Analysis
-
max time kernel
238s -
max time network
322s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe
Resource
win10v2004-20221111-en
General
-
Target
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe
-
Size
2.3MB
-
MD5
e32e0ec72fa11f6ed358a0eab5d94b68
-
SHA1
cbd4c4c96f97dfc70fa965ae93818b933715e267
-
SHA256
5f7a80e85c4579a734faa9910dc20069ff9e2bd272c0b6fac61a340abbeca28f
-
SHA512
dd40b98625314bc5f2054f39488bc8a3876c4cc8fa723c60e65ced41abc9444318ef196d36e91b97089a9eb79ec58fee5cd7525559f568dcc6173a155c64fc1b
-
SSDEEP
49152:ITJYktl6g7iJSB3skrYljjjnDsUill1yJGmEn:/alf1xskrYljjj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\XOgAogcw\\lSIkwIUQ.exe," 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\XOgAogcw\\lSIkwIUQ.exe," 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 4 IoCs
Processes:
KSYcEgww.exelSIkwIUQ.exeGsMgMIok.execver.exepid process 1152 KSYcEgww.exe 1296 lSIkwIUQ.exe 1732 GsMgMIok.exe 1428 cver.exe -
Loads dropped DLL 12 IoCs
Processes:
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exelSIkwIUQ.execmd.exepid process 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe 1296 lSIkwIUQ.exe 1296 lSIkwIUQ.exe 1296 lSIkwIUQ.exe 1296 lSIkwIUQ.exe 1296 lSIkwIUQ.exe 1296 lSIkwIUQ.exe 1424 cmd.exe 1296 lSIkwIUQ.exe -
Drops file in System32 directory 2 IoCs
Processes:
GsMgMIok.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\IuUMMkMk GsMgMIok.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\IuUMMkMk\KSYcEgww GsMgMIok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exepid process 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1592 vssvc.exe Token: SeRestorePrivilege 1592 vssvc.exe Token: SeAuditPrivilege 1592 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.execmd.exedescription pid process target process PID 1652 wrote to memory of 1152 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe KSYcEgww.exe PID 1652 wrote to memory of 1152 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe KSYcEgww.exe PID 1652 wrote to memory of 1152 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe KSYcEgww.exe PID 1652 wrote to memory of 1152 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe KSYcEgww.exe PID 1652 wrote to memory of 1296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe lSIkwIUQ.exe PID 1652 wrote to memory of 1296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe lSIkwIUQ.exe PID 1652 wrote to memory of 1296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe lSIkwIUQ.exe PID 1652 wrote to memory of 1296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe lSIkwIUQ.exe PID 1652 wrote to memory of 1424 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe cmd.exe PID 1652 wrote to memory of 1424 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe cmd.exe PID 1652 wrote to memory of 1424 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe cmd.exe PID 1652 wrote to memory of 1424 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe cmd.exe PID 1652 wrote to memory of 1712 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1712 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1712 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1712 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1740 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1740 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1740 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 1740 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1652 wrote to memory of 296 1652 2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe reg.exe PID 1424 wrote to memory of 1428 1424 cmd.exe cver.exe PID 1424 wrote to memory of 1428 1424 cmd.exe cver.exe PID 1424 wrote to memory of 1428 1424 cmd.exe cver.exe PID 1424 wrote to memory of 1428 1424 cmd.exe cver.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\IuUMMkMk\KSYcEgww.exe"C:\Users\Admin\IuUMMkMk\KSYcEgww.exe"2⤵
- Executes dropped EXE
PID:1152 -
