Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
WinLocker.exe
Resource
win11-20241007-en
General
-
Target
WinLocker.exe
-
Size
2.5MB
-
MD5
8db22c05021308aa1f21e00b7c754510
-
SHA1
df1a966bcee343fcc47466a7987d439d3e7fbc6d
-
SHA256
4f3dc347f531ef6a408c5f432952a458a0ba635644647e9a8de1982f5428dce2
-
SHA512
53e3c137710ebcdfff7c8caf75235fdcf230dc980829978c31226b4a3e356b8717d9e94e5aa6e70855d89e734de9db892dee759f7201bda2c81a172e69bf6c9c
-
SSDEEP
49152:7zf6V1jqp9ekTD4SxfHLqY+xKkmyLW5RhM0glT:7zyV0pJfOtIFIlT
Malware Config
Signatures
-
Processes:
WinLocker.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinLocker.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
Processes:
WinLocker.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinLocker.exe" WinLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe WinLocker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinLocker.exe" WinLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe WinLocker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WinLocker.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinLocker.exe" WinLocker.exe -
Processes:
WinLocker.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinLocker.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
WinLocker.exedescription ioc process File opened for modification \??\PhysicalDrive0 WinLocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WinLocker.exeWinLocker.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinLocker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WinLocker.exepid process 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe 3748 WinLocker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WinLocker.exepid process 3748 WinLocker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WinLocker.exedescription pid process Token: SeBackupPrivilege 3748 WinLocker.exe Token: SeRestorePrivilege 3748 WinLocker.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WinLocker.exeWinLocker.exepid process 3748 WinLocker.exe 3456 WinLocker.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
WinLocker.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WinLocker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinLocker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\HideFastUserSwitching = "1" WinLocker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinLocker.exe"C:\Users\Admin\AppData\Local\Temp\WinLocker.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3748
-
C:\Users\Admin\AppData\Local\Temp\WinLocker.exeC:\Users\Admin\AppData\Local\Temp\WinLocker.exe explorer.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1