Analysis

  • max time kernel
    238s
  • max time network
    322s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:39

General

  • Target

    2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe

  • Size

    2.3MB

  • MD5

    e32e0ec72fa11f6ed358a0eab5d94b68

  • SHA1

    cbd4c4c96f97dfc70fa965ae93818b933715e267

  • SHA256

    5f7a80e85c4579a734faa9910dc20069ff9e2bd272c0b6fac61a340abbeca28f

  • SHA512

    dd40b98625314bc5f2054f39488bc8a3876c4cc8fa723c60e65ced41abc9444318ef196d36e91b97089a9eb79ec58fee5cd7525559f568dcc6173a155c64fc1b

  • SSDEEP

    49152:ITJYktl6g7iJSB3skrYljjjnDsUill1yJGmEn:/alf1xskrYljjj

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe
    "C:\Users\Admin\AppData\Local\Temp\2022-11-23_e32e0ec72fa11f6ed358a0eab5d94b68_virlock.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\IuUMMkMk\KSYcEgww.exe
      "C:\Users\Admin\IuUMMkMk\KSYcEgww.exe"
      2⤵
      • Executes dropped EXE
      PID:1152
    • C:\ProgramData\XOgAogcw\lSIkwIUQ.exe
      "C:\ProgramData\XOgAogcw\lSIkwIUQ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1296
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\cver.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Users\Admin\AppData\Local\Temp\cver.exe
        C:\Users\Admin\AppData\Local\Temp\cver.exe
        3⤵
        • Executes dropped EXE
        PID:1428
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:1712
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:1740
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:296
  • C:\ProgramData\jqcIoAoc\GsMgMIok.exe
    C:\ProgramData\jqcIoAoc\GsMgMIok.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1732
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1592

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\XOgAogcw\lSIkwIUQ.exe
    Filesize

    2.1MB

    MD5

    c4df80b0c8507389299b350353cf9ce6

    SHA1

    e459fe5f1dfafd69317f77c8222e93e17f10bfd4

    SHA256

    a9fd195001262f4c19c6363e55b35cdb9c65e4145f2d844a7a211e8677cf6005

    SHA512

    b3b62dcd33fed7bcdea5bb2e55d09a08ad39b969f234f6943cb303e9d9c949dd45d03cdb77deaf574cc8c8912ea26e5f6d8f7b17f331349dbe5d2b3428efd8c7

  • C:\ProgramData\jqcIoAoc\GsMgMIok.exe
    Filesize

    2.1MB

    MD5

    31a74b4793e6b19b0ffae6d8bff78c0c

    SHA1

    0218975fa12952da5956e4c0ac7e5a25e6318565

    SHA256

    4f9ffd62dc5ae8625ccbc43ea0e401dcb1bd7ab1b69400dbf5739d585457ab0d

    SHA512

    99fbf0910cc475c1921bb07c422b694c981d2a77f4aa9a614fdc6a94861fb797486b3172cabbaf68e36127ae0b6455a258d020b5c429347b07c49fce65e42c6e

  • C:\ProgramData\jqcIoAoc\GsMgMIok.exe
    Filesize

    2.1MB

    MD5

    31a74b4793e6b19b0ffae6d8bff78c0c

    SHA1

    0218975fa12952da5956e4c0ac7e5a25e6318565

    SHA256

    4f9ffd62dc5ae8625ccbc43ea0e401dcb1bd7ab1b69400dbf5739d585457ab0d

    SHA512

    99fbf0910cc475c1921bb07c422b694c981d2a77f4aa9a614fdc6a94861fb797486b3172cabbaf68e36127ae0b6455a258d020b5c429347b07c49fce65e42c6e

