Analysis
-
max time kernel
49s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-01-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win10v2004-en-20220113
General
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
-
Size
919KB
-
MD5
40f2238875fcbd2a92cfefc4846a15a8
-
SHA1
06dce6a5df6ee0099602863a47e2cdeea4e34764
-
SHA256
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2
-
SHA512
8ab1a2124a67e91a4e1842b5f600f977d3d72d398b64ee690c297a04b733e60e01fe4383a1fdf25bb412bc1294d69c5402bd60159c3125bdfb709d024c8e04b8
Malware Config
Extracted
C:\GET_YOUR_FILES_BACK.txt
avoslocker
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exedescription ioc process File renamed C:\Users\Admin\Pictures\BlockSave.png => C:\Users\Admin\Pictures\BlockSave.png.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\BackupEnable.tif => C:\Users\Admin\Pictures\BackupEnable.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\EditDisconnect.tif => C:\Users\Admin\Pictures\EditDisconnect.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\SelectDisable.raw => C:\Users\Admin\Pictures\SelectDisable.raw.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\UnprotectCompare.raw => C:\Users\Admin\Pictures\UnprotectCompare.raw.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\ConnectOptimize.png => C:\Users\Admin\Pictures\ConnectOptimize.png.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\ConvertBackup.crw => C:\Users\Admin\Pictures\ConvertBackup.crw.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\ConvertFromRead.tif => C:\Users\Admin\Pictures\ConvertFromRead.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2548 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
TextInputHost.exepid process 2188 TextInputHost.exe 2188 TextInputHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"1⤵
- Modifies extensions of user files
PID:1772
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2548
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
651c844ad8ffea0473fc70cc13ff2e47
SHA1f904db3a0e77df893d39cb41fe4297589db82459
SHA256f55ec710e56442344196f3612207118d89f877a79a6f8028db520631ace0fa0b
SHA51291ca8247d673d8381ca5edc394e86956844218ae291e20480817a5a93ae6e4573af419e3d571815030a375de16e85fd5ec7693331aa6753fe07b88e15701fcae