File name:

lockdir.exe

Full analysis: https://app.any.run/tasks/ec5f7c57-d1d4-4a87-91a7-9a1dd92b3abd
Verdict: Malicious activity
Analysis date: February 23, 2019, 00:13:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

F5128D0DEA6942FED4E793DD912C7AE3

SHA1:

0C2C1D58DC7FBABA5DF6BC8A542E805CAA02C1EC

SHA256:

6025C4D0EF73FB1B12FA07E1A59E001E14E5A5BB25A3435E6B6DFDB61D2365BD

SSDEEP:

24576:7WvoCJLiF4W1Dd5vtaeOBWpklxekZ7Mq+zvUiVbsMHyA1UyKycV:7WvoCJLibd5lMWpkDekFM7zv/Vbs8yAc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • lockdir.exe (PID: 2840)
    • Starts NET.EXE for connection to shared resources

      • lockdir.exe (PID: 4084)
  • SUSPICIOUS

    • Application launched itself

      • lockdir.exe (PID: 2720)
    • Starts CMD.EXE for commands execution

      • lockdir.exe (PID: 4084)
    • Executable content was dropped or overwritten

      • lockdir.exe (PID: 2840)
      • lockdir.exe (PID: 3592)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • lockdir.exe (PID: 2840)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (42.1)
.exe | Win32 EXE Yoda's Crypter (41.3)
.exe | Win32 Executable (generic) (7)
.exe | Win16/32 Executable Delphi generic (3.2)
.exe | Generic Win/DOS Executable (3.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:07:12 11:59:50+02:00
PEType: PE32
LinkerVersion: 2.25
CodeSize: 1232896
InitializedDataSize: 155648
UninitializedDataSize: 7925760
EntryPoint: 0x8bbbf0
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 6.4.0.95
ProductVersionNumber: 6.4.0.95
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Kakasoft
FileDescription: A useful tool to Lock/Encrypt folders, flash disk and Hard drive
FileVersion: 6.4.0.95
InternalName: Folder Protector
LegalCopyright: Copyright 2008-2016 KakaSoft.All rights reserved
LegalTrademarks: -
OriginalFileName: -
ProductName: Folder Protector
ProductVersion: 6.4

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 12-Jul-2016 09:59:50
Detected languages:
  • Chinese - PRC
  • English - United States
  • Russian - Russia
CompanyName: Kakasoft
FileDescription: A useful tool to Lock/Encrypt folders, flash disk and Hard drive
FileVersion: 6.4.0.95
InternalName: Folder Protector
LegalCopyright: Copyright 2008-2016 KakaSoft.All rights reserved
LegalTrademarks: -
OriginalFilename: -
ProductName: Folder Protector
ProductVersion: 6.40

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0050
Pages in file: 0x0002
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x000F
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x001A
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 12-Jul-2016 09:59:50
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_BYTES_REVERSED_HI
  • IMAGE_FILE_BYTES_REVERSED_LO
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x0078F000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x00790000
0x0012D000
0x0012CA00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.99971
.rsrc
0x008BD000
0x00026000
0x00025200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.75353

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.91814
850
UNKNOWN
Chinese - PRC
RT_MANIFEST
2
6.13046
4264
UNKNOWN
Chinese - PRC
RT_ICON
3
5.57219
1128
UNKNOWN
Chinese - PRC
RT_ICON
4
5.19009
9640
UNKNOWN
Chinese - PRC
RT_ICON
5
5.45078
4264
UNKNOWN
Chinese - PRC
RT_ICON
6
5.50517
1128
UNKNOWN
Chinese - PRC
RT_ICON
7
5.54005
9640
UNKNOWN
Chinese - PRC
RT_ICON
8
5.63374
4264
UNKNOWN
Chinese - PRC
RT_ICON
9
5.43935
1128
UNKNOWN
Chinese - PRC
RT_ICON
10
4.22283
9640
UNKNOWN
Chinese - PRC
RT_ICON

Imports

KERNEL32.DLL
advapi32.dll
comctl32.dll
gdi32.dll
mpr.dll
msimg32.dll
msvcrt.dll
ole32.dll
oleaut32.dll
shell32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
64
Monitored processes
15
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start lockdir.exe rundll32.exe no specs lockdir.exe no specs explorer.exe no specs explorer.exe no specs cmd.exe no specs net.exe no specs subst.exe no specs lockdir.exe no specs lockdir.exe no specs lockdir.exe no specs lockdir.exe lockdir.exe osk.exe no specs osk.exe

