Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2023 07:59
Static task
static1
Behavioral task
behavioral1
Sample
WinLocker Builder (test version).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
WinLocker Builder (test version).exe
Resource
win10v2004-20230220-en
General
-
Target
WinLocker Builder (test version).exe
-
Size
5.1MB
-
MD5
fb344b1c20c3d4b66efe7194fdc7299c
-
SHA1
c36ff3e29f450a7ffc58979cd51360d6db04e854
-
SHA256
f3fa585e7418f8b33bb279c72461d1822d0da9c0da673d158acfeecfd0ca6017
-
SHA512
44aad18a62c554cfa9a21dc4fe58db4f09d68d70252c59385fe54fe007e4e79172110719547e2cfd784ee98f8604561e185a0c3c05dd2443cf5cd76e92725bdb
-
SSDEEP
98304:Ex3MI+PNSOdHfY5JX+2pgGXRNe14VMAjizLIi2tEXuDS2MTozg:EE5Ri5pgGXyp0SIi2tEXu+Px
Malware Config
Extracted
bitrat
1.38
current-necessity.at.ply.gg:49446
-
communication_password
c5e4e64cc9384fda09aa232c1811af0e
-
install_dir
MsSystemDriver
-
install_file
MsMpEng.exe
-
tor_process
tor
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
WinLocker Builder (test version).exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WinLocker Builder (test version).exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WinLocker Builder (test version).exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinLocker Builder (test version).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinLocker Builder (test version).exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WinLocker Builder (test version).exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsMpEng = "C:\\Users\\Admin\\AppData\\Local\\MsSystemDriver\\MsMpEng.exe耀" WinLocker Builder (test version).exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsMpEng = "C:\\Users\\Admin\\AppData\\Local\\MsSystemDriver\\MsMpEng.exe" WinLocker Builder (test version).exe -
Processes:
WinLocker Builder (test version).exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinLocker Builder (test version).exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
WinLocker Builder (test version).exedescription ioc process File opened for modification \??\PhysicalDrive0 WinLocker Builder (test version).exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
WinLocker Builder (test version).exepid process 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
WinLocker Builder (test version).exepid process 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe -
Suspicious behavior: RenamesItself 29 IoCs
Processes:
WinLocker Builder (test version).exepid process 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WinLocker Builder (test version).exedescription pid process Token: SeShutdownPrivilege 3464 WinLocker Builder (test version).exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WinLocker Builder (test version).exepid process 3464 WinLocker Builder (test version).exe 3464 WinLocker Builder (test version).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinLocker Builder (test version).exe"C:\Users\Admin\AppData\Local\Temp\WinLocker Builder (test version).exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3464