Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe
-
Size
192KB
-
MD5
4deb641355a2ced75885248619e7e7c8
-
SHA1
fe46b1856c51e85ddcb128235085c3b2bd0a0f51
-
SHA256
cbf90b656abb4199a0f4cfa4b8fc538202540d9b672e7ea5ac9975ae51884b0d
-
SHA512
e7632732617e8664dc3fd05ee12fad0e258507468b1455007a8bf99f3e0494a1e0681bb6e04254c8da2338c8998cde919c0343fdb4caf14fb569fd5f3afd7991
-
SSDEEP
3072:PCvM7zZ8k5E8CenK4tYLt65rU3eF5qaNkQbbAppxVh:ppcrR65YObqvQSpxv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (63) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
QgUsAAgM.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\International\Geo\Nation QgUsAAgM.exe -
Executes dropped EXE 2 IoCs
Processes:
QgUsAAgM.exeyYEkcEAo.exepid process 1988 QgUsAAgM.exe 1736 yYEkcEAo.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeQgUsAAgM.exepid process 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
yYEkcEAo.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeQgUsAAgM.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yYEkcEAo.exe = "C:\\ProgramData\\VQYMAgUA\\yYEkcEAo.exe" yYEkcEAo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\QgUsAAgM.exe = "C:\\Users\\Admin\\hYUEwMUw\\QgUsAAgM.exe" 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yYEkcEAo.exe = "C:\\ProgramData\\VQYMAgUA\\yYEkcEAo.exe" 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\QgUsAAgM.exe = "C:\\Users\\Admin\\hYUEwMUw\\QgUsAAgM.exe" QgUsAAgM.exe -
Drops file in Windows directory 1 IoCs
Processes:
QgUsAAgM.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico QgUsAAgM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exereg.exereg.execscript.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.execmd.execscript.execmd.exereg.exereg.exereg.execmd.execmd.exereg.execmd.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.execscript.exereg.execmd.exereg.execmd.exereg.execmd.exereg.execscript.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.execmd.exereg.exereg.exereg.exereg.exereg.execscript.exereg.exereg.exereg.exereg.exereg.exereg.exereg.execscript.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2500 reg.exe 2852 reg.exe 2664 reg.exe 1504 reg.exe 1564 reg.exe 1768 reg.exe 2428 reg.exe 1932 reg.exe 556 reg.exe 1304 reg.exe 1664 reg.exe 1128 reg.exe 2724 reg.exe 1776 reg.exe 2360 reg.exe 676 reg.exe 1212 reg.exe 316 reg.exe 2724 reg.exe 1796 reg.exe 488 reg.exe 1028 reg.exe 2304 reg.exe 1832 reg.exe 1472 reg.exe 2748 reg.exe 1100 reg.exe 1620 reg.exe 680 reg.exe 2704 reg.exe 828 reg.exe 2520 reg.exe 2256 reg.exe 3048 reg.exe 1692 reg.exe 2824 reg.exe 2128 reg.exe 1584 reg.exe 536 reg.exe 2240 reg.exe 1028 reg.exe 684 reg.exe 2796 reg.exe 3032 reg.exe 1588 reg.exe 2696 reg.exe 2004 reg.exe 2820 reg.exe 1112 reg.exe 2368 reg.exe 2528 reg.exe 2864 reg.exe 2336 reg.exe 2304 reg.exe 684 reg.exe 2760 reg.exe 568 reg.exe 308 reg.exe 1504 reg.exe 2528 reg.exe 2132 reg.exe 2516 reg.exe 1408 reg.exe 1664 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exepid process 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2084 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2084 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1012 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1012 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2192 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2192 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2116 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2116 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1588 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1588 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2732 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2732 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2692 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2692 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 656 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 656 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2568 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2568 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1828 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1828 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1252 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1252 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2336 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2336 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 768 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 768 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2976 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2976 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2756 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2756 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2188 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2188 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2528 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2528 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2724 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2724 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2920 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2920 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 644 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 644 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2480 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2480 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1052 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1052 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2420 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2420 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1472 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1472 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1924 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1924 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2980 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2980 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3068 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3068 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3036 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3036 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2728 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2728 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2432 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 2432 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
QgUsAAgM.exepid process 1988 QgUsAAgM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
QgUsAAgM.exepid process 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe 1988 QgUsAAgM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.execmd.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.execmd.exedescription pid process target process PID 2132 wrote to memory of 1988 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe QgUsAAgM.exe PID 2132 wrote to memory of 1988 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe QgUsAAgM.exe PID 2132 wrote to memory of 1988 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe QgUsAAgM.exe PID 2132 wrote to memory of 1988 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe QgUsAAgM.exe PID 2132 wrote to memory of 1736 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe yYEkcEAo.exe PID 2132 wrote to memory of 1736 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe yYEkcEAo.exe PID 2132 wrote to memory of 1736 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe yYEkcEAo.exe PID 2132 wrote to memory of 1736 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe yYEkcEAo.exe PID 2132 wrote to memory of 2480 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 2480 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 2480 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 2480 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 2724 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2724 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2724 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2724 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2732 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2732 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2732 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2732 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2480 wrote to memory of 2872 2480 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2480 wrote to memory of 2872 2480 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2480 wrote to memory