Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-10-2022 17:05
Static task
static1
Behavioral task
behavioral1
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win10v2004-20220812-en
General
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
-
Size
919KB
-
MD5
40f2238875fcbd2a92cfefc4846a15a8
-
SHA1
06dce6a5df6ee0099602863a47e2cdeea4e34764
-
SHA256
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2
-
SHA512
8ab1a2124a67e91a4e1842b5f600f977d3d72d398b64ee690c297a04b733e60e01fe4383a1fdf25bb412bc1294d69c5402bd60159c3125bdfb709d024c8e04b8
-
SSDEEP
24576:ID7x8JDwepWTu/g6YvOkAT5OdAP6tfKf2J9lb:Ifx8JDwepWaOvOkANOdS6BT9V
Malware Config
Extracted
C:\GET_YOUR_FILES_BACK.txt
avoslocker
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exedescription ioc process File renamed C:\Users\Admin\Pictures\ConvertFromDismount.png => C:\Users\Admin\Pictures\ConvertFromDismount.png.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\InvokeImport.tif => C:\Users\Admin\Pictures\InvokeImport.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe File renamed C:\Users\Admin\Pictures\LimitCompress.tif => C:\Users\Admin\Pictures\LimitCompress.tif.avos2 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"1⤵
- Modifies extensions of user files
PID:1688
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2272