Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
OsLock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OsLock.exe
Resource
win10v2004-20241007-en
General
-
Target
OsLock.exe
-
Size
385KB
-
MD5
675ea787630f596da0474830ffb49723
-
SHA1
c8e18cbc3cca1ded47eb5860a71b9f22d46409e1
-
SHA256
ad861f41bb4a31ee778bf60cecf0a7bdd9c0cc91d5cc17775d15199c214fbccf
-
SHA512
fa3c2c6edd3435bd16ec652c1738695cd1e8cdbd010b55fd856cefdbebd50552074d06e9b66860fae9c3a2f71ffe1076bb0227944b49286f05e1a3a4c871014d
-
SSDEEP
6144:Z1IE/9oydPc4IvjTZlyZsDDyr3rAUp48zUCpM69/KImQi/6ebkY:Z1vlc4IrTZlyGDc54
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\"" OsLock.exe -
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" --init" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" --wininit" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_7 = "ux-cryptor.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_8 = "crypt0rsx.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_2 = "taskhost.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_3 = "windowsx-c.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_4 = "System.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_5 = "_default64.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" -startup" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\"" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" /setup" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_1 = "AWindowsService.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_6 = "native.exe" OsLock.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini attrib.exe File opened for modification C:\Users\Public\Desktop\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Documents\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini attrib.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 6 IoCs
pid Process 1108 cmd.exe 1880 cmd.exe 1432 cmd.exe 740 cmd.exe 4320 cmd.exe 3700 cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 1404 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 460 OsLock.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 460 OsLock.exe Token: SeDebugPrivilege 1404 taskkill.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 460 wrote to memory of 3700 460 OsLock.exe 84 PID 460 wrote to memory of 3700 460 OsLock.exe 84 PID 460 wrote to memory of 1108 460 OsLock.exe 85 PID 460 wrote to memory of 1108 460 OsLock.exe 85 PID 460 wrote to memory of 4320 460 OsLock.exe 86 PID 460 wrote to memory of 4320 460 OsLock.exe 86 PID 460 wrote to memory of 740 460 OsLock.exe 87 PID 460 wrote to memory of 740 460 OsLock.exe 87 PID 460 wrote to memory of 1432 460 OsLock.exe 88 PID 460 wrote to memory of 1432 460 OsLock.exe 88 PID 460 wrote to memory of 1880 460 OsLock.exe 90 PID 460 wrote to memory of 1880 460 OsLock.exe 90 PID 460 wrote to memory of 1404 460 OsLock.exe 91 PID 460 wrote to memory of 1404 460 OsLock.exe 91 PID 1108 wrote to memory of 5096 1108 cmd.exe 98 PID 1108 wrote to memory of 5096 1108 cmd.exe 98 PID 3700 wrote to memory of 856 3700 cmd.exe 99 PID 3700 wrote to memory of 856 3700 cmd.exe 99 PID 1108 wrote to memory of 5092 1108 cmd.exe 100 PID 1108 wrote to memory of 5092 1108 cmd.exe 100 PID 1432 wrote to memory of 2468 1432 cmd.exe 101 PID 1432 wrote to memory of 2468 1432 cmd.exe 101 PID 1880 wrote to memory of 2564 1880 cmd.exe 102 PID 1880 wrote to memory of 2564 1880 cmd.exe 102 PID 4320 wrote to memory of 1524 4320 cmd.exe 103 PID 4320 wrote to memory of 1524 4320 cmd.exe 103 PID 740 wrote to memory of 1444 740 cmd.exe 104 PID 740 wrote to memory of 1444 740 cmd.exe 104 PID 4320 wrote to memory of 4868 4320 cmd.exe 105 PID 4320 wrote to memory of 4868 4320 cmd.exe 105 PID 1880 wrote to memory of 444 1880 cmd.exe 106 PID 1880 wrote to memory of 444 1880 cmd.exe 106 PID 3700 wrote to memory of 2808 3700 cmd.exe 107 PID 3700 wrote to memory of 2808 3700 cmd.exe 107 PID 1432 wrote to memory of 4260 1432 cmd.exe 108 PID 1432 wrote to memory of 4260 1432 cmd.exe 108 PID 740 wrote to memory of 4540 740 cmd.exe 109 PID 740 wrote to memory of 4540 740 cmd.exe 109 -
Views/modifies file attributes 1 TTPs 12 IoCs
pid Process 5092 attrib.exe 2564 attrib.exe 1444 attrib.exe 4540 attrib.exe 4868 attrib.exe 2808 attrib.exe 4260 attrib.exe 856 attrib.exe 5096 attrib.exe 1524 attrib.exe 2468 attrib.exe 444 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OsLock.exe"C:\Users\Admin\AppData\Local\Temp\OsLock.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c F: & attrib +h +s +r +i /D & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D3⤵
- Views/modifies file attributes
PID:856
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:2808
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd "%userprofile%\desktop"&attrib +h +s +r +i /D & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:5096
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:5092
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd "%systemdrive%\Users\Public\Desktop"&attrib +h +s +r +i /D & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1524
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:4868
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd "%userprofile%\downloads"&attrib +h +s +r +i /D & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1444
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:4540
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd "%userprofile%\documents"&attrib +h +s +r +i /D & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2468
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:4260
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd "%userprofile%"&attrib +h +s +r +i /D & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D3⤵
- Views/modifies file attributes
PID:2564
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:444
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /im Explorer.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD55250167e9ed5616c92f2c49b7e295375
SHA16ca4f968809543f95a7c476bf39a9000231a4a4e
SHA2560a8ce0b30dffe9ca968d05f8067a017bc48e0f5a432d75b4b7d25d59ad58a40d
SHA512df65c59ba2c3b5033b85c4a526957c0ecd508acb2222b95133fa574df7a77abd3007a682d56312357e3ace87b88bd386c5463884d2c28c184808cf7c0608aeec