Analysis

  • max time kernel
    65s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 16:42

General

  • Target

    2024-02-19_9340ca5c5503cd135958f64de58f6bcb_virlock.exe

  • Size

    3.7MB

  • MD5

    9340ca5c5503cd135958f64de58f6bcb

  • SHA1

    cec151a56f0477c2b66a57159a05e492a0e7c42a

  • SHA256

    e84c5a6e36926f5b528e069f8f7590aae6a1b38fc8dfd1492f023c15edd2f537

  • SHA512

    de5676248df77fe8d45e19dfb8615eb3c789aeb9dd5c454f236ad1a4266d8786c278e8ed03fe081a9bbadc3f88823f1756365cd50eef17141a26123c3b90e2f4

  • SSDEEP

    49152:8UUVCmgh3KGXgzLaZdV3QN+E2iPzGFp1jOrwGN3GmmF0+MO/kEPYC3yTsG:r1haOZon2YzEROsT0X

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_9340ca5c5503cd135958f64de58f6bcb_virlock.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_9340ca5c5503cd135958f64de58f6bcb_virlock.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\RqgokUYU\OkIcwAYk.exe
      "C:\Users\Admin\RqgokUYU\OkIcwAYk.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\ProgramData\FkwAsUkw\aEgMIcMs.exe
        "C:\ProgramData\FkwAsUkw\aEgMIcMs.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:2032
    • C:\ProgramData\FkwAsUkw\aEgMIcMs.exe
      "C:\ProgramData\FkwAsUkw\aEgMIcMs.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\ESETOnlineScannerBTS.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\ESETOnlineScannerBTS.exe
        C:\Users\Admin\AppData\Local\Temp\ESETOnlineScannerBTS.exe
        3⤵
        • Executes dropped EXE
        PID:1104
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:952
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:2416
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:1968
  • C:\ProgramData\gGcogcMw\ziUocIIo.exe
    C:\ProgramData\gGcogcMw\ziUocIIo.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2280
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1.1MB

    MD5

    7f6eb330dfa959e82b1b9589ab40a2e2

    SHA1

    40fc87449fd0e8842008c1a3d8155842536f2d9e

    SHA256

    0ea51fc44c4eb166bb3990eb21623c70291f7a17050c8da57324ecfa99b0d3d7

    SHA512

    889fbf5f61c0930ae2fde14dfb4897d84578477c20643ad5fcd38c5c5ed5fa5f6e2d41aebed2a8e0136fdab3fad7a4db77f9c004d144c24a0e5c236d1fa660f1

  • C:\ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    119KB

    MD5

    9830e5d224da1aa01fe2c81140b33b7a

    SHA1

    e89986b08423c0b4987e3bbbabc66d0aba77fc89

    SHA256

    260469635b7f1a9ea4842d295531cdb589ccd719c79b4e1af9d29bbe37f3f250

    SHA512

    b3fc294ddcc11d084fe61a625ca5e7e2d4865a6aa6d2be7c5b2d3b1a0c8f2ede766745b0e1e62591efac6af7a51606336e80ea856a8cdca6c175dad9da038bb2

  • C:\ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    395KB

    MD5

    f258b1c67b86101ab8767e866b3eadbe

    SHA1

    1c53b36c27c77e7dc2d94b390af80daee079cda8

    SHA256

    b10e87a849ad3106974beb3e6860c0f59fe83fe110a5cb1d6f84bdce69b384ee

    SHA512

    cb45ffeaa8a843ba88afe4d1073e83d5a972679806dbecc4c16e033352bba084a1f5e07a7a954e1735a342200884441ead6d8633f5382f094f4431ed0071de82

  • C:\ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    87KB

    MD5

    5285d3eff95958196fccc570d1184ecb

    SHA1

    dcd36509057c0386d31f6051a0aefc669d604cc1

    SHA256

    c4276234509786c01400a63ca9014eb83b3d0aa2bb87bd4966f630be83211f68

    SHA512

    9504a3e0c985d39715562a0877dd43bc1007f9e2bd7c2798dc4494d2c23a3f9e72c952ff2f4e096ca26df83965a32277693bb3fb8b89ef63e439b060a77e7617

