Analysis Overview
SHA256
03d32c3ac340e03040062f742e65ef906a7feaac005631bdff99c2a2897b5100
Threat Level: Known bad
The file 03d32c3ac340e03040062f742e65ef906a7feaac005631bdff99c2a2897b5100 was found to be: Known bad.
Malicious Activity Summary
Avaddon Ransomware
Avaddon family
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2021-05-28 10:42
Signatures
Avaddon Ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Avaddon family
Analysis: behavioral1
Detonation Overview
Submitted
2021-05-28 10:42
Reported
2021-05-28 10:45
Platform
win7v20210410
Max time kernel
122s
Max time network
124s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1640 wrote to memory of 2044 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\03d32c3ac340e03040062f742e65ef906a7feaac005631bdff99c2a2897b5100.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\03d32c3ac340e03040062f742e65ef906a7feaac005631bdff99c2a2897b5100.dll
Network
Files
memory/1640-59-0x000007FEFB881000-0x000007FEFB883000-memory.dmp
memory/2044-60-0x0000000000000000-mapping.dmp
memory/2044-61-0x0000000075631000-0x0000000075633000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-05-28 10:42
Reported
2021-05-28 10:45
Platform
win10v20210408
Max time kernel
35s
Max time network
54s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 784 wrote to memory of 1304 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 784 wrote to memory of 1304 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 784 wrote to memory of 1304 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\03d32c3ac340e03040062f742e65ef906a7feaac005631bdff99c2a2897b5100.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\03d32c3ac340e03040062f742e65ef906a7feaac005631bdff99c2a2897b5100.dll
Network
Files
memory/1304-114-0x0000000000000000-mapping.dmp