Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-07-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe
Resource
win10v20210410
General
-
Target
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe
-
Size
362KB
-
MD5
3921543c211364b4827c55aeeef5260c
-
SHA1
4b7f71b8e7f228dbb0d296120b6f6f455d22248c
-
SHA256
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
-
SHA512
e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
suricata: ET MALWARE Zeus GameOver Possible DGA NXDOMAIN Responses
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1736 Avywuixyxmexxtr.exe 1952 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 1736 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exeAvywuixyxmexxtr.exepid process 1016 d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe 1736 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exeAvywuixyxmexxtr.exedescription pid process target process PID 1016 wrote to memory of 1736 1016 d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe Avywuixyxmexxtr.exe PID 1016 wrote to memory of 1736 1016 d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe Avywuixyxmexxtr.exe PID 1016 wrote to memory of 1736 1016 d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe Avywuixyxmexxtr.exe PID 1016 wrote to memory of 1736 1016 d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe Avywuixyxmexxtr.exe PID 1736 wrote to memory of 1952 1736 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1736 wrote to memory of 1952 1736 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1736 wrote to memory of 1952 1736 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1736 wrote to memory of 1952 1736 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe"C:\Users\Admin\AppData\Local\Temp\d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
MD5
3921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
MD5
3921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
MD5
3921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
MD5
3921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e