Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01-08-2023 15:28
Static task
static1
Behavioral task
behavioral1
Sample
2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe
-
Size
245KB
-
MD5
2b8df627c8569cc1b1d3254598fde007
-
SHA1
071ca7c5c043a99c4d14470b9e2a9b60432dd1d6
-
SHA256
cb25d79bd562a8a942a428064ad99df4e1bd0b760a3ee3aa094f54ce13cf688a
-
SHA512
392689f50448cc5a8478bfa2fc276a162def723180127cde6ca7071b3edf1b6c0b1ce67141d35b26c9d1e3dadb6fbd4b8ce1c0d93de2b772bf00f1ce56fe0009
-
SSDEEP
6144:dmB7pzJBKxGwvRlZcIebNZGNZ8oxFB11:dsF6Rfc9QNS
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Deletes itself 1 IoCs
pid Process 1780 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2928 qOkoEwww.exe 2164 hYwcMcoU.exe -
Loads dropped DLL 20 IoCs
pid Process 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\qOkoEwww.exe = "C:\\Users\\Admin\\QGkEYsEM\\qOkoEwww.exe" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hYwcMcoU.exe = "C:\\ProgramData\\PKYgEwwk\\hYwcMcoU.exe" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\qOkoEwww.exe = "C:\\Users\\Admin\\QGkEYsEM\\qOkoEwww.exe" qOkoEwww.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hYwcMcoU.exe = "C:\\ProgramData\\PKYgEwwk\\hYwcMcoU.exe" hYwcMcoU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2536 reg.exe 2632 reg.exe 1664 reg.exe 268 reg.exe 436 reg.exe 3012 reg.exe 2012 reg.exe 2768 reg.exe 1952 reg.exe 1604 reg.exe 1736 reg.exe 2020 reg.exe 1596 reg.exe 1564 reg.exe 1740 reg.exe 1780 reg.exe 1132 reg.exe 2880 reg.exe 2412 reg.exe 696 reg.exe 3056 reg.exe 268 reg.exe 1916 reg.exe 2248 reg.exe 1008 reg.exe 1048 reg.exe 544 reg.exe 2984 reg.exe 2892 reg.exe 872 reg.exe 2508 reg.exe 2516 reg.exe 1884 reg.exe 1812 reg.exe 672 reg.exe 1688 reg.exe 904 reg.exe 2588 reg.exe 1804 reg.exe 2372 reg.exe 2784 reg.exe 2932 reg.exe 1276 reg.exe 112 reg.exe 2412 reg.exe 1400 reg.exe 2504 reg.exe 3040 reg.exe 2056 reg.exe 828 reg.exe 1188 reg.exe 1928 reg.exe 1868 reg.exe 1660 reg.exe 1608 reg.exe 2648 reg.exe 2240 reg.exe 2056 reg.exe 944 reg.exe 2560 reg.exe 2868 reg.exe 1528 reg.exe 1408 reg.exe 1972 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3068 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3068 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3052 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3052 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 672 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 672 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1916 reg.exe 1916 reg.exe 1444 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1444 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2280 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2280 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1576 reg.exe 1576 reg.exe 616 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 616 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2992 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2992 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1652 conhost.exe 1652 conhost.exe 2348 reg.exe 2348 reg.exe 2660 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2660 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2732 conhost.exe 2732 conhost.exe 2552 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2552 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1924 reg.exe 1924 reg.exe 1956 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1956 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 672 reg.exe 672 reg.exe 2352 conhost.exe 2352 conhost.exe 2756 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2756 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1436 conhost.exe 1436 conhost.exe 1720 cmd.exe 1720 cmd.exe 2408 conhost.exe 2408 conhost.exe 1900 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1900 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1936 reg.exe 1936 reg.exe 2876 conhost.exe 2876 conhost.exe 2648 reg.exe 2648 reg.exe 2304 conhost.exe 2304 conhost.exe 2028 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2028 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2264 reg.exe 2264 reg.exe 2720 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2720 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2164 hYwcMcoU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe 2164 hYwcMcoU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2928 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 28 PID 2812 wrote to memory of 2928 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 28 PID 2812 wrote to memory of 2928 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 28 PID 2812 wrote to memory of 2928 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 28 PID 2812 wrote to memory of 2164 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 31 PID 2812 wrote to memory of 2164 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 31 PID 2812 wrote to memory of 2164 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 31 PID 2812 wrote to memory of 2164 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 31 PID 2812 wrote to memory of 544 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 29 PID 2812 wrote to memory of 544 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 29 PID 2812 wrote to memory of 544 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 29 PID 2812 wrote to memory of 544 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 29 PID 544 wrote to memory of 2804 544 cmd.exe 33 PID 544 wrote to memory of 2804 544 cmd.exe 33 PID 544 wrote to memory of 2804 544 cmd.exe 33 PID 544 wrote to memory of 2804 544 cmd.exe 33 PID 2812 wrote to memory of 2880 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 32 PID 2812 wrote to memory of 2880 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 32 PID 2812 wrote to memory of 2880 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 32 PID 2812 wrote to memory of 2880 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 32 PID 2812 wrote to memory of 2412 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 34 PID 2812 wrote to memory of 2412 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 34 PID 2812 wrote to memory of 2412 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 34 PID 2812 wrote to memory of 2412 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 34 PID 2812 wrote to memory of 2460 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 36 PID 2812 wrote to memory of 2460 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 36 PID 2812 wrote to memory of 2460 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 36 PID 2812 wrote to memory of 2460 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 36 PID 2812 wrote to memory of 472 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 38 PID 2812 wrote to memory of 472 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 38 PID 2812 wrote to memory of 472 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 38 PID 2812 wrote to memory of 472 2812 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 38 PID 472 wrote to memory of 1132 472 cmd.exe 41 PID 472 wrote to memory of 1132 472 cmd.exe 41 PID 472 wrote to memory of 1132 472 cmd.exe 41 PID 472 wrote to memory of 1132 472 cmd.exe 41 PID 2804 wrote to memory of 3040 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 42 PID 2804 wrote to memory of 3040 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 42 PID 2804 wrote to memory of 3040 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 42 PID 2804 wrote to memory of 3040 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 42 PID 3040 wrote to memory of 3068 3040 cmd.exe 44 PID 3040 wrote to memory of 3068 3040 cmd.exe 44 PID 3040 wrote to memory of 3068 3040 cmd.exe 44 PID 3040 wrote to memory of 3068 3040 cmd.exe 44 PID 2804 wrote to memory of 1460 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 45 PID 2804 wrote to memory of 1460 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 45 PID 2804 wrote to memory of 1460 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 45 PID 2804 wrote to memory of 1460 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 45 PID 2804 wrote to memory of 1684 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 46 PID 2804 wrote to memory of 1684 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 46 PID 2804 wrote to memory of 1684 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 46 PID 2804 wrote to memory of 1684 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 46 PID 2804 wrote to memory of 1860 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 48 PID 2804 wrote to memory of 1860 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 48 PID 2804 wrote to memory of 1860 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 48 PID 2804 wrote to memory of 1860 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 48 PID 2804 wrote to memory of 1876 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 50 PID 2804 wrote to memory of 1876 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 50 PID 2804 wrote to memory of 1876 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 50 PID 2804 wrote to memory of 1876 2804 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 50 PID 1876 wrote to memory of 1040 1876 cmd.exe 53 PID 1876 wrote to memory of 1040 1876 cmd.exe 53 PID 1876 wrote to memory of 1040 1876 cmd.exe 53 PID 1876 wrote to memory of 1040 1876 cmd.exe 53 -
System policy modification 1 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\QGkEYsEM\qOkoEwww.exe"C:\Users\Admin\QGkEYsEM\qOkoEwww.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"6⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"8⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"10⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC11⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"12⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"14⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"16⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC17⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"18⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"20⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
PID:824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:912
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SQgIMUQI.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""22⤵PID:1404
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵PID:2488
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"22⤵PID:904
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵PID:2152
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eGcMksQY.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""20⤵PID:2956
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:1892