Process information

PID
CMD
Path
Indicators
Parent process
416subst Z: /dC:\Windows\system32\subst.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Subst Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\subst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1396"C:\Users\admin\Desktop\lockdir.exe" C:\Users\admin\Desktop\lockdir.exe
explorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
HIGH
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2136"C:\Users\admin\Desktop\lockdir.exe" C:\Users\admin\Desktop\Thumbs.msC:\Users\admin\Desktop\lockdir.exeexplorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\user32.dll
2492"C:\Users\admin\Desktop\lockdir.exe" "C:\Users\Public\Desktop\VLC media player.lnk"C:\Users\admin\Desktop\lockdir.exeexplorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2720"C:\Users\admin\Desktop\lockdir.exe" C:\Users\admin\Desktop\lockdir.exeexplorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2788explorer Z:C:\Windows\explorer.exelockdir.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2840"C:\Users\admin\AppData\Local\Temp\lockdir.exe" C:\Users\admin\AppData\Local\Temp\lockdir.exe
explorer.exe
User:
admin
Company:
Kakasoft
Integrity Level:
MEDIUM
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\appdata\local\temp\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3236cmd.exe /c subst Z: /dC:\Windows\system32\cmd.exelockdir.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3280net use Z: /delC:\Windows\system32\net.exelockdir.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
3592"C:\Users\admin\Desktop\lockdir.exe" RightClickMenu 1 Folder##ProtectorC:\Users\admin\Desktop\lockdir.exe
lockdir.exe
User:
admin
Company:
Kakasoft
Integrity Level:
HIGH
Description:
A useful tool to Lock/Encrypt folders, flash disk and Hard drive
Exit code:
0
Version:
6.4.0.95
Modules
Images
c:\users\admin\desktop\lockdir.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
1 001
Read events
915
Write events
86
Delete events
0

Modification events

(PID) Process:(2840) lockdir.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2840) lockdir.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Width
Value:
318
(PID) Process:(2840) lockdir.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Height
Value:
288
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0100000000000000020000000700000006000000030000000500000004000000FFFFFFFF
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1
Operation:writeName:1
Value:
19002F5A3A5C000000000000000000000000000000000000000000
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1
Operation:writeName:MRUListEx
Value:
0100000000000000FFFFFFFF
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1
Operation:writeName:NodeSlot
Value:
95
(PID) Process:(3644) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1
Operation:writeName:MRUListEx
Value:
FFFFFFFF
Executable files
2
Suspicious files
2
Text files
44
Unknown types
0

Dropped files

PID
Process
Filename
Type
2840lockdir.exeC:\Users\admin\AppData\Local\Lockdir6text
MD5:
SHA256:
4084lockdir.exeC:\Users\Public\Lockdir6.lgtext
MD5:
SHA256:
2492lockdir.exeC:\Users\admin\AppData\Local\Lockdir6text
MD5:
SHA256:
2720lockdir.exeC:\Users\admin\AppData\Local\Lockdir6text
MD5:
SHA256:
2136lockdir.exeC:\Users\admin\AppData\Local\Lockdir6text
MD5:
SHA256:
2840lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\System.dbbinary
MD5:
SHA256:
2840lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\administrationyoung.pngimage
MD5:
SHA256:
2840lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\complexpool.pngimage
MD5:
SHA256:
2840lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\arerelevant.rtftext
MD5:
SHA256:
2840lockdir.exeC:\Users\admin\Desktop\Thumbs.ms\com1.{d3e34b21-9d75-101a-8c3d-00aa001a1652}\ã..\LastF\dceducational.jpgimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
4
DNS requests
1
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2840
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/custom.php?name=lockdir_brd&ver=6.40&action=2&IsRegUser=0&remark1=28837C09FA_L_316754A3A8&win=7_x86&rt=0
US
html
159 b
malicious
2840
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/checkupdate.php?name=lockdir_brd&builtdate=151127&cracked=0
US
text
121 b
malicious
2840
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/custom.php?name=lockdir_brd&ver=6.40&action=0&IsRegUser=0&remark1=28837C09FA_L_316754A3A8
US
html
121 b
malicious
2840
lockdir.exe
GET
200
50.93.203.14:80
http://info.kakasoft.com/regmgr/ad.php?name=lockdir_brd&ver=6.40&builtdate=151127&remark1=28837C09FA_L_316754A3A8
US
text
25 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2840
lockdir.exe
50.93.203.14:80
info.kakasoft.com
Jazz Network Inc.
US
malicious

DNS requests

Domain
IP
Reputation
info.kakasoft.com
  • 50.93.203.14
malicious

Threats

PID
Process
Class
Message
2840
lockdir.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan.FolderLock Check-in
2840
lockdir.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan.FolderLock Check-in
No debug info