Number Of samples
1
Verified Malware Samples
Yes, this only contains malware
Threat Analysis report
Disclaimer

This test shows how an antivirus behaves with certain threats, in a specific environment and under certain conditions.
We encourage you to compare these results with others and take informed decisions on what security products to use.
Before buying an antivirus you should consider factors such as price, ease of use, compatibility and support. Installing a free trial version allows an antivirus to be tested in everyday use before purchase.

Der.Reisende

Level 37
Content Creator
MWT-Tester
Verified
Joined
Dec 27, 2014
Messages
2,665
Operating System
Windows 10
Antivirus
Tencent
#3
Containment: Shadow Defender v1.4.0.680
Guest/OS: Win10 Home v1809 (Build 17763.195)
Product: Tencent PC Manager v12.3.26596.901 (Tencent Cloud Protection engine + Bitdefender Local Antivirus Engine)
Static (On-demand scan): 1/1
Dynamic (On execution - bonus dynamic test with Realtime Protection turned off): 0/1
Total: 1/1
SUD: N/A
VPN: Windscribe v1.83 b18
System Status: clean (signatures) / infected (bonus test, AutoRun and Lockscreen when ran manually (!!!) from desktop)
Files encrypted: no
update.png
static.png
Tencent PC Manager Global:
Realtime protection mode: Expert mode (Prompt upon detecting suspect actions)
File system protection level: High (monitor all file operations)
Action on threat detection: Choose action manually
Download Protection: Security prompt on dangerous files only
TastatuLocker V1.exe opens an installer. As long as the user does not run the file from desktop, nothing happens. Executing the installed malware opens a Screenlocker, easily shut down via Task Manager. Does set an AutoRun (detected and removed by TCPM Realtime Protection or on QuickScan). However, no files were harmed. MISS.
run_tast.png run_tast2.png run_tast3.png run_tast4.png run_tast5.png
PE.png TCP_PE.png autorun.png autorun_manual.png files.png 2o.png NPE_detail.png
Thank you @erreale for the file!
Norton Power Eraser (NPE) entries: Baidu registry entries belong to TPCM installation. The registry hijack for "openas\command" appears once an inital installation of TCPM has been in-app upgraded. It's safe.
 

Daniel Hidalgo

Level 33
MWT-Tester
Verified
Joined
Mar 17, 2015
Messages
2,262
Operating System
Windows 10
Antivirus
Kaspersky
#4
Containment: VMware® Workstation Pro 14.1.1 build-7528167 & Shadow Defender 1.4.0.672
Guest/OS: Windows 10 PRO 64bits
Product: McAfee Internet Security 2019 V.16.0 (Default Settings)
Static/Contextual Scan: 0/1
Total: 0/ 1
SUD: YES
Update
1546556129995.png
Static Scan
1546556391571.png
SUD
1546556559087.png
 

Daniel Hidalgo

Level 33
MWT-Tester
Verified
Joined
Mar 17, 2015
Messages
2,262
Operating System
Windows 10
Antivirus
Kaspersky
#5
Containment: VMware® Workstation Pro 14.1.1 build-7528167 & Shadow Defender 1.4.0.672
Guest/OS: Windows 8.1 HOME build 9600 x64 bits
Product: ESET Internet Security 2019 V. 12.0.31.0 (Custom Settings)
Static (On-demand scan): 1/1
Dynamic (On execution): 0/1
Total: 1/1
SUD: NO
VPN: Avira Phatom VPN v. 2.18.1.30309
System Status: CLEAN
Files encrypted: NONE
Bonus Test
System Status: INFECTED
Files encrypted: NONE
Caputra de configuracion 1.png Caputra de configuracion 2.png Caputra de configuracion 3.png Caputra de configuracion 4.png Caputra de configuracion 5.png Caputra de configuracion 6.png Caputra de configuracion 7.png Caputra de configuracion 8.png Caputra de configuracion 9.png
1546547725330.png
1546547950968.png
Bonus Test
Disable Real Time Protection
Sample TastatuLockerV1,msi MISS
Process msiexec.exe, tastatu.exe
Connections No connections used
Perform an installation and create a direct access to the software that attempts to block the PC, is finalized by the Task Manager, ESET did not perform any intervention


