Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Lockscreen
Trojan:Win32/Lockscreen!MSR is a highly malicious screen-locking Trojan that prevents user access to the infected computer, often demanding payment. It actively disables security software and Task Manager to hinder removal, employs various evasion and persistence techniques, and may attempt to modify the Master Boot Record (MBR) making the system unbootable.
Relevant strings associated with this threat: - SmartAssembly.Attributes (PEHSTR_EXT) - Tastatu has locked your comptuer for using leaked software! (PEHSTR_EXT) - This porgram has disabled task manager and antiviruses. (PEHSTR_EXT) - \Tastatu\obj\Debug\Tastatu.pdb (PEHSTR_EXT) - C:\MBR.bin (PEHSTR_EXT) - C:\Users\Public\monkeiii.dll (PEHSTR_EXT) - /c TASKKILL /F /FI "Imagename ne (PEHSTR_EXT) - AntiWinLockerTray.exe (PEHSTR_EXT) - Jenit_s_Screen_Locker (PEHSTR) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Immediately isolate the infected machine. Boot into Safe Mode with Networking or a Windows Recovery Environment to perform an offline scan with updated antivirus software. If the MBR is compromised, use `bootrec /fixmbr` or similar tools for recovery. Identify and remove any created persistence mechanisms (scheduled tasks, startup entries). Due to its evasive nature and potential MBR corruption, a full system reimage is highly recommended.