Upon execution, the ransomware attempts to determine if it is operating in a WINE environment.
It achieves this by using the GetProcAddress() API to check for the presence of the wine_get_version() function.
If this function exists, the ransomware can assume it is running in a WINE environment.
Subsequently, the ransomware alters several Event Tracing for Windows (ETW) functions, such as EtwNotificationRegister(), EtwEventRegister(), EtwEventWriteFull(), and EtwEventWrite().
It does so by substituting the initial bytes of these functions with the bytes ’48 33 C0 C3′ to bypass event tracing.
After patching ETW, the ransomware performs multiple actions on the infected system by executing a series of command lines.
These actions include deleting all shadow copies, clearing the application event logs, deleting the backup catalog, disabling the automatic startup repair feature, deleting the oldest system state backup, clearing the security event logs, and more.
Additionally, the CrossLock ransomware is designed to stop more than 500 services that could be running on the victim’s machine before proceeding with the encryption of files.