File name:

lockdir.exe

Full analysis: https://app.any.run/tasks/bbcce5f4-57e5-4b92-ab59-8e46b64a066a
Verdict: Malicious activity
Analysis date: February 22, 2019, 03:17:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

F5128D0DEA6942FED4E793DD912C7AE3

SHA1:

0C2C1D58DC7FBABA5DF6BC8A542E805CAA02C1EC

SHA256:

6025C4D0EF73FB1B12FA07E1A59E001E14E5A5BB25A3435E6B6DFDB61D2365BD

SSDEEP:

24576:7WvoCJLiF4W1Dd5vtaeOBWpklxekZ7Mq+zvUiVbsMHyA1UyKycV:7WvoCJLibd5lMWpkDekFM7zv/Vbs8yAc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • lockdir.exe (PID: 3008)
  • SUSPICIOUS

    • Writes to a desktop.ini file (may be used to cloak folders)

      • lockdir.exe (PID: 3140)
      • lockdir.exe (PID: 3008)
    • Executable content was dropped or overwritten

      • lockdir.exe (PID: 3008)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (42.1)
.exe | Win32 EXE Yoda's Crypter (41.3)
.exe | Win32 Executable (generic) (7)
.exe | Win16/32 Executable Delphi generic (3.2)
.exe | Generic Win/DOS Executable (3.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:07:12 11:59:50+02:00
PEType: PE32
LinkerVersion: 2.25
CodeSize: 1232896
InitializedDataSize: 155648
UninitializedDataSize: 7925760
EntryPoint: 0x8bbbf0
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 6.4.0.95
ProductVersionNumber: 6.4.0.95
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Kakasoft
FileDescription: A useful tool to Lock/Encrypt folders, flash disk and Hard drive
FileVersion: 6.4.0.95
InternalName: Folder Protector
LegalCopyright: Copyright 2008-2016 KakaSoft.All rights reserved
LegalTrademarks: -
OriginalFileName: -
ProductName: Folder Protector
ProductVersion: 6.4

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 12-Jul-2016 09:59:50
Detected languages:
  • Chinese - PRC
  • English - United States
  • Russian - Russia
CompanyName: Kakasoft
FileDescription: A useful tool to Lock/Encrypt folders, flash disk and Hard drive
FileVersion: 6.4.0.95
InternalName: Folder Protector
LegalCopyright: Copyright 2008-2016 KakaSoft.All rights reserved
LegalTrademarks: -
OriginalFilename: -
ProductName: Folder Protector
ProductVersion: 6.40

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0050
Pages in file: 0x0002
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x000F
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x001A
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 12-Jul-2016 09:59:50
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_BYTES_REVERSED_HI
  • IMAGE_FILE_BYTES_REVERSED_LO
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x0078F000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x00790000
0x0012D000
0x0012CA00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.99971
.rsrc
0x008BD000
0x00026000
0x00025200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.75353

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.91814
850
UNKNOWN
Chinese - PRC
RT_MANIFEST
2
6.13046
4264
UNKNOWN
Chinese - PRC
RT_ICON
3
5.57219
1128
UNKNOWN
Chinese - PRC
RT_ICON
4
5.19009
9640
UNKNOWN
Chinese - PRC
RT_ICON
5
5.45078
4264
UNKNOWN
Chinese - PRC
RT_ICON
6
5.50517
1128
UNKNOWN
Chinese - PRC
RT_ICON
7
5.54005
9640
UNKNOWN
Chinese - PRC
RT_ICON
8
5.63374
4264
UNKNOWN
Chinese - PRC
RT_ICON
9
5.43935
1128
UNKNOWN
Chinese - PRC
RT_ICON
10
4.22283
9640
UNKNOWN
Chinese - PRC
RT_ICON

