Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2023 15:28
Static task
static1
Behavioral task
behavioral1
Sample
2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe
-
Size
245KB
-
MD5
2b8df627c8569cc1b1d3254598fde007
-
SHA1
071ca7c5c043a99c4d14470b9e2a9b60432dd1d6
-
SHA256
cb25d79bd562a8a942a428064ad99df4e1bd0b760a3ee3aa094f54ce13cf688a
-
SHA512
392689f50448cc5a8478bfa2fc276a162def723180127cde6ca7071b3edf1b6c0b1ce67141d35b26c9d1e3dadb6fbd4b8ce1c0d93de2b772bf00f1ce56fe0009
-
SSDEEP
6144:dmB7pzJBKxGwvRlZcIebNZGNZ8oxFB11:dsF6Rfc9QNS
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TrustedInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3324 yWIkQYgM.exe 2336 lKccIQQk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yWIkQYgM.exe = "C:\\Users\\Admin\\gWgogwMw\\yWIkQYgM.exe" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lKccIQQk.exe = "C:\\ProgramData\\WWEMgggU\\lKccIQQk.exe" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yWIkQYgM.exe = "C:\\Users\\Admin\\gWgogwMw\\yWIkQYgM.exe" yWIkQYgM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lKccIQQk.exe = "C:\\ProgramData\\WWEMgggU\\lKccIQQk.exe" lKccIQQk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe yWIkQYgM.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe yWIkQYgM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2720 reg.exe 4896 reg.exe 3520 reg.exe 5032 Process not Found 100 reg.exe 1040 reg.exe 1608 reg.exe 3044 reg.exe 1356 reg.exe 4636 Process not Found 3216 Process not Found 1860 reg.exe 4868 reg.exe 2016 reg.exe 2220 reg.exe 2164 reg.exe 456 reg.exe 2868 Process not Found 2644 Process not Found 4408 reg.exe 2468 Process not Found 3416 Process not Found 3544 reg.exe 1184 reg.exe 4500 reg.exe 2192 reg.exe 4492 reg.exe 4272 reg.exe 1040 Process not Found 5100 Process not Found 4144 reg.exe 4532 reg.exe 1384 reg.exe 3344 reg.exe 3036 reg.exe 4956 reg.exe 2384 reg.exe 3416 reg.exe 3284 reg.exe 3424 reg.exe 1644 reg.exe 3616 Process not Found 1480 reg.exe 4304 reg.exe 3344 reg.exe 4280 reg.exe 1472 reg.exe 3096 reg.exe 2900 reg.exe 1196 reg.exe 4300 reg.exe 3848 reg.exe 2940 reg.exe 100 reg.exe 1200 reg.exe 756 Process not Found 3732 reg.exe 4956 reg.exe 3976 reg.exe 440 reg.exe 2312 reg.exe 5100 reg.exe 3772 reg.exe 844 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3784 Process not Found 3784 Process not Found 3784 Process not Found 3784 Process not Found 1372 cmd.exe 1372 cmd.exe 1372 cmd.exe 1372 cmd.exe 1008 Process not Found 1008 Process not Found 1008 Process not Found 1008 Process not Found 4156 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4156 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4156 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4156 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4476 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4476 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4476 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4476 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4616 cmd.exe 4616 cmd.exe 4616 cmd.exe 4616 cmd.exe 2296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 5060 reg.exe 5060 reg.exe 5060 reg.exe 5060 reg.exe 3036 Conhost.exe 3036 Conhost.exe 3036 Conhost.exe 3036 Conhost.exe 2240 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2240 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2240 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 2240 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 3544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 1544 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 4620 Conhost.exe 4620 Conhost.exe 4620 Conhost.exe 4620 Conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3324 yWIkQYgM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe 3324 yWIkQYgM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3324 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 89 PID 2388 wrote to memory of 3324 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 89 PID 2388 wrote to memory of 3324 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 89 PID 2388 wrote to memory of 2336 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 86 PID 2388 wrote to memory of 2336 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 86 PID 2388 wrote to memory of 2336 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 86 PID 2388 wrote to memory of 3632 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 87 PID 2388 wrote to memory of 3632 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 87 PID 2388 wrote to memory of 3632 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 87 PID 2388 wrote to memory of 3228 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 90 PID 2388 wrote to memory of 3228 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 90 PID 2388 wrote to memory of 3228 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 90 PID 2388 wrote to memory of 2152 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 93 PID 2388 wrote to memory of 2152 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 93 PID 2388 wrote to memory of 2152 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 93 PID 2388 wrote to memory of 3732 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 92 PID 2388 wrote to memory of 3732 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 92 PID 2388 wrote to memory of 3732 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 92 PID 2388 wrote to memory of 3508 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 91 PID 2388 wrote to memory of 3508 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 91 PID 2388 wrote to memory of 3508 2388 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 91 PID 3632 wrote to memory of 4296 3632 cmd.exe 98 PID 3632 wrote to memory of 4296 3632 cmd.exe 98 PID 3632 wrote to memory of 4296 3632 cmd.exe 98 PID 3508 wrote to memory of 1332 3508 cmd.exe 99 PID 3508 wrote to memory of 1332 3508 cmd.exe 99 PID 3508 wrote to memory of 1332 3508 cmd.exe 99 PID 4296 wrote to memory of 3640 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 100 PID 4296 wrote to memory of 3640 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 100 PID 4296 wrote to memory of 3640 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 100 PID 4296 wrote to memory of 5032 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 103 PID 4296 wrote to memory of 5032 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 103 PID 4296 wrote to memory of 5032 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 103 PID 4296 wrote to memory of 2384 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 152 PID 4296 wrote to memory of 2384 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 152 PID 4296 wrote to memory of 2384 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 152 PID 4296 wrote to memory of 2872 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 149 PID 4296 wrote to memory of 2872 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 149 PID 4296 wrote to memory of 2872 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 149 PID 4296 wrote to memory of 4620 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 105 PID 4296 wrote to memory of 4620 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 105 PID 4296 wrote to memory of 4620 4296 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 105 PID 3640 wrote to memory of 2604 3640 cmd.exe 106 PID 3640 wrote to memory of 2604 3640 cmd.exe 106 PID 3640 wrote to memory of 2604 3640 cmd.exe 106 PID 4620 wrote to memory of 3852 4620 cmd.exe 111 PID 4620 wrote to memory of 3852 4620 cmd.exe 111 PID 4620 wrote to memory of 3852 4620 cmd.exe 111 PID 2604 wrote to memory of 4376 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 113 PID 2604 wrote to memory of 4376 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 113 PID 2604 wrote to memory of 4376 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 113 PID 2604 wrote to memory of 440 