Analysis
-
max time kernel
17s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe
-
Size
223KB
-
MD5
47f3c001dc7c413522614ed66223140c
-
SHA1
5401dcacd15e0d4384777bf5d7edb94b01687b78
-
SHA256
2ea6f1b7f57e6fb1190b5a8c9dab9ed8a3c097bc250061dd34e9c27089362b42
-
SHA512
97d6f0424b98e43c92b4d49e1be8734e767640511034ea5f1e97f7044fa5cedb43242cd5903312ecdde9e70287a320ea0396fccf8e4590a613ba641796f1b1d9
-
SSDEEP
6144:PgF1ozMwnGvjpHf/DOY9zlITVgt5GMppppppppppppppppppppppp:PgF1ogeo1NN6TOW
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3536 YAoIIAUM.exe 1820 uaIkcEEQ.exe 4284 calc_avx_clear_pattern.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YAoIIAUM.exe = "C:\\Users\\Admin\\xMEsgMwY\\YAoIIAUM.exe" 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uaIkcEEQ.exe = "C:\\ProgramData\\EcEAkoIg\\uaIkcEEQ.exe" 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YAoIIAUM.exe = "C:\\Users\\Admin\\xMEsgMwY\\YAoIIAUM.exe" YAoIIAUM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uaIkcEEQ.exe = "C:\\ProgramData\\EcEAkoIg\\uaIkcEEQ.exe" uaIkcEEQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 3484 reg.exe 2848 reg.exe 1796 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3536 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 89 PID 2424 wrote to memory of 3536 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 89 PID 2424 wrote to memory of 3536 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 89 PID 2424 wrote to memory of 1820 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 91 PID 2424 wrote to memory of 1820 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 91 PID 2424 wrote to memory of 1820 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 91 PID 2424 wrote to memory of 2480 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 92 PID 2424 wrote to memory of 2480 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 92 PID 2424 wrote to memory of 2480 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 92 PID 2424 wrote to memory of 3484 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 94 PID 2424 wrote to memory of 3484 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 94 PID 2424 wrote to memory of 3484 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 94 PID 2424 wrote to memory of 1796 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 96 PID 2424 wrote to memory of 1796 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 96 PID 2424 wrote to memory of 1796 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 96 PID 2424 wrote to memory of 2848 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 95 PID 2424 wrote to memory of 2848 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 95 PID 2424 wrote to memory of 2848 2424 2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe 95 PID 2480 wrote to memory of 4284 2480 cmd.exe 100 PID 2480 wrote to memory of 4284 2480 cmd.exe 100 PID 2480 wrote to memory of 4284 2480 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_47f3c001dc7c413522614ed66223140c_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\xMEsgMwY\YAoIIAUM.exe"C:\Users\Admin\xMEsgMwY\YAoIIAUM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3536
-
-
C:\ProgramData\EcEAkoIg\uaIkcEEQ.exe"C:\ProgramData\EcEAkoIg\uaIkcEEQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\calc_avx_clear_pattern.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\calc_avx_clear_pattern.exeC:\Users\Admin\AppData\Local\Temp\calc_avx_clear_pattern.exe3⤵
- Executes dropped EXE
PID:4284
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:2848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5fad561f7a22b327b6a4c3a65b4b21881
SHA18213a130572b54b4036f38c4526fd4a197016cf0
SHA2562bddc6ef22b52508995b974da021b8315a37ae9a3c8a22033e8ba86b8d09f761
SHA512c46748f223a107388ab2009b27a5f55f035b3f713166ee6cedfe964c1808beaafca5a7053a7319640a967afd8ebf2779d45bba1b8db49369c8e27c30f0733f60
-
Filesize
140KB
MD55460f825bfb2abac5b630aca6ae9e8ab
SHA16e4f681df79f477545e5755ef276ef769f112137
SHA256b86cdb11361260ca5ef19ef9710f733883c5c222193d105af7e3c976093430c0
SHA5122ab3866085230152e713a76b2470d0c293909b51f852f793da676008791e9d544f4cde814b17fad465c44cef18b961b6db8ef2b10597c866124267764868e663
