Analysis
-
max time kernel
14s -
max time network
21s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 07:04
Static task
static1
Behavioral task
behavioral1
Sample
app/decryptor_avos2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
app/decryptor_avos2.exe
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
app/linux/decryptor.elf
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
app/linux/decryptor.elf
Resource
win10-en-20211208
General
-
Target
app/linux/decryptor.elf
-
Size
1.5MB
-
MD5
a39b4bea47c4d123f8195a3ffb638a1b
-
SHA1
e60ef891027ac1dade9562f8b1de866186338da1
-
SHA256
cdca6936b880ab4559d3d96101e38f0cf58b87d07b0c7bf708d078c2bf209460
-
SHA512
0d18fa871226bfc4b353e14e114b30af174a0161cd5af308d2c9bbe6f9ccca9689d92a6b0c571ba37a322aa92bb37ed8a3264ab61fda84fba0e777225b370215
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 504 OpenWith.exe