Win32/LockScreen [Threat Name] go to Threat

Win32/LockScreen.S [Threat Variant Name]

Category trojan
Size 667648 B
Aliases Trojan-Ransom.Win32.Agent.bi (Kaspersky)
  Ransom!c (McAfee)
  Trojan.Winlock.origin (Dr.Web)
Short description

Win32/LockScreen.S is a trojan that blocks access to the Windows operating system. To regain access to the operating system the user is asked to send an SMS message to a specified telephone number in exchange for a password. When the correct password is entered the trojan removes itself from the computer.

Installation

The trojan does not create any copies of itself.


Other information

The trojan displays the following dialog box:

When the correct password is entered the trojan removes itself from the computer.


The trojan acquires data and commands from a remote computer or the Internet. The trojan connects to the following addresses:

  • http://window.a1agregator.ru

The password to regain access to the operating system is one of the following:

  • 935106

Some examples follow.


Example [1.] :

Example [2.] :

Example [3.] :

The trojan may delete the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoFind]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoFolderOptions]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoRecentDocsMenu]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoDesktop]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoRun]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoLogOff]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoNetHood]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoTrayContextMenu]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoSetTaskbar]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoFavoritesMenu]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoViewContextMenu]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­RestrictRun]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoSetFolders]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoCommonGroups]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoDrives]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­policies\­Explorer\­NoHelp]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­System\­CurrentControlSet\­Control\­Keyboard Layout\­Scancode Map]
  • [HKEY_CURRENT_USER\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­System\­DisableTaskMgr]
  • [HKEY_CURRENT_USER\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­System\­DisableRegistryTools]
  • [HKEY_CURRENT_USER\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­Explorer\­RestrictRun]
  • [HKEY_CURRENT_USER\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­Explorer\­RestrictRun\­1]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­SYSTEM\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
  • [HKEY_CURRENT_USER\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings\­ProxyServer]
  • [HKEY_CURRENT_USER\­SYSTEM\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings\­ProxyOverride]
  • [HKEY_CURRENT_USER\­SYSTEM\­Software\­Microsoft\­Windows\­CurrentVersion\­Internet Settings\­AutoConfigURL]

The trojan may turn off the computer.

Please enable Javascript to ensure correct displaying of this content and refresh this page.