Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows7_x64 -
resource
win7 -
submitted
01-09-2020 13:28
Static task
static1
Behavioral task
behavioral1
Sample
Avaddon Ransomware.exe
Resource
win7
Behavioral task
behavioral2
Sample
Avaddon Ransomware.exe
Resource
win10v200722
General
-
Target
Avaddon Ransomware.exe
-
Size
719KB
-
MD5
275e4a63fc63c995b3e0d464919f211b
-
SHA1
51d85210c2f621ca14d92a8375ee24d62f9d7f44
-
SHA256
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46
-
SHA512
1723fb4a624859cb49f1d00100a44c5104a8a6ee4685b0e0988fa54f929dc7d70d171034577a17db2e6529d6c19b49d2ba023c4c98e9637f92981a3c1a5c9dac
Malware Config
Extracted
C:\Users\Admin\Contacts\BOIxz_readme_.txt
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\BOIxz_readme_.txt
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\BOIxz_readme_.txt
http://avaddonbotrxmuyl.onion
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Avaddon Ransomware.exedescription ioc process File renamed C:\Users\Admin\Pictures\ConfirmResume.tif => C:\Users\Admin\Pictures\ConfirmResume.tif.bcbDBdACDc Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\SkipUpdate.png => C:\Users\Admin\Pictures\SkipUpdate.png.bcbDBdACDc Avaddon Ransomware.exe -
Processes:
Avaddon Ransomware.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Avaddon Ransomware.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
Avaddon Ransomware.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-1131729243-447456001-3632642222-1000\desktop.ini Avaddon Ransomware.exe -
Enumerates connected drives 3 TTPs
-
Modifies service 2 TTPs 4 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 1820 vssadmin.exe 2004 vssadmin.exe 512 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 739 IoCs
Processes:
Avaddon Ransomware.exepid process 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe 1344 Avaddon Ransomware.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
wmic.exevssvc.exewmic.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 1704 wmic.exe Token: SeSecurityPrivilege 1704 wmic.exe Token: SeTakeOwnershipPrivilege 1704 wmic.exe Token: SeLoadDriverPrivilege 1704 wmic.exe Token: SeSystemProfilePrivilege 1704 wmic.exe Token: SeSystemtimePrivilege 1704 wmic.exe Token: SeProfSingleProcessPrivilege 1704 wmic.exe Token: SeIncBasePriorityPrivilege 1704 wmic.exe Token: SeCreatePagefilePrivilege 1704 wmic.exe Token: SeBackupPrivilege 1704 wmic.exe Token: SeRestorePrivilege 1704 wmic.exe Token: SeShutdownPrivilege 1704 wmic.exe Token: SeDebugPrivilege 1704 wmic.exe Token: SeSystemEnvironmentPrivilege 1704 wmic.exe Token: SeRemoteShutdownPrivilege 1704 wmic.exe Token: SeUndockPrivilege 1704 wmic.exe Token: SeManageVolumePrivilege 1704 wmic.exe Token: 33 1704 wmic.exe Token: 34 1704 wmic.exe Token: 35 1704 wmic.exe Token: SeBackupPrivilege 1620 vssvc.exe Token: SeRestorePrivilege 1620 vssvc.exe Token: SeAuditPrivilege 1620 vssvc.exe Token: SeIncreaseQuotaPrivilege 1892 wmic.exe Token: SeSecurityPrivilege 1892 wmic.exe Token: SeTakeOwnershipPrivilege 1892 wmic.exe Token: SeLoadDriverPrivilege 1892 wmic.exe Token: SeSystemProfilePrivilege 1892 wmic.exe Token: SeSystemtimePrivilege 1892 wmic.exe Token: SeProfSingleProcessPrivilege 1892 wmic.exe Token: SeIncBasePriorityPrivilege 1892 wmic.exe Token: SeCreatePagefilePrivilege 1892 wmic.exe Token: SeBackupPrivilege 1892 wmic.exe Token: SeRestorePrivilege 1892 wmic.exe Token: SeShutdownPrivilege 1892 wmic.exe Token: SeDebugPrivilege 1892 wmic.exe Token: SeSystemEnvironmentPrivilege 1892 wmic.exe Token: SeRemoteShutdownPrivilege 1892 wmic.exe Token: SeUndockPrivilege 1892 wmic.exe Token: SeManageVolumePrivilege 1892 wmic.exe Token: 33 1892 wmic.exe Token: 34 1892 wmic.exe Token: 35 1892 wmic.exe Token: SeIncreaseQuotaPrivilege 108 wmic.exe Token: SeSecurityPrivilege 108 wmic.exe Token: SeTakeOwnershipPrivilege 108 wmic.exe Token: SeLoadDriverPrivilege 108 wmic.exe Token: SeSystemProfilePrivilege 108 wmic.exe Token: SeSystemtimePrivilege 108 wmic.exe Token: SeProfSingleProcessPrivilege 108 wmic.exe Token: SeIncBasePriorityPrivilege 108 wmic.exe Token: SeCreatePagefilePrivilege 108 wmic.exe Token: SeBackupPrivilege 108 wmic.exe Token: SeRestorePrivilege 108 wmic.exe Token: SeShutdownPrivilege 108 wmic.exe Token: SeDebugPrivilege 108 wmic.exe Token: SeSystemEnvironmentPrivilege 108 wmic.exe Token: SeRemoteShutdownPrivilege 108 wmic.exe Token: SeUndockPrivilege 108 wmic.exe Token: SeManageVolumePrivilege 108 wmic.exe Token: 33 108 wmic.exe Token: 34 108 wmic.exe Token: 35 108 wmic.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Avaddon Ransomware.exedescription pid process target process PID 1344 wrote to memory of 1704 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1704 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1704 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1704 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1820 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 1820 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 1820 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 1820 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 1892 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1892 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1892 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 1892 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 2004 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 2004 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 2004 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 2004 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 108 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 108 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 108 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 108 1344 Avaddon Ransomware.exe wmic.exe PID 1344 wrote to memory of 512 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 512 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 512 1344 Avaddon Ransomware.exe vssadmin.exe PID 1344 wrote to memory of 512 1344 Avaddon Ransomware.exe vssadmin.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
Avaddon Ransomware.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Avaddon Ransomware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Avaddon Ransomware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Avaddon Ransomware.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Avaddon Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Avaddon Ransomware.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1344 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1820
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2004
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:512
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1620