of 2872 2480 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2480 wrote to memory of 2872 2480 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2132 wrote to memory of 2836 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2836 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2836 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 2836 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2132 wrote to memory of 3060 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 3060 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 3060 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2132 wrote to memory of 3060 2132 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3060 wrote to memory of 2696 3060 cmd.exe cscript.exe PID 3060 wrote to memory of 2696 3060 cmd.exe cscript.exe PID 3060 wrote to memory of 2696 3060 cmd.exe cscript.exe PID 3060 wrote to memory of 2696 3060 cmd.exe cscript.exe PID 2872 wrote to memory of 1244 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2872 wrote to memory of 1244 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2872 wrote to memory of 1244 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2872 wrote to memory of 1244 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 1244 wrote to memory of 2084 1244 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 1244 wrote to memory of 2084 1244 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 1244 wrote to memory of 2084 1244 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 1244 wrote to memory of 2084 1244 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2872 wrote to memory of 1472 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1472 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1472 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1472 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 2772 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 2772 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 2772 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 2772 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1560 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1560 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1560 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 1560 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 2872 wrote to memory of 2936 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2872 wrote to memory of 2936 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2872 wrote to memory of 2936 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2872 wrote to memory of 2936 2872 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2936 wrote to memory of 2816 2936 cmd.exe cscript.exe PID 2936 wrote to memory of 2816 2936 cmd.exe cscript.exe PID 2936 wrote to memory of 2816 2936 cmd.exe cscript.exe PID 2936 wrote to memory of 2816 2936 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\hYUEwMUw\QgUsAAgM.exe"C:\Users\Admin\hYUEwMUw\QgUsAAgM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1988
-
-
C:\ProgramData\VQYMAgUA\yYEkcEAo.exe"C:\ProgramData\VQYMAgUA\yYEkcEAo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1736
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"6⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"8⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"10⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"12⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"14⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"16⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"18⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"20⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"22⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"24⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"26⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"28⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"30⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"32⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"34⤵
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"36⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"38⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"40⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"42⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"44⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"46⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"48⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock49⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"50⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"52⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock53⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"54⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"56⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"58⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"60⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"62⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"64⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock65⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"66⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock67⤵PID:2484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"68⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock69⤵PID:504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"70⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock71⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"72⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock73⤵PID:2644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"74⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock75⤵PID:1084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"76⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock77⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"78⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock79⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"80⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock81⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"82⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock83⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"84⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock85⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"86⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock87⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"88⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock89⤵
- System Location Discovery: System Language Discovery
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"90⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock91⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"92⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock93⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"94⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock95⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"96⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock97⤵PID:448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"98⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock99⤵PID:680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"100⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock101⤵PID:1528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"102⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock103⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"104⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock105⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"106⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock107⤵PID:604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"108⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock109⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"110⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock111⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"112⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock113⤵PID:952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"114⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock115⤵PID:776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"116⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock117⤵PID:332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"118⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock119⤵PID:2500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"120⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock121⤵PID:2836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"122⤵PID:2856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-