C:\ProgramData\XOgAogcw\lSIkwIUQ.exe"C:\ProgramData\XOgAogcw\lSIkwIUQ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cver.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\cver.exeC:\Users\Admin\AppData\Local\Temp\cver.exe3⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1712 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1740 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:296
-
C:\ProgramData\jqcIoAoc\GsMgMIok.exeC:\ProgramData\jqcIoAoc\GsMgMIok.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1732
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5c4df80b0c8507389299b350353cf9ce6
SHA1e459fe5f1dfafd69317f77c8222e93e17f10bfd4
SHA256a9fd195001262f4c19c6363e55b35cdb9c65e4145f2d844a7a211e8677cf6005
SHA512b3b62dcd33fed7bcdea5bb2e55d09a08ad39b969f234f6943cb303e9d9c949dd45d03cdb77deaf574cc8c8912ea26e5f6d8f7b17f331349dbe5d2b3428efd8c7
-
Filesize
2.1MB
MD531a74b4793e6b19b0ffae6d8bff78c0c
SHA10218975fa12952da5956e4c0ac7e5a25e6318565
SHA2564f9ffd62dc5ae8625ccbc43ea0e401dcb1bd7ab1b69400dbf5739d585457ab0d
SHA51299fbf0910cc475c1921bb07c422b694c981d2a77f4aa9a614fdc6a94861fb797486b3172cabbaf68e36127ae0b6455a258d020b5c429347b07c49fce65e42c6e
-
Filesize
2.1MB
MD531a74b4793e6b19b0ffae6d8bff78c0c
SHA10218975fa12952da5956e4c0ac7e5a25e6318565
SHA2564f9ffd62dc5ae8625ccbc43ea0e401dcb1bd7ab1b69400dbf5739d585457ab0d
SHA51299fbf0910cc475c1921bb07c422b694c981d2a77f4aa9a614fdc6a94861fb797486b3172cabbaf68e36127ae0b6455a258d020b5c429347b07c49fce65e42c6e
-
Filesize
140KB
MD50d0b992d2d4b7619f49ee0458d3469b1
SHA15d9835b408a231902654d516b48843890f4130e5
SHA25655c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94
SHA5128435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7
-
Filesize
140KB
MD50d0b992d2d4b7619f49ee0458d3469b1
SHA15d9835b408a231902654d516b48843890f4130e5
SHA25655c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94
SHA5128435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7
-
Filesize
2.1MB
MD58022839a36d9ee88bf1dea5a318f2650
SHA1bc8b48a054a9d5666e9222813ec93141d28ad75e
SHA2561101868d0aabd30143e216c562bc766909346402a87b33c677ccfc7a208237a7
SHA5120b946c8b13b1607d793e7cc29b1dda7611889911e8b1e0919d946b611c6f58d1e0b484c0c806d2619bec7023ab08f020ca20f0a55d1947c1bf25687d807ed7ab
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
2.1MB
MD5c4df80b0c8507389299b350353cf9ce6
SHA1e459fe5f1dfafd69317f77c8222e93e17f10bfd4
SHA256a9fd195001262f4c19c6363e55b35cdb9c65e4145f2d844a7a211e8677cf6005
SHA512b3b62dcd33fed7bcdea5bb2e55d09a08ad39b969f234f6943cb303e9d9c949dd45d03cdb77deaf574cc8c8912ea26e5f6d8f7b17f331349dbe5d2b3428efd8c7
-
Filesize
2.1MB
MD5c4df80b0c8507389299b350353cf9ce6
SHA1e459fe5f1dfafd69317f77c8222e93e17f10bfd4
SHA256a9fd195001262f4c19c6363e55b35cdb9c65e4145f2d844a7a211e8677cf6005
SHA512b3b62dcd33fed7bcdea5bb2e55d09a08ad39b969f234f6943cb303e9d9c949dd45d03cdb77deaf574cc8c8912ea26e5f6d8f7b17f331349dbe5d2b3428efd8c7
-
Filesize
2.1MB
MD531a74b4793e6b19b0ffae6d8bff78c0c
SHA10218975fa12952da5956e4c0ac7e5a25e6318565
SHA2564f9ffd62dc5ae8625ccbc43ea0e401dcb1bd7ab1b69400dbf5739d585457ab0d
SHA51299fbf0910cc475c1921bb07c422b694c981d2a77f4aa9a614fdc6a94861fb797486b3172cabbaf68e36127ae0b6455a258d020b5c429347b07c49fce65e42c6e
-
Filesize
140KB
MD50d0b992d2d4b7619f49ee0458d3469b1
SHA15d9835b408a231902654d516b48843890f4130e5
SHA25655c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94
SHA5128435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7
-
Filesize
2.1MB
MD58022839a36d9ee88bf1dea5a318f2650
SHA1bc8b48a054a9d5666e9222813ec93141d28ad75e
SHA2561101868d0aabd30143e216c562bc766909346402a87b33c677ccfc7a208237a7
SHA5120b946c8b13b1607d793e7cc29b1dda7611889911e8b1e0919d946b611c6f58d1e0b484c0c806d2619bec7023ab08f020ca20f0a55d1947c1bf25687d807ed7ab
-
Filesize
2.1MB
MD58022839a36d9ee88bf1dea5a318f2650
SHA1bc8b48a054a9d5666e9222813ec93141d28ad75e
SHA2561101868d0aabd30143e216c562bc766909346402a87b33c677ccfc7a208237a7
SHA5120b946c8b13b1607d793e7cc29b1dda7611889911e8b1e0919d946b611c6f58d1e0b484c0c806d2619bec7023ab08f020ca20f0a55d1947c1bf25687d807ed7ab