General

  • Target

    WinLock.exe

  • Size

    444KB

  • Sample

    241001-p22k6sthjh

  • MD5

    4eb529d4d5c6eb41e4b4c3827fcde02f

  • SHA1

    9b8c561a8185c37ec87d91f9a5200786e468207e

  • SHA256

    534dfe46d8f1d00d8a2d7024dde228f328ab2dc4ef948b3da17f0849e08d22d8

  • SHA512

    26e2312b4bcae48a22d37fdad0ac70c024676cb3f968fde032a31779fbe10a5f981bd7589b198f14c8b7eeefba4ad0d6bf13e64079da835deb5236601a876141

  • SSDEEP

    12288:/F2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavQ9mH:tHSZqoXuWPzloMaI9w

Malware Config

Targets

    • Target

      WinLock.exe

    • Size

      444KB

    • MD5

      4eb529d4d5c6eb41e4b4c3827fcde02f

    • SHA1

      9b8c561a8185c37ec87d91f9a5200786e468207e

    • SHA256

      534dfe46d8f1d00d8a2d7024dde228f328ab2dc4ef948b3da17f0849e08d22d8

    • SHA512

      26e2312b4bcae48a22d37fdad0ac70c024676cb3f968fde032a31779fbe10a5f981bd7589b198f14c8b7eeefba4ad0d6bf13e64079da835deb5236601a876141

    • SSDEEP

      12288:/F2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavQ9mH:tHSZqoXuWPzloMaI9w

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks