Analysis
-
max time kernel
83s -
max time network
72s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
23-01-2022 13:55
Static task
static1
Behavioral task
behavioral1
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win10-en-20211208
General
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
-
Size
919KB
-
MD5
40f2238875fcbd2a92cfefc4846a15a8
-
SHA1
06dce6a5df6ee0099602863a47e2cdeea4e34764
-
SHA256
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2
-
SHA512
8ab1a2124a67e91a4e1842b5f600f977d3d72d398b64ee690c297a04b733e60e01fe4383a1fdf25bb412bc1294d69c5402bd60159c3125bdfb709d024c8e04b8
Malware Config
Extracted
C:\GET_YOUR_FILES_BACK.txt
avoslocker
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exedescription ioc process File renamed C:\Users\Admin\Pictures\ImportRevoke.tif => C:\Users\Admin\Pictures\ImportRevoke.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File opened for modification C:\Users\Admin\Pictures\ResetOptimize.tiff 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\StartInstall.tif => C:\Users\Admin\Pictures\StartInstall.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\OpenRedo.tiff => C:\Users\Admin\Pictures\OpenRedo.tiff.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\WriteRename.crw => C:\Users\Admin\Pictures\WriteRename.crw.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\HideRename.raw => C:\Users\Admin\Pictures\HideRename.raw.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File opened for modification C:\Users\Admin\Pictures\RegisterConfirm.tiff 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\RegisterConfirm.tiff => C:\Users\Admin\Pictures\RegisterConfirm.tiff.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\ResetOptimize.tiff => C:\Users\Admin\Pictures\ResetOptimize.tiff.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File opened for modification C:\Users\Admin\Pictures\OpenRedo.tiff 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe -
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\97717462.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\1361672858.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2032 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 3132 taskmgr.exe Token: SeSystemProfilePrivilege 3132 taskmgr.exe Token: SeCreateGlobalPrivilege 3132 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe 3132 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"1⤵
- Modifies extensions of user files
PID:3080
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3132
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:756
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
651c844ad8ffea0473fc70cc13ff2e47
SHA1f904db3a0e77df893d39cb41fe4297589db82459
SHA256f55ec710e56442344196f3612207118d89f877a79a6f8028db520631ace0fa0b
SHA51291ca8247d673d8381ca5edc394e86956844218ae291e20480817a5a93ae6e4573af419e3d571815030a375de16e85fd5ec7693331aa6753fe07b88e15701fcae