Overview
overview
10Static
static
7WinLocker ....4.exe
windows10-1703-x64
10WinLocker ....4.exe
windows7-x64
10WinLocker ....4.exe
windows10-2004-x64
10WinLocker ....4.exe
windows11-21h2-x64
10WinLocker ....4.exe
ubuntu-18.04-amd64
WinLocker ....4.exe
debian-9-armhf
WinLocker ....4.exe
debian-9-mips
WinLocker ....4.exe
debian-9-mipsel
Analysis
-
max time kernel
18s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-06-2024 14:39
Behavioral task
behavioral1
Sample
WinLocker Builder v1.4.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WinLocker Builder v1.4.exe
Resource
win7-20240611-en
Behavioral task
behavioral3
Sample
WinLocker Builder v1.4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
WinLocker Builder v1.4.exe
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
WinLocker Builder v1.4.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral6
Sample
WinLocker Builder v1.4.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral7
Sample
WinLocker Builder v1.4.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral8
Sample
WinLocker Builder v1.4.exe
Resource
debian9-mipsel-20240418-en
General
-
Target
WinLocker Builder v1.4.exe
-
Size
699KB
-
MD5
81dd862410af80c9d2717af912778332
-
SHA1
8f1df476f58441db5973ccfdc211c8680808ffe1
-
SHA256
60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f
-
SHA512
8dd014b91fb1e2122d2e4da444db78dd551513c500d447bb1e94ceb7f2f8d45223a8a706e2156102f8c8850d2bb02ae6b8ea0c9282abd7baaa2c84130112af15
-
SSDEEP
12288:0L/xX5KVeOnuH/u1Wig295xsmVXf6AaQLmEc+pdmWSwIHUOS6Vp:0bxpUz13g27raQmEcomWSHHUD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral4/memory/5036-2-0x0000000000400000-0x0000000000545000-memory.dmp modiloader_stage2 -
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 4820 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinLocker Builder v1.4.exe"C:\Users\Admin\AppData\Local\Temp\WinLocker Builder v1.4.exe"1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD518951ad4190ed728ba23e932e0c6e0db
SHA1fa2d16fcbc3defd07cb8f21d8ea4793a21f261f0
SHA25666607b009c345a8e70fc1e58ab8a13bbea0e370c8d75f16d2cce5b876a748915
SHA512a67237089efa8615747bdc6cfe0afc977dc54cfd624a8d2e5124a441c204f1ec58ee7cfbbc105ddc2c18d4f254b9e124d71630bcdba0253d41a96890104f2fff
-
memory/5036-0-0x0000000000400000-0x0000000000545000-memory.dmpFilesize
1.3MB
-
memory/5036-1-0x0000000000A20000-0x0000000000A21000-memory.dmpFilesize
4KB
-
memory/5036-2-0x0000000000400000-0x0000000000545000-memory.dmpFilesize
1.3MB