Analysis
-
max time kernel
188s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe
Resource
win10v2004-20220414-en
General
-
Target
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe
-
Size
355KB
-
MD5
f1e2de2a9135138ef5b15093612dd813
-
SHA1
ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
-
SHA256
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
-
SHA512
134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1984 Avywuixyxmexxtr.exe 852 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 1984 Avywuixyxmexxtr.exe -
Loads dropped DLL 1 IoCs
Processes:
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exepid process 2032 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exeAvywuixyxmexxtr.exedescription pid process target process PID 2032 wrote to memory of 1984 2032 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe Avywuixyxmexxtr.exe PID 2032 wrote to memory of 1984 2032 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe Avywuixyxmexxtr.exe PID 2032 wrote to memory of 1984 2032 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe Avywuixyxmexxtr.exe PID 2032 wrote to memory of 1984 2032 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe Avywuixyxmexxtr.exe PID 1984 wrote to memory of 852 1984 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1984 wrote to memory of 852 1984 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1984 wrote to memory of 852 1984 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1984 wrote to memory of 852 1984 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe"C:\Users\Admin\AppData\Local\Temp\136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7