  • C:\Users\Admin\AppData\Local\Temp\cver.exe
    Filesize

    140KB

    MD5

    0d0b992d2d4b7619f49ee0458d3469b1

    SHA1

    5d9835b408a231902654d516b48843890f4130e5

    SHA256

    55c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94

    SHA512

    8435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7

  • C:\Users\Admin\AppData\Local\Temp\cver.exe
    Filesize

    140KB

    MD5

    0d0b992d2d4b7619f49ee0458d3469b1

    SHA1

    5d9835b408a231902654d516b48843890f4130e5

    SHA256

    55c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94

    SHA512

    8435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7

  • C:\Users\Admin\IuUMMkMk\KSYcEgww.exe
    Filesize

    2.1MB

    MD5

    8022839a36d9ee88bf1dea5a318f2650

    SHA1

    bc8b48a054a9d5666e9222813ec93141d28ad75e

    SHA256

    1101868d0aabd30143e216c562bc766909346402a87b33c677ccfc7a208237a7

    SHA512

    0b946c8b13b1607d793e7cc29b1dda7611889911e8b1e0919d946b611c6f58d1e0b484c0c806d2619bec7023ab08f020ca20f0a55d1947c1bf25687d807ed7ab

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    Filesize

    1.0MB

    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    Filesize

    1.0MB

    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
    Filesize

    818KB

    MD5

    a41e524f8d45f0074fd07805ff0c9b12

    SHA1

    948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

    SHA256

    082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

    SHA512

    91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
    Filesize

    818KB

    MD5

    a41e524f8d45f0074fd07805ff0c9b12

    SHA1

    948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

    SHA256

    082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

    SHA512

    91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe
    Filesize

    507KB

    MD5

    c87e561258f2f8650cef999bf643a731

    SHA1

    2c64b901284908e8ed59cf9c912f17d45b05e0af

    SHA256

    a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

    SHA512

    dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

  • \ProgramData\XOgAogcw\lSIkwIUQ.exe
    Filesize

    2.1MB

    MD5

    c4df80b0c8507389299b350353cf9ce6

    SHA1

    e459fe5f1dfafd69317f77c8222e93e17f10bfd4

    SHA256

    a9fd195001262f4c19c6363e55b35cdb9c65e4145f2d844a7a211e8677cf6005

    SHA512

    b3b62dcd33fed7bcdea5bb2e55d09a08ad39b969f234f6943cb303e9d9c949dd45d03cdb77deaf574cc8c8912ea26e5f6d8f7b17f331349dbe5d2b3428efd8c7

  • \ProgramData\XOgAogcw\lSIkwIUQ.exe
    Filesize

    2.1MB

    MD5

    c4df80b0c8507389299b350353cf9ce6

    SHA1

    e459fe5f1dfafd69317f77c8222e93e17f10bfd4

    SHA256

    a9fd195001262f4c19c6363e55b35cdb9c65e4145f2d844a7a211e8677cf6005

    SHA512

    b3b62dcd33fed7bcdea5bb2e55d09a08ad39b969f234f6943cb303e9d9c949dd45d03cdb77deaf574cc8c8912ea26e5f6d8f7b17f331349dbe5d2b3428efd8c7

  • \ProgramData\jqcIoAoc\GsMgMIok.exe
    Filesize

    2.1MB

    MD5

    31a74b4793e6b19b0ffae6d8bff78c0c

    SHA1

    0218975fa12952da5956e4c0ac7e5a25e6318565

    SHA256

    4f9ffd62dc5ae8625ccbc43ea0e401dcb1bd7ab1b69400dbf5739d585457ab0d

    SHA512

    99fbf0910cc475c1921bb07c422b694c981d2a77f4aa9a614fdc6a94861fb797486b3172cabbaf68e36127ae0b6455a258d020b5c429347b07c49fce65e42c6e