1546548252807.png 1546548252807.png 1546548269234.png 1546548281323.png 1546548427912.png 1546548438926.png 1546548689373.png 1546548748598.png
Remove Samples Folder
Run Ccleaner
The system has the installed software whereby the system ends up being infected
Process Explorer: SAFE
Autoruns SAFE
1546548660555.png
INFECTED
1546553660316.png
 

harlan4096

Moderator
MalwareTips Team
MWT-Tester
Verified
Joined
Apr 28, 2015
Messages
4,232
Operating System
Windows 10
Antivirus
Kaspersky
#6
Containment: VMWare WorkStation Pro 15.0.2-10952284 (running over Windows 10 Pro x64 Build 1809-17763)
Guest/OS: Windows 10 Pro x64 Build 1809-17763
Product: KSCloud Free 2019 19.0.0.1088 / VPN: Kaspersky Secure Connection
Tweaked Settings

Static/Contextual Scan: 0 / 1 - Total: 0 / 1 - SUD: 1
U.png
ST.png
S.png
__________

MWHub Monthly Statistics & Reports
 

harlan4096

Moderator
MalwareTips Team
MWT-Tester
Verified
Joined
Apr 28, 2015
Messages
4,232
Operating System
Windows 10
Antivirus
Kaspersky
#7
Containment: VMWare WorkStation Pro 15.0.2-10952284 (running over Windows 10 Pro x64 Build 1809-17763)
Guest/OS: Windows 10 Pro x64 Build 1809-17763
Product: KSCloud Free 2019 19.0.0.1088 / VPN: Kaspersky Secure Connection
Tweaked Settings

Dynamic/On Execution Scan: 1 / 1 - Total: 1 / 1
1 by Dangerous Application Behaviour (PDM:Trojan)
Files Encrypted: No - Second Opinion Scanners: All Clean - System Final Status: Protected

Location: Almería (Spain) CET
Samples Pack Posted: 03/01/2019 03:53pm
Dynamic Test Started: 03/01/2019 07:31pm

* (Hit) TastatuLockerV1.msi: installed a legit applications in C:\Program Files\, detected/deleted upon execution by Dangerous/Suspicious Application Behaviour (PDM:Trojan). Original installer remained untouched.

1A.png 1B.png

_____________________________________________________________________

After testing samples dynamically I ran AutoRuns and Comodo AutoRuns:

AR.png

Warning: All original samples from the extracted folder were deleted manually before run Second Opinion Scanners, except those who are still active running on system and/or are referred in a registry key in Windows AutoRuns sections.

ZAM (Full System Scan + C:\ProgramData + C:\...\<user account>\AppData\) HMP WiseVector -> All Clean, System Protected:

SOS.png

Thanks to @erreale !

Kaspersky VirusDesk Final Verdict:
Hello, New malicious software was found in the attached file. Its detection will be included in the next update.

TastatuLockerV1.msi - Trojan.MSIL.Locker.as

Thank you for your help.
Best regards,
__________

MWHub Monthly Statistics & Reports
 

omidomi

Level 64
MWT-Tester
Verified
Joined
Apr 5, 2014
Messages
5,381
Operating System
Windows 8.1
Antivirus
Kaspersky
#8
Containment :Virtual Box 5.2.22
Guest/OS : Windows 7 Ultimate 86X
Product: WebRoot IS (9.0.24.37) - Default Setting
Static(On-demand scan): 0/1
Dynamic(On execution) : 0/1
Total :0/1
SUD : 1
VPN: Security Kiss Tunnel 0.3.2
File encrypted: No
Second Opinion Scanners: All Clean
System Final Status: Protected
lets run sample , try to Install Microsoft Net framework 4.6.1 ,install against run sample,No alert from Webroot or any Active malware in memory
PE & Autorun reported safe:

HMP & Zemana(full,custom) & NPE repoted safe:

thanks for the sample