Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 15:47
Static task
static1
Behavioral task
behavioral1
Sample
362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe
Resource
win10v2004-20220901-en
General
-
Target
362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe
-
Size
736KB
-
MD5
a09aac1c1901f88e3bc87430d028718d
-
SHA1
5a63efde486b7f6d8c78b606bd02a07769a7b3b3
-
SHA256
362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e
-
SHA512
b1f11873196dbb49a55ad41fd54bc342e93b0185bff30bd03c6bd10dbad930a0cda30c69c34df03fecba34e08a2854675f8adb49c6ab58f05e6a769a16de315b
-
SSDEEP
12288:cFOCGlc1srI4hLyfoWA5o8nvwla94iQNES0GkoKf9L:cmWic40QWA+8vwW4iQN10H
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 1160 Avywuixyxmexxtr.exe 956 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
pid Process 1160 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe 2036 362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1160 2036 362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe 26 PID 2036 wrote to memory of 1160 2036 362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe 26 PID 2036 wrote to memory of 1160 2036 362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe 26 PID 2036 wrote to memory of 1160 2036 362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe 26 PID 1160 wrote to memory of 956 1160 Avywuixyxmexxtr.exe 27 PID 1160 wrote to memory of 956 1160 Avywuixyxmexxtr.exe 27 PID 1160 wrote to memory of 956 1160 Avywuixyxmexxtr.exe 27 PID 1160 wrote to memory of 956 1160 Avywuixyxmexxtr.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe"C:\Users\Admin\AppData\Local\Temp\362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w12c3⤵
- Executes dropped EXE
PID:956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736KB
MD5a09aac1c1901f88e3bc87430d028718d
SHA15a63efde486b7f6d8c78b606bd02a07769a7b3b3
SHA256362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e
SHA512b1f11873196dbb49a55ad41fd54bc342e93b0185bff30bd03c6bd10dbad930a0cda30c69c34df03fecba34e08a2854675f8adb49c6ab58f05e6a769a16de315b
-
Filesize
736KB
MD5a09aac1c1901f88e3bc87430d028718d
SHA15a63efde486b7f6d8c78b606bd02a07769a7b3b3
SHA256362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e
SHA512b1f11873196dbb49a55ad41fd54bc342e93b0185bff30bd03c6bd10dbad930a0cda30c69c34df03fecba34e08a2854675f8adb49c6ab58f05e6a769a16de315b
-
Filesize
736KB
MD5a09aac1c1901f88e3bc87430d028718d
SHA15a63efde486b7f6d8c78b606bd02a07769a7b3b3
SHA256362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e
SHA512b1f11873196dbb49a55ad41fd54bc342e93b0185bff30bd03c6bd10dbad930a0cda30c69c34df03fecba34e08a2854675f8adb49c6ab58f05e6a769a16de315b
-
Filesize
736KB
MD5a09aac1c1901f88e3bc87430d028718d
SHA15a63efde486b7f6d8c78b606bd02a07769a7b3b3
SHA256362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e
SHA512b1f11873196dbb49a55ad41fd54bc342e93b0185bff30bd03c6bd10dbad930a0cda30c69c34df03fecba34e08a2854675f8adb49c6ab58f05e6a769a16de315b
-
Filesize
736KB
MD5a09aac1c1901f88e3bc87430d028718d
SHA15a63efde486b7f6d8c78b606bd02a07769a7b3b3
SHA256362e2a76a5a851dde0dd6f29a07846343170a7a36cf5305e1b4cd4973278b60e
SHA512b1f11873196dbb49a55ad41fd54bc342e93b0185bff30bd03c6bd10dbad930a0cda30c69c34df03fecba34e08a2854675f8adb49c6ab58f05e6a769a16de315b