Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 23:07
Static task
static1
Behavioral task
behavioral1
Sample
2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe
Resource
win10v2004-20220812-en
General
-
Target
2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe
-
Size
544KB
-
MD5
6136e79fbbe4cfbadcace9fa3d015170
-
SHA1
3ff9da637427740e373f032c99cf6e29ad27e37a
-
SHA256
2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662
-
SHA512
57fc2e764acb17b5b145f51e5b1fc22a79a028750c155ab8de8ffddfd65e97e7cf61f5984fffe182c9cfef6f0e97b6e25e570910e76609c8741735a0f17a6ddd
-
SSDEEP
12288:GAp4xkuItDWc2jR8bn1gdUMDhRGm7sHpeSVyPK8rnSnznL84W7DprS:GA7ZKHRen1g/R17sHpXyPKsSnznLXoU
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 1644 Avywuixyxmexxtr.exe 2024 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
pid Process 1644 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
pid Process 1820 2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe 1820 2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1644 1820 2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe 28 PID 1820 wrote to memory of 1644 1820 2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe 28 PID 1820 wrote to memory of 1644 1820 2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe 28 PID 1820 wrote to memory of 1644 1820 2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe 28 PID 1644 wrote to memory of 2024 1644 Avywuixyxmexxtr.exe 29 PID 1644 wrote to memory of 2024 1644 Avywuixyxmexxtr.exe 29 PID 1644 wrote to memory of 2024 1644 Avywuixyxmexxtr.exe 29 PID 1644 wrote to memory of 2024 1644 Avywuixyxmexxtr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe"C:\Users\Admin\AppData\Local\Temp\2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\2b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:2024
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD56136e79fbbe4cfbadcace9fa3d015170
SHA13ff9da637427740e373f032c99cf6e29ad27e37a
SHA2562b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662
SHA51257fc2e764acb17b5b145f51e5b1fc22a79a028750c155ab8de8ffddfd65e97e7cf61f5984fffe182c9cfef6f0e97b6e25e570910e76609c8741735a0f17a6ddd
-
Filesize
544KB
MD56136e79fbbe4cfbadcace9fa3d015170
SHA13ff9da637427740e373f032c99cf6e29ad27e37a
SHA2562b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662
SHA51257fc2e764acb17b5b145f51e5b1fc22a79a028750c155ab8de8ffddfd65e97e7cf61f5984fffe182c9cfef6f0e97b6e25e570910e76609c8741735a0f17a6ddd
-
Filesize
544KB
MD56136e79fbbe4cfbadcace9fa3d015170
SHA13ff9da637427740e373f032c99cf6e29ad27e37a
SHA2562b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662
SHA51257fc2e764acb17b5b145f51e5b1fc22a79a028750c155ab8de8ffddfd65e97e7cf61f5984fffe182c9cfef6f0e97b6e25e570910e76609c8741735a0f17a6ddd
-
Filesize
544KB
MD56136e79fbbe4cfbadcace9fa3d015170
SHA13ff9da637427740e373f032c99cf6e29ad27e37a
SHA2562b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662
SHA51257fc2e764acb17b5b145f51e5b1fc22a79a028750c155ab8de8ffddfd65e97e7cf61f5984fffe182c9cfef6f0e97b6e25e570910e76609c8741735a0f17a6ddd
-
Filesize
544KB
MD56136e79fbbe4cfbadcace9fa3d015170
SHA13ff9da637427740e373f032c99cf6e29ad27e37a
SHA2562b9c435e6c5e7a4fc2ef5a7dce9f9bc928cef5325eda8799810beb91b2287662
SHA51257fc2e764acb17b5b145f51e5b1fc22a79a028750c155ab8de8ffddfd65e97e7cf61f5984fffe182c9cfef6f0e97b6e25e570910e76609c8741735a0f17a6ddd