.exe 37 PID 472 wrote to memory of 760 472 lock.exe 39 PID 472 wrote to memory of 760 472 lock.exe 39 PID 472 wrote to memory of 760 472 lock.exe 39 PID 472 wrote to memory of 804 472 lock.exe 38 PID 472 wrote to memory of 804 472 lock.exe 38 PID 472 wrote to memory of 804 472 lock.exe 38 PID 472 wrote to memory of 1168 472 lock.exe 40 PID 472 wrote to memory of 1168 472 lock.exe 40 PID 472 wrote to memory of 1168 472 lock.exe 40 PID 1168 wrote to memory of 1680 1168 cmd.exe 45 PID 1168 wrote to memory of 1680 1168 cmd.exe 45 PID 1168 wrote to memory of 1680 1168 cmd.exe 45 PID 804 wrote to memory of 1112 804 cmd.exe 48 PID 804 wrote to memory of 1112 804 cmd.exe 48 PID 804 wrote to memory of 1112 804 cmd.exe 48 PID 540 wrote to memory of 976 540 cmd.exe 42 PID 540 wrote to memory of 976 540 cmd.exe 42 PID 540 wrote to memory of 976 540 cmd.exe 42 PID 1340 wrote to memory of 1072 1340 cmd.exe 49 PID 1340 wrote to memory of 1072 1340 cmd.exe 49 PID 1340 wrote to memory of 1072 1340 cmd.exe 49 PID 484 wrote to memory of 1544 484 cmd.exe 43 PID 484 wrote to memory of 1544 484 cmd.exe 43 PID 484 wrote to memory of 1544 484 cmd.exe 43 PID 316 wrote to memory of 1192 316 cmd.exe 46 PID 316 wrote to memory of 1192 316 cmd.exe 46 PID 316 wrote to memory of 1192 316 cmd.exe 46 PID 760 wrote to memory of 1560 760 cmd.exe 44 PID 760 wrote to memory of 1560 760 cmd.exe 44 PID 760 wrote to memory of 1560 760 cmd.exe 44 PID 632 wrote to memory of 1216 632 cmd.exe 47 PID 632 wrote to memory of 1216 632 cmd.exe 47 PID 632 wrote to memory of 1216 632 cmd.exe 47 PID 360 wrote to memory of 1968 360 cmd.exe 41 PID 360 wrote to memory of 1968 360 cmd.exe 41 PID 360 wrote to memory of 1968 360 cmd.exe 41 PID 976 wrote to memory of 1448 976 net.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\lock.exe"C:\Users\Admin\AppData\Local\Temp\lock.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\system32\cmd.execmd.exe "/csc query | findstr SERVICE_NAME"2⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\sc.exesc query3⤵PID:1656
-
-
C:\Windows\system32\findstr.exefindstr SERVICE_NAME"3⤵PID:1896
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop AeLookupSvc"2⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\net.exenet stop AeLookupSvc"3⤵PID:1072
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AeLookupSvc"4⤵PID:1764
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop "2⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\system32\net.exenet stop "3⤵PID:1968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "4⤵PID:1100
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop AudioEndpointBuilder"2⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\system32\net.exenet stop AudioEndpointBuilder"3⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AudioEndpointBuilder"4⤵PID:1448
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop AudioSrv"2⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\system32\net.exenet stop AudioSrv"3⤵PID:1216
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AudioSrv"4⤵PID:1328
-
C:\Windows\system32\cipher.execipher /w:L5⤵PID:804
-
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop BF"2⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\system32\net.exenet stop BF"3⤵PID:1544
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BF"4⤵PID:1884
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop BIT"2⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\net.exenet stop BIT"3⤵PID:1192
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BIT"4⤵PID:1716
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop "2⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\net.exenet stop "3⤵PID:1112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "4⤵PID:1888
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop Browser"2⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\system32\net.exenet stop Browser"3⤵PID:1560
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Browser"4⤵PID:924
-
-
-
-
C:\Windows\system32\cmd.execmd.exe "/cnet stop SSDP"2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\net.exenet stop SSDP"3⤵PID:1680
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SSDP"4⤵PID:1940
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:C2⤵PID:1696
-
C:\Windows\system32\cipher.execipher /w:C3⤵PID:1716
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:D2⤵PID:1452
-
C:\Windows\system32\cipher.execipher /w:D3⤵PID:1160
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:E2⤵PID:1100
-
C:\Windows\system32\cipher.execipher /w:E3⤵PID:1188
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:F2⤵PID:1468
-
C:\Windows\system32\cipher.execipher /w:F3⤵PID:1652
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:G2⤵PID:884
-
C:\Windows\system32\cipher.execipher /w:G3⤵PID:900
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:H2⤵PID:1932
-
C:\Windows\system32\cipher.execipher /w:H3⤵PID:1184
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:I2⤵PID:1728
-
C:\Windows\system32\cipher.execipher /w:I3⤵PID:968
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:J2⤵PID:1872
-
C:\Windows\system32\cipher.execipher /w:J3⤵PID:1072
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:N2⤵PID:432
-
C:\Windows\system32\cipher.execipher /w:N3⤵PID:1268
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:L2⤵PID:1328
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:M2⤵PID:632
-
C:\Windows\system32\cipher.execipher /w:M3⤵PID:760
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:P2⤵PID:1164
-
C:\Windows\system32\cipher.execipher /w:P3⤵PID:1640
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:R2⤵PID:1996
-
C:\Windows\system32\cipher.execipher /w:R3⤵PID:300
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:Q2⤵PID:828
-
C:\Windows\system32\cipher.execipher /w:Q3⤵PID:892
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:S2⤵PID:2016
-
C:\Windows\system32\cipher.execipher /w:S3⤵PID:1524
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:T2⤵PID:1688
-
C:\Windows\system32\cipher.execipher /w:T3⤵PID:964
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:O2⤵PID:1556
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:K2⤵PID:1372
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:U2⤵PID:1972
-
C:\Windows\system32\cipher.execipher /w:U3⤵PID:1768
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:V2⤵PID:1900
-
C:\Windows\system32\cipher.execipher /w:V3⤵PID:1064
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:Y2⤵PID:292
-
C:\Windows\system32\cipher.execipher /w:Y3⤵PID:1264
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:H2⤵PID:1140
-
C:\Windows\system32\cipher.execipher /w:H3⤵PID:1648
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:W2⤵PID:1332
-
C:\Windows\system32\cipher.execipher /w:W3⤵PID:1616
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cipher /w:Z2⤵PID:1656
-
C:\Windows\system32\cipher.execipher /w:Z3⤵PID:1764
-
-
-
C:\Windows\system32\cipher.execipher /w:K1⤵PID:360
-
C:\Windows\system32\cipher.execipher /w:O1⤵PID:1380
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:560
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1540