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\background.png.exe
Filesize238KB
MD564a1eaa089e83073c37bab08d786c64a
SHA1133527b6dc00752d9e26fff6cec1fceced6987fd
SHA25693eed9c56dc86fb5ea43f5aea0b2f5c41c9aa186762254fe1d68d907818eb1c1
SHA51278c05ad4536f0a8d811c063441d04e09586e6c6e2a7008827fadf325c42182939887ed591a4cc385dca74be0eba502a8b6f27802a00f5b832b179526be8f854a
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\watermark.png.exe
Filesize139KB
MD557e69a1faa0c1b1302d4157da47a6f7a
SHA12b779baddbf14451087f14f48971477a46add330
SHA256a647e79c717d1a2e6416ee06e9b73a68e8dffe49b6c1aba0fb6ee361908a5e87
SHA5121ac14fb0c34b60825275373f28ba06d5e54185c7eefd8b9ebd84c557757f1137b9ff7eb63ea85c2c9e2dc39f711fbb57bfe3e2e44ceead0448591cc29d9e1b53
-
Filesize
4KB
MD5ee421bd295eb1a0d8c54f8586ccb18fa
SHA1bc06850f3112289fce374241f7e9aff0a70ecb2f
SHA25657e72b9591e318a17feb74efa1262e9222814ad872437094734295700f669563
SHA512dfd36dff3742f39858e4a3e781e756f6d8480caa33b715ad1a8293f6ef436cdc84c3d26428230cdac8651c1ee7947b0e5bb3ac1e32c0b7bbb2bfed81375b5897
-
Filesize
92KB
MD5964506e586904dfe0bcb16d10e4399b3
SHA16700968724f1e9b7a918be369d392cacf5ac4211
SHA25699f1aaf242152445539a45f38572c42c88477c46f180f1c9384765789a12714d
SHA5129c4d2916a72c0bcf421a64e50930cea36feea6b9e1b3d3dfcf3537b6dc6d00f3de53664759d941fee7c4a7a34ffbdf95b70be7de22d0b0a430717edc44618934
-
Filesize
237KB
MD5f845fc5a14eb038ef25315ab98462386
SHA16af99d6203aa72dac9a007a162be5e2b0cff9fa1
SHA25699d0585e81172e6c639e059115825b8abee8fd75a8572507a62c8c253aff42a8
SHA512925384027edc83f77c4bfe7159cf1ffa4a6f449af1f0642db37730e06bf2c8a25120576c29829c8aa356331d1669f47f259aa5fc1d29e3929c8b0e21a53d138f
-
Filesize
152KB
MD59b3780cf3538cdd74ff46e24c308fc3b
SHA1a1a2e29b4c3d02bf9317c54ef334c52143d284a9
SHA2565eda66b17c9f566b784633b17f9dabefd8b83e292daa182d6cc5e9538ccbfd14
SHA51222a33c19a7ad4ed4230eac2c58ed26971ec7cb222005df53dcf376998c4416910fbab4cafc6d2f6ac72879301058102acf425b4576ab1a1360066ef2087cbb49
-
Filesize
112KB
MD5e9cc8c20b0e682c77b97e6787de16e5d
SHA18be674dec4fcf14ae853a5c20a9288bff3e0520a
SHA256ef854d21cbf297ee267f22049b773ffeb4c1ff1a3e55227cc2a260754699d644
SHA5121a3b9b2d16a4404b29675ab1132ad542840058fd356e0f145afe5d0c1d9e1653de28314cd24406b85f09a9ec874c4339967d9e7acb327065448096c5734502c7
-
Filesize
150KB
MD572b58f0248e487b54916d520566f59e6
SHA1f2b66dc0315a5711765a8f9b51abb028d38cccf7
SHA256c7525c5a737f1a638ef3309418cb27251ebfd474d433c4118563e01734c2a71f
SHA512874effbd8ec8a5e5e106a22d412d8dba20c2c6445211e8d735d634c515341a7f93d86528f65621c5b29898b952c97e5db517b9ab633880786965290fec1bc65e
-
Filesize
3KB
MD5f75ed4ea8d9f4ae281ff81a73b0f4aa8
SHA15450958bdc500bed952c548e99be446d98c0ece5
SHA2565562ca205bf72038d9a2958ce783d06fdfc44a2fda1d021db830b99b4ce967ba
SHA512bfacb1c9ef249ca10be0c6daef15c100779c6190ff98ec2b3b71605ee987841ae16003b921d77d35369ab89dfe3cff1af98ba3e546edead8cf4a9eed447dd038
-
Filesize
2.3MB
MD51d0bd1e9dd2661fe266860db04891806
SHA1ab811633ea163021a691a3cc7c6fd527a861d63c
SHA25604fd5945cc04be6ebf52087d7c14549e00034323387060092ff31581cd4c66fc
SHA512dbe71743d1c773adaabadce82c239690958dc71c0b2f734ba417fd7a5ffce4be62b3dc93975e4aace1250dd4893874e507a0eb951ef14c2006c81f7a95691724
-
Filesize
569KB
MD5ca85bbd2bde88989673e97236dfae897
SHA155e25f0cfe206d915c9f706a89a4ea0927b4ae58
SHA2566f8bef4a27e6497a24f2fd151d5806135de2dc515eef938ba339f0f27b8d9e08
SHA5126336c6edc45c98f2aee1d931303d62cf1796f924af0e8757f32f85c886e588559b2c0cd1f686510f8b8646b1cbada104329a6504e033749c9cec2fe9a34f3dc9
-
Filesize
92KB
MD5d3c05492b8f570bbf779e40fdbe79be2
SHA1ff6d9b5456b01dda48b187c0604051231715d83f
SHA2565fe5ca64118a34406efc6cfd095e3a98adfee38a0db761a6cf7a72f8fdc93940
SHA512b0a2da81061ae62f4995216bbcd950b50a9ac53b455797f9bdac5724554ccd121f13c31901545cf76271ad9b4d1ceb6162559c3916d456e95d9663d054a0ead1
-
Filesize
110KB
MD517a4c6c66a31c0357f5c06a70d003fa0
SHA12d89ba985ab32bce2086ad687c8556666ee94b5a
SHA256ad34e98bf55e5a515ee4399983abe2430391fd1bea0cac3de87b1be66e9dabc7
SHA5122d0a1dc05e2092dc06fb6313d052cd50bb4573a59028f4c11dceca9cb13eb46774ed4372e0900c6979db2a74254b2b7c3aafba9e39a0d5fc4eea31bdcdbbb033