Analysis
-
max time kernel
14s -
max time network
17s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-01-2022 07:04
Static task
static1
Behavioral task
behavioral1
Sample
app/decryptor_avos2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
app/decryptor_avos2.exe
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
app/linux/decryptor.elf
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
app/linux/decryptor.elf
Resource
win10-en-20211208
General
-
Target
app/linux/decryptor.elf
-
Size
1.5MB
-
MD5
a39b4bea47c4d123f8195a3ffb638a1b
-
SHA1
e60ef891027ac1dade9562f8b1de866186338da1
-
SHA256
cdca6936b880ab4559d3d96101e38f0cf58b87d07b0c7bf708d078c2bf209460
-
SHA512
0d18fa871226bfc4b353e14e114b30af174a0161cd5af308d2c9bbe6f9ccca9689d92a6b0c571ba37a322aa92bb37ed8a3264ab61fda84fba0e777225b370215
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.elf\ = "elf_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\elf_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\elf_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\elf_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\elf_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.elf rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\elf_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\elf_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 1644 AcroRd32.exe 1644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1540 wrote to memory of 756 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 756 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 756 1540 cmd.exe rundll32.exe PID 756 wrote to memory of 1644 756 rundll32.exe AcroRd32.exe PID 756 wrote to memory of 1644 756 rundll32.exe AcroRd32.exe PID 756 wrote to memory of 1644 756 rundll32.exe AcroRd32.exe PID 756 wrote to memory of 1644 756 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\app\linux\decryptor.elf1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\app\linux\decryptor.elf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\app\linux\decryptor.elf"3⤵
- Suspicious use of SetWindowsHookEx
PID:1644
-
-