General
-
Target
Winlocker.exe
-
Size
18KB
-
Sample
240429-vx1qzage2x
-
MD5
f17aa8c813d60fc139510070c83228b1
-
SHA1
0ecf72d2d6d3be23300aa16ceea78d551ca98ebf
-
SHA256
6c8db88f41c43a13c2dbf6ee8317b0fc6702590c3aac12bdadf7142c524958ac
-
SHA512
764693c9beace369424297ee65a15535b6bf26465d849d34bf010061e44b8ef9e0fe82fe88dc52bb2b48a6e197f4da5d51c46a768fee992606d794324677adb9
-
SSDEEP
384:NlFftUnn8BYQ3Lq+IyOLVSf9xKo6kYcV6O7UiJFnh:TFfSPTyOLb8YcV6O4izh
Static task
static1
Behavioral task
behavioral1
Sample
Winlocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
Winlocker.exe
-
Size
18KB
-
MD5
f17aa8c813d60fc139510070c83228b1
-
SHA1
0ecf72d2d6d3be23300aa16ceea78d551ca98ebf
-
SHA256
6c8db88f41c43a13c2dbf6ee8317b0fc6702590c3aac12bdadf7142c524958ac
-
SHA512
764693c9beace369424297ee65a15535b6bf26465d849d34bf010061e44b8ef9e0fe82fe88dc52bb2b48a6e197f4da5d51c46a768fee992606d794324677adb9
-
SSDEEP
384:NlFftUnn8BYQ3Lq+IyOLVSf9xKo6kYcV6O7UiJFnh:TFfSPTyOLb8YcV6O4izh
Score10/10-
Modifies WinLogon for persistence
-
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4