Analysis
-
max time kernel
15s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe
-
Size
254KB
-
MD5
57ce35ea53f175ab1a6b5c4ac6ba0a58
-
SHA1
7da2d42f85e73ae0531b67a0d01054911fe77b5e
-
SHA256
ed5bb4d7ce6662c79b8fc1e9804b681ee8c5b422f2ce79ce8970f41bf4251976
-
SHA512
557cd01facf32de068e49cb2c36a58895e3ee310d7e45f8c7612a3777c2f4ef45406576aa30d009906d9a6f46fa45a0bc251363c1781eadb04908ad73f6d58ea
-
SSDEEP
3072:35/RhkI6v+j1CKYEBy8eKGNgwvbxGTweSzFJC/SDi6ugdsuPnOjGx3y:35MkrfkewvbAce+y/SDkg6Hj0y
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3036 IkEQAIQw.exe 2940 QQogAgMI.exe 2760 chocolatey.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQogAgMI.exe = "C:\\ProgramData\\hsEogYso\\QQogAgMI.exe" 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IkEQAIQw.exe = "C:\\Users\\Admin\\QUMgAQgs\\IkEQAIQw.exe" IkEQAIQw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQogAgMI.exe = "C:\\ProgramData\\hsEogYso\\QQogAgMI.exe" QQogAgMI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IkEQAIQw.exe = "C:\\Users\\Admin\\QUMgAQgs\\IkEQAIQw.exe" 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 4532 reg.exe 3084 reg.exe 1632 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 444 wrote to memory of 3036 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 29 PID 444 wrote to memory of 3036 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 29 PID 444 wrote to memory of 3036 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 29 PID 444 wrote to memory of 2940 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 28 PID 444 wrote to memory of 2940 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 28 PID 444 wrote to memory of 2940 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 28 PID 444 wrote to memory of 4452 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 27 PID 444 wrote to memory of 4452 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 27 PID 444 wrote to memory of 4452 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 27 PID 4452 wrote to memory of 2760 4452 cmd.exe 26 PID 4452 wrote to memory of 2760 4452 cmd.exe 26 PID 444 wrote to memory of 1632 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 25 PID 444 wrote to memory of 1632 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 25 PID 444 wrote to memory of 1632 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 25 PID 444 wrote to memory of 3084 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 24 PID 444 wrote to memory of 3084 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 24 PID 444 wrote to memory of 3084 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 24 PID 444 wrote to memory of 4532 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 23 PID 444 wrote to memory of 4532 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 23 PID 444 wrote to memory of 4532 444 2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_57ce35ea53f175ab1a6b5c4ac6ba0a58_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:4532
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\chocolatey.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4452
-
-
C:\ProgramData\hsEogYso\QQogAgMI.exe"C:\ProgramData\hsEogYso\QQogAgMI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2940
-
-
C:\Users\Admin\QUMgAQgs\IkEQAIQw.exe"C:\Users\Admin\QUMgAQgs\IkEQAIQw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\chocolatey.exeC:\Users\Admin\AppData\Local\Temp\chocolatey.exe1⤵
- Executes dropped EXE
PID:2760
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5f59b10cd1cd733fb55f3e9337837650f
SHA1c6f8ef5320e875c6854b3d5d2513c7f4e6b2461b
SHA256373599adca7034defe8399faa9b702a052fa491ee2b47cdab01c9932a465a722
SHA512c33383b35bb634e66937c7bc3750c54bafde6d322e0a0687e11370579a79fd88860bdc9d08e1838ba48c09d4de9eefa57f90522a0be2778cc63c9b840eb5cb56
-
Filesize
92KB
MD55a8e0daba8ce26a198e3426ba2a7adc6
SHA182cd76a90bd09e7b8915799c353e838c3994cce6
SHA256787748bd873edec721b836c2830b38edc40c2670f34176cd1a5995af5092ed32
SHA5129c1c5b9a7d1f49b349c12109484379edd423ac8eb1487cf86cfe359bd96ecaaf89c3ddf333a4039555510eb40e7c73aa19fdf7ab949080c671d826689aafd4f4
-
Filesize
109KB
MD57635d5a236fae87c66c40471a65ddcdd
SHA190ac038f0ebf7bb94e88134cf1750dcbd76d1471
SHA256b1005b29c1d90e8ddad230779fb30a366c79622824de8898a22bc4868628b396
SHA5123456d2c73f76fe0611e3b7f2681d3cbbc291285f5c422f172ee44dd452a0cb598d59b482520c5e1b922352053c06abdeb3dc1474f62e623a10da2fbeb3b62ba1