Malware Analysis Report

2025-01-02 15:34

Sample ID 210528-alj99hr4f2
Target dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9
SHA256 dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9
Tags
ransomware avaddon
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9

Threat Level: Known bad

The file dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9 was found to be: Known bad.

Malicious Activity Summary

ransomware avaddon

Avaddon Ransomware

Avaddon family

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-05-28 10:58

Signatures

Avaddon Ransomware

ransomware
Description Indicator Process Target
N/A N/A N/A N/A

Avaddon family

avaddon

Analysis: behavioral1

Detonation Overview

Submitted

2021-05-28 10:58

Reported

2021-05-28 11:01

Platform

win7v20210408

Max time kernel

4s

Max time network

35s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9.dll

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2012 wrote to memory of 1448 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9.dll

Network

N/A

Files

memory/2012-59-0x000007FEFB891000-0x000007FEFB893000-memory.dmp

memory/1448-60-0x0000000000000000-mapping.dmp

memory/1448-61-0x00000000760B1000-0x00000000760B3000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2021-05-28 10:58

Reported

2021-05-28 11:00

Platform

win10v20210410

Max time kernel

120s

Max time network

147s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9.dll

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4048 wrote to memory of 692 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4048 wrote to memory of 692 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4048 wrote to memory of 692 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\dee8bd7d0581fdf8bf058c39f917723072c416b4128ca6ed313a064306d1f3f9.dll

Network

Country Destination Domain Proto
N/A 10.10.0.17:56046 tcp
N/A 10.10.0.26:52421 tcp
N/A 10.10.0.15:58424 tcp
N/A 10.10.0.33:49864 tcp
N/A 10.10.0.24:58812 tcp
N/A 10.10.0.23:50703 tcp
N/A 10.10.0.10:64412 tcp
N/A 10.10.0.18:51920 tcp
N/A 10.10.0.27:52487 tcp
N/A 10.10.0.29:56477 tcp
N/A 10.10.0.22:64483 tcp

Files

memory/692-114-0x0000000000000000-mapping.dmp