General
-
Target
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock
-
Size
190KB
-
Sample
240808-nkwsxswgmc
-
MD5
e9abc8025a9ead22032dd851ac7084b2
-
SHA1
f33271921b3645af0c584c3c71b82fc31f835754
-
SHA256
c02e1a73f36d717a7ad3aebdd64edb1b723d585138521c0a41ce019590bc3ce0
-
SHA512
a778a0bd89783b7c8bb273b800faa327e336b3ea95a0f7c52266ff2d056060d26999cb637d74ffadf596155455fed203dff6b926ade475ff5c296244bddba40b
-
SSDEEP
3072:qgWwh/4OjzH5yAdv2qTFVXF6xs8wy8NGrbw4mzOgcGtJG:X+8dbRzep3bwBOgcU
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock
-
Size
190KB
-
MD5
e9abc8025a9ead22032dd851ac7084b2
-
SHA1
f33271921b3645af0c584c3c71b82fc31f835754
-
SHA256
c02e1a73f36d717a7ad3aebdd64edb1b723d585138521c0a41ce019590bc3ce0
-
SHA512
a778a0bd89783b7c8bb273b800faa327e336b3ea95a0f7c52266ff2d056060d26999cb637d74ffadf596155455fed203dff6b926ade475ff5c296244bddba40b
-
SSDEEP
3072:qgWwh/4OjzH5yAdv2qTFVXF6xs8wy8NGrbw4mzOgcGtJG:X+8dbRzep3bwBOgcU
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4