  • \Users\Admin\AppData\Local\Temp\cver.exe
    Filesize

    140KB

    MD5

    0d0b992d2d4b7619f49ee0458d3469b1

    SHA1

    5d9835b408a231902654d516b48843890f4130e5

    SHA256

    55c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94

    SHA512

    8435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7

  • \Users\Admin\IuUMMkMk\KSYcEgww.exe
    Filesize

    2.1MB

    MD5

    8022839a36d9ee88bf1dea5a318f2650

    SHA1

    bc8b48a054a9d5666e9222813ec93141d28ad75e

    SHA256

    1101868d0aabd30143e216c562bc766909346402a87b33c677ccfc7a208237a7

    SHA512

    0b946c8b13b1607d793e7cc29b1dda7611889911e8b1e0919d946b611c6f58d1e0b484c0c806d2619bec7023ab08f020ca20f0a55d1947c1bf25687d807ed7ab

  • \Users\Admin\IuUMMkMk\KSYcEgww.exe
    Filesize

    2.1MB

    MD5

    8022839a36d9ee88bf1dea5a318f2650

    SHA1

    bc8b48a054a9d5666e9222813ec93141d28ad75e

    SHA256

    1101868d0aabd30143e216c562bc766909346402a87b33c677ccfc7a208237a7

    SHA512

    0b946c8b13b1607d793e7cc29b1dda7611889911e8b1e0919d946b611c6f58d1e0b484c0c806d2619bec7023ab08f020ca20f0a55d1947c1bf25687d807ed7ab

  • memory/296-88-0x0000000000000000-mapping.dmp
  • memory/1152-73-0x0000000000400000-0x000000000061A000-memory.dmp
    Filesize

    2.1MB

  • memory/1152-65-0x0000000001F70000-0x0000000002F70000-memory.dmp
    Filesize

    16.0MB

  • memory/1152-72-0x0000000001F70000-0x0000000002F70000-memory.dmp
    Filesize

    16.0MB

  • memory/1152-67-0x0000000000400000-0x000000000061A000-memory.dmp
    Filesize

    2.1MB

  • memory/1152-58-0x0000000000000000-mapping.dmp
  • memory/1296-71-0x0000000001F60000-0x0000000002F60000-memory.dmp
    Filesize

    16.0MB

  • memory/1296-63-0x0000000000000000-mapping.dmp
  • memory/1296-66-0x0000000001F60000-0x0000000002F60000-memory.dmp
    Filesize

    16.0MB

  • memory/1296-69-0x0000000000400000-0x0000000000613000-memory.dmp
    Filesize

    2.1MB

  • memory/1296-74-0x0000000000400000-0x0000000000613000-memory.dmp
    Filesize

    2.1MB

  • memory/1424-84-0x0000000000000000-mapping.dmp
  • memory/1428-95-0x00000000011D0000-0x00000000011F8000-memory.dmp
    Filesize

    160KB

  • memory/1428-90-0x0000000000000000-mapping.dmp
  • memory/1652-54-0x0000000001F80000-0x0000000002F80000-memory.dmp
    Filesize

    16.0MB

  • memory/1652-70-0x0000000000400000-0x000000000064D000-memory.dmp
    Filesize

    2.3MB

  • memory/1652-60-0x0000000075491000-0x0000000075493000-memory.dmp
    Filesize

    8KB

  • memory/1652-68-0x0000000001F80000-0x0000000002F80000-memory.dmp
    Filesize

    16.0MB

  • memory/1652-55-0x0000000000400000-0x000000000064D000-memory.dmp
    Filesize

    2.3MB

  • memory/1712-86-0x0000000000000000-mapping.dmp
  • memory/1732-81-0x0000000000400000-0x0000000000624000-memory.dmp
    Filesize

    2.1MB

  • memory/1732-80-0x0000000000C80000-0x0000000001C80000-memory.dmp
    Filesize

    16.0MB

  • memory/1732-96-0x0000000000C80000-0x0000000001C80000-memory.dmp
    Filesize

    16.0MB

  • memory/1732-97-0x0000000000400000-0x0000000000624000-memory.dmp
    Filesize

    2.1MB

  • memory/1740-87-0x0000000000000000-mapping.dmp