General
-
Target
2024-09-02_f609863994b265254bfe25e03cb1ddbf_virlock
-
Size
567KB
-
Sample
240902-lwz9daydmg
-
MD5
f609863994b265254bfe25e03cb1ddbf
-
SHA1
c6a28057862f9d7d96a15b9d147c55780069a5c6
-
SHA256
93a8ca2854c44581db03b0d28e30348ed6c9a60bb31fdffcaa374424c0e6bcaa
-
SHA512
ff784a4b730342311702f9a9d2680a4938a9cf4ef97ab6cbf915e5aaddf0c9a6ea455aa4954800fbeb3d32240d36c879f4e71e743c499c1769a8d66c1a9b9deb
-
SSDEEP
12288:ppHP4YeP6v5i0CfjTLVvHIeGpu1bV8ameuiMCXJr/+jh/jqW8ARnrAuOOhBBfpaO:ppvQy5CfjXOkJ5T8h/jp8ARnrlZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_f609863994b265254bfe25e03cb1ddbf_virlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-02_f609863994b265254bfe25e03cb1ddbf_virlock.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-02_f609863994b265254bfe25e03cb1ddbf_virlock
-
Size
567KB
-
MD5
f609863994b265254bfe25e03cb1ddbf
-
SHA1
c6a28057862f9d7d96a15b9d147c55780069a5c6
-
SHA256
93a8ca2854c44581db03b0d28e30348ed6c9a60bb31fdffcaa374424c0e6bcaa
-
SHA512
ff784a4b730342311702f9a9d2680a4938a9cf4ef97ab6cbf915e5aaddf0c9a6ea455aa4954800fbeb3d32240d36c879f4e71e743c499c1769a8d66c1a9b9deb
-
SSDEEP
12288:ppHP4YeP6v5i0CfjTLVvHIeGpu1bV8ameuiMCXJr/+jh/jqW8ARnrAuOOhBBfpaO:ppvQy5CfjXOkJ5T8h/jp8ARnrlZ
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (84) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4