Analysis
-
max time kernel
11s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe
Resource
win10v2004-20220812-en
General
-
Target
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe
-
Size
2.3MB
-
MD5
fe04426caaf094ed341ccc1657e64ae3
-
SHA1
d1a4ee9243b09c32b52c90d7ee887d5ecacbdd19
-
SHA256
d3e00146f485478786404bbace60071b9add4db24714a24696bb24576e6e952c
-
SHA512
077c686419e856e7972936221900374e089b54ee91d9d97b5b85a1657e33b3882b996ceb561f082d36f6788f1086fa60dc5ccc8abe8c1110da9c2ec838835572
-
SSDEEP
24576:ApeV0t19s+nurr5d7oQUEZZ9ZEB7pZsUcgQqudlaoSJ8XfgR7Gf6A3Lsnjl6/KHo:A0QUdhNoQLrElcRvlaoPoNAyjlRHGP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\dCAUEcQM\\kyMkQAwA.exe," 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\dCAUEcQM\\kyMkQAwA.exe," 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe -
Executes dropped EXE 3 IoCs
Processes:
GGAgQckw.exekyMkQAwA.exeHckEAcIA.exepid process 896 GGAgQckw.exe 1124 kyMkQAwA.exe 936 HckEAcIA.exe -
Loads dropped DLL 7 IoCs
Processes:
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exekyMkQAwA.exepid process 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe 1124 kyMkQAwA.exe 1124 kyMkQAwA.exe 1124 kyMkQAwA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
kyMkQAwA.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kyMkQAwA.exe = "C:\\ProgramData\\dCAUEcQM\\kyMkQAwA.exe" kyMkQAwA.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exepid process 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exedescription pid process target process PID 1208 wrote to memory of 896 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe GGAgQckw.exe PID 1208 wrote to memory of 896 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe GGAgQckw.exe PID 1208 wrote to memory of 896 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe GGAgQckw.exe PID 1208 wrote to memory of 896 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe GGAgQckw.exe PID 1208 wrote to memory of 1124 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe kyMkQAwA.exe PID 1208 wrote to memory of 1124 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe kyMkQAwA.exe PID 1208 wrote to memory of 1124 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe kyMkQAwA.exe PID 1208 wrote to memory of 1124 1208 2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe kyMkQAwA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2022-11-23_fe04426caaf094ed341ccc1657e64ae3_virlock.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\YSgYcEUo\GGAgQckw.exe"C:\Users\Admin\YSgYcEUo\GGAgQckw.exe"2⤵
- Executes dropped EXE
PID:896 -
C:\ProgramData\dCAUEcQM\kyMkQAwA.exe"C:\ProgramData\dCAUEcQM\kyMkQAwA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1124
-
C:\ProgramData\nqQcwcEc\HckEAcIA.exeC:\ProgramData\nqQcwcEc\HckEAcIA.exe1⤵
- Executes dropped EXE
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD50d31170deedaf79813865f2fef44d9aa
SHA1dc0fc53e4be84ccd341e47c9b7ed30a74966fcf0
SHA25600cc6123cbca3b49a70236859afe55891adeca2dbb54203e17bebe90f126e0db
SHA512dc08a7a8cdcf072e7566c5a5bf7f00964bad04e152df14950eaf470b56aacfd5c4c0f03a7caacf9ae108fcb824ee3fb2856d692658f9606bff59401881d4283d
-
Filesize
2.1MB
MD5cf969db610434896688c316e65d0b255
SHA19763b794e07bf27c3ee81497e852670bb45f24c2
SHA256e4bfa2bc34e525653315f453b9b853b943cde13e38f67a0e8dab4d3ab52cd0fd
SHA512877842f13984e9498ee46e4987f91f269fca7f44b53ded1f3b135ab56645ad3ad2ec8ff648ceea5593377c9d375a2643e9e1ab5c6382a8269f9afb50dac41db1
-
Filesize
2.1MB
MD55e2492c07b93867d49552daf2728e6e8
SHA14a3c6c85ffa14ac2e7c5adbc66ab86c642bcb42b
SHA256fdafc7c8deaf7a639a227f6a8a69b98d78ac4226c18a8e7b04d508e8ef778268
SHA5123ee81e7d30f4a37a0b0b76eec2b6e72d47f2c7779992d4adbcacb3d18440bbc39b34d840236a945f46e08a46f564dc1b455fff5e534791aaf328f3560a7a26f4
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
2.1MB
MD50d31170deedaf79813865f2fef44d9aa
SHA1dc0fc53e4be84ccd341e47c9b7ed30a74966fcf0
SHA25600cc6123cbca3b49a70236859afe55891adeca2dbb54203e17bebe90f126e0db
SHA512dc08a7a8cdcf072e7566c5a5bf7f00964bad04e152df14950eaf470b56aacfd5c4c0f03a7caacf9ae108fcb824ee3fb2856d692658f9606bff59401881d4283d
-
Filesize
2.1MB
MD50d31170deedaf79813865f2fef44d9aa
SHA1dc0fc53e4be84ccd341e47c9b7ed30a74966fcf0
SHA25600cc6123cbca3b49a70236859afe55891adeca2dbb54203e17bebe90f126e0db
SHA512dc08a7a8cdcf072e7566c5a5bf7f00964bad04e152df14950eaf470b56aacfd5c4c0f03a7caacf9ae108fcb824ee3fb2856d692658f9606bff59401881d4283d
-
Filesize
2.1MB
MD55e2492c07b93867d49552daf2728e6e8
SHA14a3c6c85ffa14ac2e7c5adbc66ab86c642bcb42b
SHA256fdafc7c8deaf7a639a227f6a8a69b98d78ac4226c18a8e7b04d508e8ef778268
SHA5123ee81e7d30f4a37a0b0b76eec2b6e72d47f2c7779992d4adbcacb3d18440bbc39b34d840236a945f46e08a46f564dc1b455fff5e534791aaf328f3560a7a26f4
-
Filesize
2.1MB
MD55e2492c07b93867d49552daf2728e6e8
SHA14a3c6c85ffa14ac2e7c5adbc66ab86c642bcb42b
SHA256fdafc7c8deaf7a639a227f6a8a69b98d78ac4226c18a8e7b04d508e8ef778268
SHA5123ee81e7d30f4a37a0b0b76eec2b6e72d47f2c7779992d4adbcacb3d18440bbc39b34d840236a945f46e08a46f564dc1b455fff5e534791aaf328f3560a7a26f4