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 162 PID 2604 wrote to memory of 440 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 162 PID 2604 wrote to memory of 440 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 162 PID 2604 wrote to memory of 2476 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 160 PID 2604 wrote to memory of 2476 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 160 PID 2604 wrote to memory of 2476 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 160 PID 2604 wrote to memory of 4280 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 121 PID 2604 wrote to memory of 4280 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 121 PID 2604 wrote to memory of 4280 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 121 PID 2604 wrote to memory of 1624 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 180 PID 2604 wrote to memory of 1624 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 180 PID 2604 wrote to memory of 1624 2604 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe 180 PID 4376 wrote to memory of 3784 4376 cmd.exe 119 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\ProgramData\WWEMgggU\lKccIQQk.exe"C:\ProgramData\WWEMgggU\lKccIQQk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"6⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC7⤵PID:3784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"8⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC9⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"10⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC11⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"12⤵PID:1324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"14⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"16⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC17⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"18⤵PID:2272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"20⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC21⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"22⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC23⤵PID:3036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"24⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"26⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"28⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"30⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC31⤵PID:4620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"32⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC33⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"34⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC35⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"36⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC37⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"38⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC39⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"40⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC41⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"42⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC43⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"44⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC45⤵PID:1688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"46⤵PID:3128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC47⤵
- System policy modification
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"48⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC49⤵PID:2960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"50⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC51⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"52⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC53⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"54⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC55⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"56⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC57⤵PID:1868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"58⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC59⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"60⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC61⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"62⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC63⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"64⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC65⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"66⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC67⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"68⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC69⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"70⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC71⤵
- System policy modification
PID:4268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"72⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC73⤵PID:3848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"74⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC75⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"76⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC77⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"78⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC79⤵PID:912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"80⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC81⤵PID:4136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"82⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC83⤵PID:1184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"84⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC85⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"86⤵PID:4372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵
- UAC bypass
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC87⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"88⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC89⤵PID:2476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"90⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC91⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"92⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC93⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"94⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC95⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"96⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC97⤵PID:1280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"98⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC99⤵PID:3852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"100⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC101⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"102⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC103⤵PID:1820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"104⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC105⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"106⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC107⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"108⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC109⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"110⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC111⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"112⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC113⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"114⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC115⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"116⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC117⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"118⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC119⤵
- Modifies visibility of file extensions in Explorer
PID:4300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"120⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC121⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b8df627c8569cc1b1d3254598fde007_virlock_JC"122⤵PID:416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-