Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 03:37
Static task
static1
Behavioral task
behavioral1
Sample
7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe
Resource
win10v2004-20220901-en
General
-
Target
7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe
-
Size
1009KB
-
MD5
60a5f960e38af6942569af03492e4086
-
SHA1
e1a8ad4a82f2fceadb9d1fd46168030f8047c092
-
SHA256
7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e
-
SHA512
641172cf4bec42cfcf78512fa68bfb731045ff70049f7212af412ed91881416256c3fb390cb85c744ce437580758424dfbfde4db62cbcdfd0a103c917247352a
-
SSDEEP
12288:0BAlraFSO2vpEnhqg9GuF+lrnBRMQdod5rL+/yfY3C2ww6WGpVaL7VZ:0iFRahqgS9FyfYTr6XpVaLb
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1532 Avywuixyxmexxtr.exe 2020 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 1532 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exepid process 1108 7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe 1108 7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exeAvywuixyxmexxtr.exedescription pid process target process PID 1108 wrote to memory of 1532 1108 7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe Avywuixyxmexxtr.exe PID 1108 wrote to memory of 1532 1108 7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe Avywuixyxmexxtr.exe PID 1108 wrote to memory of 1532 1108 7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe Avywuixyxmexxtr.exe PID 1108 wrote to memory of 1532 1108 7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe Avywuixyxmexxtr.exe PID 1532 wrote to memory of 2020 1532 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1532 wrote to memory of 2020 1532 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1532 wrote to memory of 2020 1532 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1532 wrote to memory of 2020 1532 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe"C:\Users\Admin\AppData\Local\Temp\7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\7fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w12c3⤵
- Executes dropped EXE
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1009KB
MD560a5f960e38af6942569af03492e4086
SHA1e1a8ad4a82f2fceadb9d1fd46168030f8047c092
SHA2567fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e
SHA512641172cf4bec42cfcf78512fa68bfb731045ff70049f7212af412ed91881416256c3fb390cb85c744ce437580758424dfbfde4db62cbcdfd0a103c917247352a
-
Filesize
1009KB
MD560a5f960e38af6942569af03492e4086
SHA1e1a8ad4a82f2fceadb9d1fd46168030f8047c092
SHA2567fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e
SHA512641172cf4bec42cfcf78512fa68bfb731045ff70049f7212af412ed91881416256c3fb390cb85c744ce437580758424dfbfde4db62cbcdfd0a103c917247352a
-
Filesize
1009KB
MD560a5f960e38af6942569af03492e4086
SHA1e1a8ad4a82f2fceadb9d1fd46168030f8047c092
SHA2567fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e
SHA512641172cf4bec42cfcf78512fa68bfb731045ff70049f7212af412ed91881416256c3fb390cb85c744ce437580758424dfbfde4db62cbcdfd0a103c917247352a
-
Filesize
1009KB
MD560a5f960e38af6942569af03492e4086
SHA1e1a8ad4a82f2fceadb9d1fd46168030f8047c092
SHA2567fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e
SHA512641172cf4bec42cfcf78512fa68bfb731045ff70049f7212af412ed91881416256c3fb390cb85c744ce437580758424dfbfde4db62cbcdfd0a103c917247352a
-
Filesize
1009KB
MD560a5f960e38af6942569af03492e4086
SHA1e1a8ad4a82f2fceadb9d1fd46168030f8047c092
SHA2567fac039c61c137a2e71a9224a2fcb729d25cd5aa8c3b135f1aaa7cb69044e18e
SHA512641172cf4bec42cfcf78512fa68bfb731045ff70049f7212af412ed91881416256c3fb390cb85c744ce437580758424dfbfde4db62cbcdfd0a103c917247352a