Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 02:49
Static task
static1
Behavioral task
behavioral1
Sample
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe
Resource
win10v2004-20220721-en
General
-
Target
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe
-
Size
821KB
-
MD5
685634dac8b4c2b9429e80f8cd572563
-
SHA1
2c55e2ae8fc5b9426144b1045739552198ea8461
-
SHA256
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
-
SHA512
b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 1924 Avywuixyxmexxtr.exe 1256 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
pid Process 1924 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
pid Process 1584 59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe 1584 59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1924 1584 59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe 28 PID 1584 wrote to memory of 1924 1584 59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe 28 PID 1584 wrote to memory of 1924 1584 59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe 28 PID 1584 wrote to memory of 1924 1584 59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe 28 PID 1924 wrote to memory of 1256 1924 Avywuixyxmexxtr.exe 29 PID 1924 wrote to memory of 1256 1924 Avywuixyxmexxtr.exe 29 PID 1924 wrote to memory of 1256 1924 Avywuixyxmexxtr.exe 29 PID 1924 wrote to memory of 1256 1924 Avywuixyxmexxtr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe"C:\Users\Admin\AppData\Local\Temp\59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w1283⤵
- Executes dropped EXE
PID:1256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD5685634dac8b4c2b9429e80f8cd572563
SHA12c55e2ae8fc5b9426144b1045739552198ea8461
SHA25659cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
SHA512b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4
-
Filesize
821KB
MD5685634dac8b4c2b9429e80f8cd572563
SHA12c55e2ae8fc5b9426144b1045739552198ea8461
SHA25659cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
SHA512b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4
-
Filesize
821KB
MD5685634dac8b4c2b9429e80f8cd572563
SHA12c55e2ae8fc5b9426144b1045739552198ea8461
SHA25659cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
SHA512b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4
-
Filesize
821KB
MD5685634dac8b4c2b9429e80f8cd572563
SHA12c55e2ae8fc5b9426144b1045739552198ea8461
SHA25659cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
SHA512b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4
-
Filesize
821KB
MD5685634dac8b4c2b9429e80f8cd572563
SHA12c55e2ae8fc5b9426144b1045739552198ea8461
SHA25659cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
SHA512b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4