File name:

AXLocker.exe

Full analysis: https://app.any.run/tasks/184b2883-f96d-4417-b037-be63cce2660e
Verdict: Malicious activity
Analysis date: February 15, 2024, 03:17:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

A18AC3BFB1BE7773182E1367C53EC854

SHA1:

C3D5C1F5ECE8F0CF498D4812F981116AD7667286

SHA256:

C8E3C547E22AE37F9EEB37A1EFD28DE2BAE0BFAE67CE3798DA9592F8579D433C

SSDEEP:

1536:x3H9O7Ty+H6Uh73zRJ74J9DzJKS0N1yMT7:NH9OXzhh73zDg0N1yMT7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • AXLocker.exe (PID: 3772)
    • Actions looks like stealing of personal data

      • AXLocker.exe (PID: 3772)
  • SUSPICIOUS

    • Reads the Internet Settings

      • WMIC.exe (PID: 4060)
      • AXLocker.exe (PID: 3772)
      • cmd.exe (PID: 696)
    • Starts CMD.EXE for commands execution

      • AXLocker.exe (PID: 3772)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 3460)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 4060)
  • INFO

    • Reads the computer name

      • AXLocker.exe (PID: 3772)
    • Checks supported languages

      • AXLocker.exe (PID: 3772)
    • Reads the machine GUID from the registry

      • AXLocker.exe (PID: 3772)
    • Manual execution by a user

      • cmd.exe (PID: 696)
    • Reads Environment values

      • AXLocker.exe (PID: 3772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2090:05:13 08:32:53+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 69120
InitializedDataSize: 5120
UninitializedDataSize: -
EntryPoint: 0x12ca6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: axlocker
FileVersion: 1.0.0.0
InternalName: AXLOCKER.exe
LegalCopyright: Copyright © 2022
LegalTrademarks: -
OriginalFileName: AXLOCKER.exe
ProductName: axlocker
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start axlocker.exe cmd.exe no specs wmic.exe no specs cmd.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe axlocker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
696"C:\Windows\system32\cmd.exe" C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
848regeditC:\Windows\regedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Editor
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\ntdll.dll
2168"C:\Windows\regedit.exe" C:\Windows\regedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Editor
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\ntdll.dll
2564"C:\Windows\regedit.exe" C:\Windows\regedit.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3460"cmd.exe"C:\Windows\System32\cmd.exeAXLocker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3668"C:\Users\admin\AppData\Local\Temp\AXLocker.exe" C:\Users\admin\AppData\Local\Temp\AXLocker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
axlocker
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\axlocker.exe
c:\windows\system32\ntdll.dll
3772"C:\Users\admin\AppData\Local\Temp\AXLocker.exe" C:\Users\admin\AppData\Local\Temp\AXLocker.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
axlocker
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\axlocker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
4060wmic csproduct get uuidC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
2 329
Read events
2 309
Write events
20
Delete events
0

Modification events

(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASMANCS
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3772) AXLocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AXLocker_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3772AXLocker.exeC:\Users\admin\Desktop\annualbase.jpg
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\basketclub.rtf
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\cleaneffort.jpg
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\driveholidays.png
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\gomethods.png
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\oilohio.rtf
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\paypalthinking.jpg
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\septemberapplications.jpg
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Desktop\summerdie.rtf
MD5:
SHA256:
3772AXLocker.exeC:\Users\admin\Documents\airportability.rtf
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
2
Threats
7

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3772
AXLocker.exe
104.26.12.205:443
api.ipify.org
CLOUDFLARENET
US
unknown
3772
AXLocker.exe
162.159.135.232:443
discord.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 104.26.12.205
  • 104.26.13.205
  • 172.67.74.152
shared
discord.com
  • 162.159.135.232
  • 162.159.136.232
  • 162.159.137.232
  • 162.159.138.232
  • 162.159.128.233
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
3772
AXLocker.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
1080
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
3772
AXLocker.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
3772
AXLocker.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
3772
AXLocker.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
3772
AXLocker.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info