Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe
-
Size
255KB
-
MD5
1534eaa496c539f651cba0673aa69fe0
-
SHA1
777326725c2915a75cc2bf9608478d9e4bbf36e9
-
SHA256
44e4a132d32101a8ecbd48436e2a538ac0e5e685d65b03f14dbd65d38b99c618
-
SHA512
3ea8d44e931ee2a237b2acc957da926215bab93e5859002a3028ec81c80aedb934190cd17c0c0d19313f2053b34e310dc9b2221188621d6aed1d8af593487693
-
SSDEEP
6144:lZyKQfO3YW4hhXFWAvSIuqCffLbekukaXDxylaT:vy44xWAKmCfffekO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (85) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation OEAsEMMY.exe -
Executes dropped EXE 3 IoCs
pid Process 3172 OEAsEMMY.exe 1612 osMowwws.exe 4868 clist.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OEAsEMMY.exe = "C:\\Users\\Admin\\cIAkYYYw\\OEAsEMMY.exe" 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\osMowwws.exe = "C:\\ProgramData\\BEsUoQkA\\osMowwws.exe" 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OEAsEMMY.exe = "C:\\Users\\Admin\\cIAkYYYw\\OEAsEMMY.exe" OEAsEMMY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\osMowwws.exe = "C:\\ProgramData\\BEsUoQkA\\osMowwws.exe" osMowwws.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe OEAsEMMY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 4836 reg.exe 1212 reg.exe 4288 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3172 OEAsEMMY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe 3172 OEAsEMMY.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3172 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 30 PID 3044 wrote to memory of 3172 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 30 PID 3044 wrote to memory of 3172 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 30 PID 3044 wrote to memory of 1612 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 29 PID 3044 wrote to memory of 1612 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 29 PID 3044 wrote to memory of 1612 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 29 PID 3044 wrote to memory of 2304 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 28 PID 3044 wrote to memory of 2304 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 28 PID 3044 wrote to memory of 2304 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 28 PID 2304 wrote to memory of 4868 2304 cmd.exe 26 PID 2304 wrote to memory of 4868 2304 cmd.exe 26 PID 3044 wrote to memory of 4288 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 25 PID 3044 wrote to memory of 4288 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 25 PID 3044 wrote to memory of 4288 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 25 PID 3044 wrote to memory of 1212 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 24 PID 3044 wrote to memory of 1212 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 24 PID 3044 wrote to memory of 1212 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 24 PID 3044 wrote to memory of 4836 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 23 PID 3044 wrote to memory of 4836 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 23 PID 3044 wrote to memory of 4836 3044 2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_1534eaa496c539f651cba0673aa69fe0_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:4836
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1212
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\clist.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2304
-
-
C:\ProgramData\BEsUoQkA\osMowwws.exe"C:\ProgramData\BEsUoQkA\osMowwws.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1612
-
-
C:\Users\Admin\cIAkYYYw\OEAsEMMY.exe"C:\Users\Admin\cIAkYYYw\OEAsEMMY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\clist.exeC:\Users\Admin\AppData\Local\Temp\clist.exe1⤵
- Executes dropped EXE
PID:4868
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD544ac9565a607af6ba841954a027d0e27
SHA167d6cf532b4a77a818aa224f010f881d949546af
SHA256dc417ebf3c01fd8370a6250d4bbdaf332f1be0e87784d8cba7be7f3d967d9219
SHA5127bb93e310d10428f206a65b1d908c8a60a376747e4955649cb070da41815a650b734bcd822728cddbd5eb11d7b44b1f64848ddd02779e7df496e4a2524a8ba66
-
Filesize
92KB
MD55329e980a381cafdf8b0fe0f6a69e3ad
SHA16fac7703e6fd6889514759ba374a6fe40a45d322
SHA256487bf795a5283fa6d2ac84c133d84bbbe43b80bf24a1922e20986a8fb4684fe1
SHA51215048df188cb2ebd934d3ff5dd648bb9bc653c9bd67c6ae907626ef9e82cfdef95f2d1eb7f477822671ef6e1729a9cfc45ca47031743bd0fcee8932e78cce5e6
-
Filesize
1.1MB
MD5201841cd5e184dcab29cbce2715f1e88
SHA1235e869d232f6a8e0c47b416ede773a8dc3b682e
SHA256c3bce10c4a7cbef25e5e14e6aca21e886e53d25860d3610a2233f8ffbf39d0c2
SHA512a1121b1f6486a999ebde55e983a29870e2b3b549ece5957ba619aa3bc2daa454e8dbeda6729740b29c3ba085d36ddd39243aecead9a05a7afe76c782b80c4939
-
Filesize
92KB
MD599f051a2d144ed1d94d9d6891640d9a9
SHA124756f1d3f0344b7344456d418e576ff334a80dd
SHA256d5887ef3dc4cc7e79e2cef1a4df677236c048e3e069bbcd7b8d8a0f4514d48a0
SHA51258111bafa754d17f7cb8e219f62b6c881bf0e71f5e7f8b7df133d3440a0f84261c1a59724c06af746a6e69d226eac362008fe678302684e93cb1b40b4f757f71
-
Filesize
569KB
MD58bfd2f825dde62012345b1b2133431a7
SHA174941b7111c7d5848a9076f517070ce2554e67ad
SHA256bc42eb92c4ed6c2dd3fc57777f30842fe3c8d2df7e33a8a1c1ff5cb3a615848d
SHA51238e6f372c2a7b853538aae0186d64e2e642e8567830678192b2f4848f5e959288ffd6500eea2ead1e34765e52c08910fda5937a26451b2137935e3ba040d4117