  • C:\ProgramData\gGcogcMw\ziUocIIo.exe

    Filesize

    86KB

    MD5

    34c33fa7ed864fb1dd08274ebaf62926

    SHA1

    3d63dab4f3ced7a8bf2c8968812a86d650cb0d2d

    SHA256

    ce8d4e1a93e39172695be46c0ffa4827568395473d2c8337d788bda070a4cbac

    SHA512

    85c8c5acf99a1d77321f3141176983cff2c32b680fa1438f59c7a0d7e3840423d9a61bc10b25e0324bf867f6312a0d7727bef40e0b4353ae03d33cfb93f99d00

  • C:\Users\Admin\AppData\Local\Temp\ESETOnlineScannerBTS.exe

    Filesize

    482KB

    MD5

    ef817c67c48c7b85f10e63457cad5224

    SHA1

    6a78075aa0b1588f38b9072a14c480c7893e0b29

    SHA256

    134e23691149b02934871c41b3cc4c4c84ef031cff8153c8a95c1ffc20d2a422

    SHA512

    a79d7f2a927f358c567980f86f21cf4082e435fcc724d4d978eca5c96011b410f203f1b328dbba8aefb9cae3d279c33b79cda75e455785d24aad0011f3289b1f

  • C:\Users\Admin\AppData\Local\Temp\ESETOnlineScannerBTS.exe

    Filesize

    576KB

    MD5

    ea9574eae5e9539abb139d3f6ef8d284

    SHA1

    94b62287e8c30caa4b0c4f5df19271e50a457fb3

    SHA256

    810e51987c9c0e17b0f1a388c255bbc0f98a1dc3381c6b94277b89ffdca58319

    SHA512

    2505591f7b33a4ef37971d0c851ee03610ad41fc204d7c22474c15f6e156cbfcd1ff03b15438f581bb1d3db17e52db3f40f11d71be013c38750b0a62e741a350

  • C:\Users\Admin\AppData\Local\Temp\LQQQooUY.bat

    Filesize

    4B

    MD5

    af2b461ef5181854467d9c61d3b52e66

    SHA1

    2d3f1e3c6c86e8c8a35325a44e258d9e145c6c6f

    SHA256

    c3742bee220c9c6c6b91255a1648d71f2ecb6f4ef4715aeb93e255d90b6a9e2d

    SHA512

    3faed682031eef4e5409c47eede6c78acf479de30c781fa004c90008f9932cc2f6c736f93f79f74f14cebe46d1e27cf192b3c7ccb3af2ac73425e590f9ea2ecf

  • C:\Users\Admin\RqgokUYU\OkIcwAYk.exe

    Filesize

    715KB

    MD5

    79365f19f857163757081aee0b418fa1

    SHA1

    8289b8eaf2b1f51b60901cb1011910af0c09a8d4

    SHA256

    2d38149f10eac6c9267776f9e79cf0bc5112b196628b21359da16fc30bd3213d

    SHA512

    cb6215c86792eb395d08d58318be9845503bcb8c6e9cc134746810fa1f4af7987fd81ac4c3f110fee8297d2ee551dadc0b75bf2180c880f65658e1a3603b9f69

  • C:\Users\Admin\RqgokUYU\OkIcwAYk.exe

    Filesize

    386KB

    MD5

    8ad0c1fba3af26ad4ab4dc7767feb041

    SHA1

    a0b8b34bc4d5d169b747cab407c6010fa4141145

    SHA256

    28d274721ce2e2f5970e1f4063e21901ed26f97e7d5698af840c677b5b842ee6

    SHA512

    57ff262f7b4512c3528568d59eeef42ffe1f21bd87208f1223326bc196df06b94bad5de4c919662dcb73c2d8951261cfaa7a3a4ade57a1e385618d29070a1266

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    781KB

    MD5

    33f8d8fb800bf54a128060121a6bb424

    SHA1

    e8624d0da07e01425653c952e341028c0c76d210

    SHA256

    e85054bbab2c715f6d82adaca98e25e5281310f2684cbea46acc062524126f30

    SHA512

    8047cf994bfbebbee8cfd3448ec37387c1c2e1d04ab2e7f528a2b8522281d643438e3f61dc8fa3138c257056aff5bc9f30a3fb98f2ffdcd746da1c948835a973

