Analysis
-
max time kernel
189s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-06-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe
Resource
win10v2004-20220414-en
General
-
Target
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe
-
Size
355KB
-
MD5
f1e2de2a9135138ef5b15093612dd813
-
SHA1
ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
-
SHA256
136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
-
SHA512
134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 2028 Avywuixyxmexxtr.exe 4212 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3404 wrote to memory of 2028 3404 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe 81 PID 3404 wrote to memory of 2028 3404 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe 81 PID 3404 wrote to memory of 2028 3404 136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe 81 PID 2028 wrote to memory of 4212 2028 Avywuixyxmexxtr.exe 82 PID 2028 wrote to memory of 4212 2028 Avywuixyxmexxtr.exe 82 PID 2028 wrote to memory of 4212 2028 Avywuixyxmexxtr.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe"C:\Users\Admin\AppData\Local\Temp\136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2603⤵
- Executes dropped EXE
PID:4212
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7
-
Filesize
355KB
MD5f1e2de2a9135138ef5b15093612dd813
SHA1ea64129f9634ce8a7c3f5e0dd8c2e70af46ae8a5
SHA256136e8991816b958bb76aaf22fefd18194cf78a80e95d572754f95e1f86149a65
SHA512134f737dd1ec3dc7800ef96191cc81c5ae97b2ac882d77464fab8c585b838763793e5a521df1dbcd5399955e1e32a08f2d45612b06151b805ab8aa003f79dfb7