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vQwgUQsI.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""18⤵PID:2436
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:1192
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- Modifies registry key
PID:3040
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:3068
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1804
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:1076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kEUwQoUo.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""16⤵PID:1864
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:2944
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:2172
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:1888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:524
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
PID:268
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pIgMIMUY.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""14⤵PID:2652
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:2876
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:2432
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
PID:1188
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CUIEQosk.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""12⤵PID:1520
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:2108
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:2076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:2560
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
PID:2056
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mOsIUsME.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""10⤵PID:1480
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:780
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:1008
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:2264
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:2112
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HMYUIQkM.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""8⤵PID:1652
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:1388
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PecIUQYM.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""6⤵PID:1224
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2228
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:760
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:3044
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:1460
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:1860
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IMMsMsco.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1040
-
-
-
-
-
C:\ProgramData\PKYgEwwk\hYwcMcoU.exe"C:\ProgramData\PKYgEwwk\hYwcMcoU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2164
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:2880
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2412
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2460
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CKcQsIIM.bat" "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1132
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "36077647112464603611159230380-202884381-15479356751264696939-20863236861220088952"1⤵
- Modifies visibility of file extensions in Explorer
PID:3044
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-484476687-20946366-18207128561731092841-9999808671769510641-9197535851410358713"1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC1⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"2⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC3⤵PID:2348
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"4⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"6⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC7⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"8⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"10⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC11⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"12⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"14⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC15⤵PID:672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"16⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC17⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"18⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"20⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC21⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"22⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC23⤵PID:1720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"24⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC25⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"26⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"28⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC29⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"30⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC31⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"32⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC33⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"34⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC35⤵PID:2304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"36⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"38⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC39⤵PID:2264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"40⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"42⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC43⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"44⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC45⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"46⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC47⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"48⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC49⤵
- UAC bypass
- System policy modification
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"50⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC51⤵PID:2056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"52⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC53⤵PID:2812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"54⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC55⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"56⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC57⤵PID:2980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"58⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC59⤵
- UAC bypass
- System policy modification
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"60⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC61⤵PID:1860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"62⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC63⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"64⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC65⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"66⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC67⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"68⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC69⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"70⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC71⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"72⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC73⤵PID:1864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"74⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC75⤵
- Modifies visibility of file extensions in Explorer
PID:1264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"76⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC77⤵PID:1868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"78⤵
- UAC bypass
- System policy modification
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC79⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"80⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC81⤵PID:1292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"82⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC83⤵PID:1444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"84⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC85⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"86⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC87⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"88⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC89⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"90⤵
- UAC bypass
- System policy modification
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC91⤵PID:1240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"92⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC93⤵PID:1756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"94⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC95⤵PID:1496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"96⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC97⤵
- Modifies visibility of file extensions in Explorer
PID:780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"98⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC99⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"100⤵
- Modifies visibility of file extensions in Explorer
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC101⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"102⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC103⤵PID:760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"104⤵
- Modifies visibility of file extensions in Explorer
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC105⤵PID:684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"106⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC107⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"108⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC109⤵PID:3004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"110⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC111⤵
- Modifies visibility of file extensions in Explorer
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"112⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC113⤵PID:1132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"114⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC115⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"116⤵
- Modifies visibility of file extensions in Explorer
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC117⤵
- Modifies visibility of file extensions in Explorer
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"118⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC119⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"120⤵
- UAC bypass
- System policy modification
PID:544 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC121⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"122⤵PID:1660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-