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1013KB

    MD5

    6131492859b17824bcf467f694b73d6d

    SHA1

    e2d01d52ab6f846bd4ffc723ea66e59112d4f2e6

    SHA256

    d0c4ae76fcaae98afc5e4f6eb3786590fcced8bbdd12db8575cc2b7998d4d070

    SHA512

    18fbd57466811b2a08736c3040b1484806f0eccfd022dd0277e50eb3bd97288249061bbc60f8bfe5ed05ca0a0421fc6cf7c341625fd2b397158d11460d3802c4

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

    Filesize

    393KB

    MD5

    028e860ff07cee575c6c91d18f425186

    SHA1

    786b71976aeac9439b4caf81e10b26c7cdd19624

    SHA256

    1cb8c768fe38d894a003c2c8542cd9bfbce213b00c9aa96f83d8599cb0494bcb

    SHA512

    bc5452601b1857be8b5a7b9a92e93526d30a3f070e9cdc54f37a77a5c36ccdd83b7e32c7fde78ca3dcf4a7340135f26242277e15327319f43b24edc36239ae02

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

    Filesize

    256KB

    MD5

    289ed4299411c3c5b7c544fd19725b56

    SHA1

    767e9d50cf9af5671ea975ca9718fb02c47d49fd

    SHA256

    93390cd26504162b205028866dee2ca9ee45c10cd7d1fad708083651aef23c8a

    SHA512

    0f1855af90210f10a4d445eee2fea80f7d7ece9c4384704157234a7177eb38b524d3a6666216bd96a13e58bea51ae0e204df92c5d91461b5902ed6fa4c6dd16a

  • \ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    347KB

    MD5

    7350e79c797d960bb0ce4c7b0bee9ef5

    SHA1

    8cb1303c16229aa848651e6b431e9077f2d7f9b7

    SHA256

    afafee265b41896f6fcfc28572acd70bcb14a1bd3bab826bdee1f7d205eb84ca

    SHA512

    e60ded862b63323a98162231b5c105385276cc722cc109bf07da2c6e52eb0deae59b08900764aaf3271c33d97ad1b379f51b9f9310b67d1e70d1b16a79a398e7

  • \ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    71KB

    MD5

    61566bc4bc6f77f57e034ba17a6776cd

    SHA1

    25c979a3e34e600b20f306192c0e577acc8e7df4

    SHA256

    e431dfe1ad3fc5dec8330918866ed6911716d4d4ce1492e48e0aea3a5ba1d9c1

    SHA512

    c0c6422e931fd19f40ee3aff829173be52be7cda13d84b5344a7557a4b588e4c3e7ff53f18eb78c24afa44109bb438731f3ae225d2af620c3a06734122111254

  • \ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    1KB

    MD5

    4835c652108de55aa129faba1f7be668

    SHA1

    536413bf51a65b66e59f57ff6200a1bee8f3d0c6

    SHA256

    64c19b8cdab05ea316707bcb88709e94d6cf6069e417066ea038c728dde39f32

    SHA512

    fac8b42fc05c2a7ef55f6b12c5b877ab6b7a220bd6cdad624eeaae8b374db85c865fb3751d429de6cb8d90ce36015bdbd5cc6cf02da8195b7c73d29ebf6b7cec

  • \ProgramData\FkwAsUkw\aEgMIcMs.exe

    Filesize

    45KB

    MD5

    e475f17358054568302cb9b9760c8024

    SHA1

    4ae6b05273092b1a0ac9fd98012d8dfaea788c01

    SHA256

    3059773d924e93767bea6fc1f24c3eeda210eccaed2ce7d9d8d02c6751d7d1fa

    SHA512

    198d320d6e213f5aa61346a94665f4a5eb1d56765d12d20143507aaad2ca996e36556b9b7d1b0912cbb9b99c796304da7d6aa652cc0f73ddbe0d907338dd164e

  • \ProgramData\gGcogcMw\ziUocIIo.exe

    Filesize

    64KB

    MD5

    403972c8c2d0d46f293179137ad13997

    SHA1

    48d84022325b762cfa0a4f717d4257a6d0fe3397

    SHA256

    5640e5abb00c010101bb7ba0d488a99296da26117ba04c8317809857c24d3669

    SHA512

    d311effd97df89dc079e7c4b7ddbf88933e3f424d4ec9cf9363816a9ead8c153c935835efdb2c050422518e84a2f2331f92fd7a710316b920a1527f4916cfdde

