Analysis
-
max time kernel
75s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
01-09-2020 13:28
Static task
static1
Behavioral task
behavioral1
Sample
Avaddon Ransomware.exe
Resource
win7
Behavioral task
behavioral2
Sample
Avaddon Ransomware.exe
Resource
win10v200722
General
-
Target
Avaddon Ransomware.exe
-
Size
719KB
-
MD5
275e4a63fc63c995b3e0d464919f211b
-
SHA1
51d85210c2f621ca14d92a8375ee24d62f9d7f44
-
SHA256
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46
-
SHA512
1723fb4a624859cb49f1d00100a44c5104a8a6ee4685b0e0988fa54f929dc7d70d171034577a17db2e6529d6c19b49d2ba023c4c98e9637f92981a3c1a5c9dac
Malware Config
Extracted
C:\Users\Admin\Desktop\LwZt1_readme_.txt
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\LwZt1_readme_.txt
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\LwZt1_readme_.txt
http://avaddonbotrxmuyl.onion
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Avaddon Ransomware.exedescription ioc process File renamed C:\Users\Admin\Pictures\MountRead.tiff => C:\Users\Admin\Pictures\MountRead.tiff.adDAaaDeCc Avaddon Ransomware.exe File opened for modification C:\Users\Admin\Pictures\RedoUnprotect.tiff Avaddon Ransomware.exe File opened for modification C:\Users\Admin\Pictures\RevokeBackup.tiff Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\PopSwitch.crw => C:\Users\Admin\Pictures\PopSwitch.crw.adDAaaDeCc Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\WatchLock.tiff => C:\Users\Admin\Pictures\WatchLock.tiff.adDAaaDeCc Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\RedoUnprotect.tiff => C:\Users\Admin\Pictures\RedoUnprotect.tiff.adDAaaDeCc Avaddon Ransomware.exe File opened for modification C:\Users\Admin\Pictures\InstallBackup.tiff Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\GetLimit.png => C:\Users\Admin\Pictures\GetLimit.png.adDAaaDeCc Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\RevokeBackup.tiff => C:\Users\Admin\Pictures\RevokeBackup.tiff.adDAaaDeCc Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\InstallBackup.tiff => C:\Users\Admin\Pictures\InstallBackup.tiff.adDAaaDeCc Avaddon Ransomware.exe File opened for modification C:\Users\Admin\Pictures\WatchLock.tiff Avaddon Ransomware.exe File opened for modification C:\Users\Admin\Pictures\MountRead.tiff Avaddon Ransomware.exe File renamed C:\Users\Admin\Pictures\JoinDisconnect.tif => C:\Users\Admin\Pictures\JoinDisconnect.tif.adDAaaDeCc Avaddon Ransomware.exe -
Processes:
Avaddon Ransomware.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Avaddon Ransomware.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
Avaddon Ransomware.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-1400429095-533421673-2598934218-1000\desktop.ini Avaddon Ransomware.exe -
Enumerates connected drives 3 TTPs
-
Modifies service 2 TTPs 4 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 2512 vssadmin.exe 944 vssadmin.exe 2068 vssadmin.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 239874fe7480d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 614 IoCs
Processes:
Avaddon Ransomware.exepid process 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe 500 Avaddon Ransomware.exe -
Suspicious use of AdjustPrivilegeToken 68 IoCs
Processes:
svchost.exewmic.exevssvc.exewmic.exewmic.exedescription pid process Token: SeShutdownPrivilege 1080 svchost.exe Token: SeCreatePagefilePrivilege 1080 svchost.exe Token: SeIncreaseQuotaPrivilege 3932 wmic.exe Token: SeSecurityPrivilege 3932 wmic.exe Token: SeTakeOwnershipPrivilege 3932 wmic.exe Token: SeLoadDriverPrivilege 3932 wmic.exe Token: SeSystemProfilePrivilege 3932 wmic.exe Token: SeSystemtimePrivilege 3932 wmic.exe Token: SeProfSingleProcessPrivilege 3932 wmic.exe Token: SeIncBasePriorityPrivilege 3932 wmic.exe Token: SeCreatePagefilePrivilege 3932 wmic.exe Token: SeBackupPrivilege 3932 wmic.exe Token: SeRestorePrivilege 3932 wmic.exe Token: SeShutdownPrivilege 3932 wmic.exe Token: