General
-
Target
WinLock.exe
-
Size
487KB
-
Sample
240919-xvh49avgkg
-
MD5
670d6da6b7fc8d61799f8c97e7b329a3
-
SHA1
1e35ccd5e81267f424f896733ba7170d6974aa1b
-
SHA256
834003e0f4b84628ae0020416eaa9b0691ca01b9dda4385593b1857c9c34ee6a
-
SHA512
fb0db12a7094dc38d144ac36437f91cf02a419f8c4d874d9e3d145af5abe5077917ab13e753e5b2c0feed856ed21c6c852fa17ed12dc9c94784eead48fdf7796
-
SSDEEP
12288:AR/y00bzAlvpYq1orkEHck8IzDqY33k0ero5lF:AfMgsvqY3Croj
Behavioral task
behavioral1
Sample
WinLock.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
WinLock.exe
-
Size
487KB
-
MD5
670d6da6b7fc8d61799f8c97e7b329a3
-
SHA1
1e35ccd5e81267f424f896733ba7170d6974aa1b
-
SHA256
834003e0f4b84628ae0020416eaa9b0691ca01b9dda4385593b1857c9c34ee6a
-
SHA512
fb0db12a7094dc38d144ac36437f91cf02a419f8c4d874d9e3d145af5abe5077917ab13e753e5b2c0feed856ed21c6c852fa17ed12dc9c94784eead48fdf7796
-
SSDEEP
12288:AR/y00bzAlvpYq1orkEHck8IzDqY33k0ero5lF:AfMgsvqY3Croj
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Indicator Removal
1Clear Persistence
1Modify Registry
6