Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe
-
Size
174KB
-
MD5
f138f1b9284d19e9536aae3c1b6e6dd7
-
SHA1
cad0cca879ce6dd548b55bcab3a870745bc54249
-
SHA256
4e0229c8186d34f6a1c43df033a21090bd1a658215fa9aca7393f9f5f5037e39
-
SHA512
c25e3c5142654bb659b2ec92ab6d7d664a8f249349037a5310efbf192abed7f2ad18af5c54789480576207d0859ddcba2877873dce3d7739a918fc5dfe0f8ceb
-
SSDEEP
3072:P20vP29Evh/SfNHUS9cDEXsf2fAGCe1PrLHB0Hf+0NzenliaTNdwsyMPKMKnLkcK:PSEvh/+NHUCcDEXsf2flPdh0Hf+KinkU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jCEoEUwc.exe -
Executes dropped EXE 3 IoCs
pid Process 3592 jCEoEUwc.exe 4952 oqEUgcwA.exe 2728 Bginfo64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jCEoEUwc.exe = "C:\\Users\\Admin\\CiUwIosc\\jCEoEUwc.exe" 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jCEoEUwc.exe = "C:\\Users\\Admin\\CiUwIosc\\jCEoEUwc.exe" jCEoEUwc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oqEUgcwA.exe = "C:\\ProgramData\\ciMoMkEU\\oqEUgcwA.exe" 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oqEUgcwA.exe = "C:\\ProgramData\\ciMoMkEU\\oqEUgcwA.exe" oqEUgcwA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 3556 reg.exe 1752 reg.exe 3648 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3592 jCEoEUwc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe 3592 jCEoEUwc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3592 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 100 PID 2484 wrote to memory of 3592 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 100 PID 2484 wrote to memory of 3592 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 100 PID 2484 wrote to memory of 4952 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 101 PID 2484 wrote to memory of 4952 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 101 PID 2484 wrote to memory of 4952 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 101 PID 2484 wrote to memory of 2652 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 102 PID 2484 wrote to memory of 2652 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 102 PID 2484 wrote to memory of 2652 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 102 PID 2484 wrote to memory of 3556 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 104 PID 2484 wrote to memory of 3556 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 104 PID 2484 wrote to memory of 3556 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 104 PID 2484 wrote to memory of 1752 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 107 PID 2484 wrote to memory of 1752 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 107 PID 2484 wrote to memory of 1752 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 107 PID 2484 wrote to memory of 3648 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 108 PID 2484 wrote to memory of 3648 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 108 PID 2484 wrote to memory of 3648 2484 2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe 108 PID 2652 wrote to memory of 2728 2652 cmd.exe 111 PID 2652 wrote to memory of 2728 2652 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_f138f1b9284d19e9536aae3c1b6e6dd7_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\CiUwIosc\jCEoEUwc.exe"C:\Users\Admin\CiUwIosc\jCEoEUwc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3592
-
-
C:\ProgramData\ciMoMkEU\oqEUgcwA.exe"C:\ProgramData\ciMoMkEU\oqEUgcwA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Bginfo64.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Bginfo64.exeC:\Users\Admin\AppData\Local\Temp\Bginfo64.exe3⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3556
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1752
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579KB
MD5756b81c482030c1fa7500a08ba561b4d
SHA1b5d2b00cf817f4bd3aaef4531addb15ddb1c5b4c
SHA2561820f7d2d9d6d5c7dfedb58f052171057ed8763f7b1f20ee5e9ed31e233844d5
SHA512d845a5d91b522083a7fe98478a179a10fab6aa9c4e6b3e73cf1be10cfe06bc1d58e31fe393247fe81ab2a22b0f2e6d0700d60bbaa1fc603849dafe4ffdbcb4e4
-
Filesize
127KB
MD54f469a9c250f18f1b1aed6288f4aa30e
SHA184cfd09166059d4bff932e81e9649d2066c1219a
SHA2563449136a7ac4d9578e394ce2548430f7b1c313e270bfb9d995f8ad4eb85695a2
SHA5126614f7fb39056611288145594188cf61359457ddd2fe945bf366b8b7b40b22b1aa8f52678ddf6fcee7b48a1ed8315e403f4c5897098d06aeb139b9f048190bcc
-
Filesize
24KB
MD5c6b3c81dff28dce882ba4f9f1d428423
SHA12d31bae0b83b12511a49a81938fd350e5c687331
SHA2569e09478d6a518fd99520c36cadf415d34c52efc444dfc8bb8edbf92af66ca788
SHA512fa19706c17659976402380ee2852470092272300366d677d6ddf66713627e5619ef32614f35f75f02475c99777da1e691a3c538b01bcd329177fa251b0f838a6
-
Filesize
5.2MB
MD574727004472eb3c62b7caf1d6939b59f
SHA17967bd6383e6b9ee6ce94871aa4a92f820bf26be
SHA25626eca636dfe421cb37fda859cbbed73de297875832bf1aafcadf5a2f2b356103
SHA512846488a3370c46ef74d3007da893881bf2a33ebf68af4efb1ad8ddb35d28323ddfead8ea8c5c457cb1afbb096121b77845fb0c740f2e811a2da3d10897a4314f
-
Filesize
131KB
MD56dc77e0bb1c2709e39e8e387cb829e7d
SHA1635377211ef31b90d6d7107d9f591216a8777c59
SHA256b5560bba1766fe7ca1409050ae996322bbb28eac9d92fce6f7a0fcfdfce79253
SHA51221e5125f8d89947041bf478b12121a8a7b49901afbfb482bd459e5b0d8bedabf0e7b3b5440434645c140670314e270dfa157ce4e775cbe0a7237245fc06397a6