SeDebugPrivilege 3932 wmic.exe Token: SeSystemEnvironmentPrivilege 3932 wmic.exe Token: SeRemoteShutdownPrivilege 3932 wmic.exe Token: SeUndockPrivilege 3932 wmic.exe Token: SeManageVolumePrivilege 3932 wmic.exe Token: 33 3932 wmic.exe Token: 34 3932 wmic.exe Token: 35 3932 wmic.exe Token: 36 3932 wmic.exe Token: SeBackupPrivilege 196 vssvc.exe Token: SeRestorePrivilege 196 vssvc.exe Token: SeAuditPrivilege 196 vssvc.exe Token: SeIncreaseQuotaPrivilege 3020 wmic.exe Token: SeSecurityPrivilege 3020 wmic.exe Token: SeTakeOwnershipPrivilege 3020 wmic.exe Token: SeLoadDriverPrivilege 3020 wmic.exe Token: SeSystemProfilePrivilege 3020 wmic.exe Token: SeSystemtimePrivilege 3020 wmic.exe Token: SeProfSingleProcessPrivilege 3020 wmic.exe Token: SeIncBasePriorityPrivilege 3020 wmic.exe Token: SeCreatePagefilePrivilege 3020 wmic.exe Token: SeBackupPrivilege 3020 wmic.exe Token: SeRestorePrivilege 3020 wmic.exe Token: SeShutdownPrivilege 3020 wmic.exe Token: SeDebugPrivilege 3020 wmic.exe Token: SeSystemEnvironmentPrivilege 3020 wmic.exe Token: SeRemoteShutdownPrivilege 3020 wmic.exe Token: SeUndockPrivilege 3020 wmic.exe Token: SeManageVolumePrivilege 3020 wmic.exe Token: 33 3020 wmic.exe Token: 34 3020 wmic.exe Token: 35 3020 wmic.exe Token: 36 3020 wmic.exe Token: SeIncreaseQuotaPrivilege 3544 wmic.exe Token: SeSecurityPrivilege 3544 wmic.exe Token: SeTakeOwnershipPrivilege 3544 wmic.exe Token: SeLoadDriverPrivilege 3544 wmic.exe Token: SeSystemProfilePrivilege 3544 wmic.exe Token: SeSystemtimePrivilege 3544 wmic.exe Token: SeProfSingleProcessPrivilege 3544 wmic.exe Token: SeIncBasePriorityPrivilege 3544 wmic.exe Token: SeCreatePagefilePrivilege 3544 wmic.exe Token: SeBackupPrivilege 3544 wmic.exe Token: SeRestorePrivilege 3544 wmic.exe Token: SeShutdownPrivilege 3544 wmic.exe Token: SeDebugPrivilege 3544 wmic.exe Token: SeSystemEnvironmentPrivilege 3544 wmic.exe Token: SeRemoteShutdownPrivilege 3544 wmic.exe Token: SeUndockPrivilege 3544 wmic.exe Token: SeManageVolumePrivilege 3544 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Avaddon Ransomware.exedescription pid process target process PID 500 wrote to memory of 3932 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 3932 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 3932 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 2512 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 2512 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 2512 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 3020 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 3020 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 3020 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 944 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 944 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 944 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 3544 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 3544 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 3544 500 Avaddon Ransomware.exe wmic.exe PID 500 wrote to memory of 2068 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 2068 500 Avaddon Ransomware.exe vssadmin.exe PID 500 wrote to memory of 2068 500 Avaddon Ransomware.exe vssadmin.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
Avaddon Ransomware.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Avaddon Ransomware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Avaddon Ransomware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Avaddon Ransomware.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Avaddon Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Avaddon Ransomware.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:500 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2512
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:944
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2068
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:196