Imports

KERNEL32.DLL
advapi32.dll
comctl32.dll
gdi32.dll
mpr.dll
msimg32.dll
msvcrt.dll
ole32.dll
oleaut32.dll
shell32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
8
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start lockdir.exe explorer.exe no specs rundll32.exe no specs lockdir.exe no specs lockdir.exe no specs explorer.exe no specs explorer.exe no specs lockdir.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
832explorer Z:C:\Windows\explorer.exelockdir.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
972C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2160"C:\Users\admin\Desktop\lockdir.exe" C:\Users\admin\Desktop\lockdir.exeexplorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3008"C:\Users\admin\AppData\Local\Temp\lockdir.exe" C:\Users\admin\AppData\Local\Temp\lockdir.exe
explorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\appdata\local\temp\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3016"C:\Users\admin\Desktop\lockdir.exe" C:\Users\admin\Desktop\lockdir.exeexplorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3140"C:\Users\admin\Desktop\lockdir.exe" C:\Users\admin\Desktop\lockdir.exeexplorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3444"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3600"C:\Windows\System32\rundll32.exe" shell32.dll,Options_RunDLL 0C:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
843
Read events
811
Write events
32
Delete events
0

Modification events

(PID) Process:(3008) lockdir.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3008) lockdir.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Width
Value:
318
(PID) Process:(3008) lockdir.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Height
Value:
288
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
010000000A000000090000000000000008000000020000000700000006000000030000000500000004000000FFFFFFFF
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1
Operation:writeName:1
Value:
19002F5A3A5C000000000000000000000000000000000000000000
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1
Operation:writeName:MRUListEx
Value:
0100000000000000FFFFFFFF
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1
Operation:writeName:NodeSlot
Value:
98
(PID) Process:(972) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1
Operation:writeName:MRUListEx
Value:
FFFFFFFF
Executable files
1
Suspicious files
2
Text files
49
Unknown types
0

Dropped files

PID
Process
Filename
Type
3140lockdir.exendows-l..ultimaten.resources_31bf3856ad364e35_6.1.7601.17514_en-us_042d2c9052d53167
MD5:
SHA256:
3008lockdir.exeC:\Users\admin\AppData\Local\Lockdir6text
MD5:
SHA256:
3008lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\System.dbbinary
MD5:
SHA256:
3008lockdir.exeC:\Users\admin\Desktop\desktop.iniini
MD5:F3B2187FADA579C4CBFC28697146B797
SHA256:ECD557DBA3891226952B6653DC09E0BB00A3FBEF6AF2BED13757FDBFC3C812EA
3140lockdir.exeC:\Users\admin\Desktop\decaccess.rtftext
MD5:
SHA256:
3140lockdir.exeC:\Users\admin\Desktop\presidentoutput.pngimage
MD5:
SHA256:
3008lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\playdisclaimer.rtftext
MD5:
SHA256:
3008lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\doorpanel.pngimage
MD5:
SHA256:
3008lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\emaillast.jpgimage
MD5:
SHA256:
3140lockdir.exeC:\Users\Public\Lockdir6.lgtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
4
DNS requests
1
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3008
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/custom.php?name=lockdir_brd&ver=6.40&action=2&IsRegUser=0&remark1=28837C09FA_L_316754A3A8&win=7_x86&rt=0
US
html
159 b
malicious
3008
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/checkupdate.php?name=lockdir_brd&builtdate=151127&cracked=0
US
text
121 b
malicious
3008
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/ad.php?name=lockdir_brd&ver=6.40&builtdate=151127&remark1=28837C09FA_L_316754A3A8
US
text
25 b
malicious
3008
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/custom.php?name=lockdir_brd&ver=6.40&action=0&IsRegUser=0&remark1=28837C09FA_L_316754A3A8
US
html
121 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3008
lockdir.exe
50.93.203.14:80
info.kakasoft.com
Jazz Network Inc.
US
malicious

DNS requests

Domain
IP
Reputation
info.kakasoft.com
  • 50.93.203.14
malicious

Threats

PID
Process
Class
Message
3008
lockdir.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan.FolderLock Check-in
3008
lockdir.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan.FolderLock Check-in
No debug info