  • \Users\Admin\AppData\Local\Temp\ESETOnlineScannerBTS.exe

    Filesize

    64KB

    MD5

    10f00278bb91aa573ab62c9ff29a300c

    SHA1

    6b646ce9754ec0eae4871901abb7bbbc4e5d8c67

    SHA256

    f8a4cfc5a2a3c7b25d73e868997fbdd36d2552e5bb0ea93bbaf10eda0177f86e

    SHA512

    3144142468a505f3c9d9d646be67a8512bbe92efc61a60678d82dc91ab6b0e134e5e72375bb0a003ead8e97ca9a2e2e0efa8f52cc4659ea734e7ac9cb29996f9

  • \Users\Admin\RqgokUYU\OkIcwAYk.exe

    Filesize

    1.5MB

    MD5

    5f92017716a3bd9a5990702d5e4ad47e

    SHA1

    9e010bdaa44edeaf56b781f562a4b81d9e35382b

    SHA256

    36205af86c886a2fd31cfae13c6d94f2b86c102375a9aa6386d3830c2a1cb3f4

    SHA512

    a6d4272cbd01986470e7121d2944001f2c579f54ef8a11cb1951acff3be0ff0f8b624e079e80d48aa1140ac6b32e2f70c74608f9a55443bc29702f791e7df93d

  • \Users\Admin\RqgokUYU\OkIcwAYk.exe

    Filesize

    963KB

    MD5

    e235cc2688f3fd80a9996fb4870adb01

    SHA1

    c18a8237de6e7b84e7c4cc69c5adcf66c29ce15a

    SHA256

    409672a3950cff43eccb5758efcea7c204623d2a880ef0cb9a22a6648f5b566b

    SHA512

    5126e7f86755883efa558c4f1f7f15bcf4704e87bb379c15e75d1d55b368a687fbdb0249b8ba9c7d95b355410bff0d844e74b0a092f8ca3e70399886dd6f6968

  • memory/2032-78-0x0000000000400000-0x00000000005F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2032-56-0x0000000000400000-0x00000000005F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2032-41-0x0000000000300000-0x0000000000369000-memory.dmp

    Filesize

    420KB

  • memory/2280-37-0x0000000000400000-0x00000000005FE000-memory.dmp

    Filesize

    2.0MB

  • memory/2280-76-0x0000000000400000-0x00000000005FE000-memory.dmp

    Filesize

    2.0MB

  • memory/2280-70-0x0000000000A60000-0x0000000000B28000-memory.dmp

    Filesize

    800KB

  • memory/2280-36-0x0000000000A60000-0x0000000000B28000-memory.dmp

    Filesize

    800KB

  • memory/2624-69-0x00000000002C0000-0x0000000000329000-memory.dmp

    Filesize

    420KB

  • memory/2624-42-0x0000000000400000-0x00000000005F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-77-0x0000000000400000-0x00000000005F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-32-0x00000000002C0000-0x0000000000329000-memory.dmp

    Filesize

    420KB

  • memory/2732-68-0x0000000000400000-0x00000000005FD000-memory.dmp

    Filesize

    2.0MB

  • memory/2732-67-0x0000000001EE0000-0x0000000001FB7000-memory.dmp

    Filesize

    860KB

  • memory/2732-11-0x0000000001EE0000-0x0000000001FB7000-memory.dmp

    Filesize

    860KB

  • memory/2732-12-0x0000000000400000-0x00000000005FD000-memory.dmp

    Filesize

    2.0MB

  • memory/3048-0-0x00000000007C0000-0x00000000007E4000-memory.dmp

    Filesize

    144KB

  • memory/3048-10-0x00000000007C0000-0x00000000007E4000-memory.dmp

    Filesize

    144KB

  • memory/3048-1-0x0000000000400000-0x00000000007B3000-memory.dmp

    Filesize

    3.7MB

  • memory/3048-35-0x0000000000400000-0x00000000007B3000-memory.dmp

    Filesize

    3.7MB