General

  • Target

    WinLock.exe

  • Size

    487KB

  • Sample

    240919-xvh49avgkg

  • MD5

    670d6da6b7fc8d61799f8c97e7b329a3

  • SHA1

    1e35ccd5e81267f424f896733ba7170d6974aa1b

  • SHA256

    834003e0f4b84628ae0020416eaa9b0691ca01b9dda4385593b1857c9c34ee6a

  • SHA512

    fb0db12a7094dc38d144ac36437f91cf02a419f8c4d874d9e3d145af5abe5077917ab13e753e5b2c0feed856ed21c6c852fa17ed12dc9c94784eead48fdf7796

  • SSDEEP

    12288:AR/y00bzAlvpYq1orkEHck8IzDqY33k0ero5lF:AfMgsvqY3Croj

Malware Config

Targets

    • Target

      WinLock.exe

    • Size

      487KB

    • MD5

      670d6da6b7fc8d61799f8c97e7b329a3

    • SHA1

      1e35ccd5e81267f424f896733ba7170d6974aa1b

    • SHA256

      834003e0f4b84628ae0020416eaa9b0691ca01b9dda4385593b1857c9c34ee6a

    • SHA512

      fb0db12a7094dc38d144ac36437f91cf02a419f8c4d874d9e3d145af5abe5077917ab13e753e5b2c0feed856ed21c6c852fa17ed12dc9c94784eead48fdf7796

    • SSDEEP

      12288:AR/y00bzAlvpYq1orkEHck8IzDqY33k0ero5lF:AfMgsvqY3Croj

    • UAC bypass

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

MITRE ATT&CK Enterprise v15

Tasks