Analysis
-
max time kernel
178s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 18:47
Static task
static1
Behavioral task
behavioral1
Sample
4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe
Resource
win10v2004-20220812-en
General
-
Target
4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe
-
Size
362KB
-
MD5
5a4add9136f4bab32c9576ea03133c3e
-
SHA1
c72534ef23599b2801da50e2e7e5206c8c57ab1e
-
SHA256
4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8
-
SHA512
4c31c713cb37b68410c90f5b5c802c65c2ced6d08ce7d7ff59b4fd14a2f01481161a118fbdace4773e4291b44056076740c73f14a73beef25d21b5ac6d8b026d
-
SSDEEP
6144:KBSqu8gXoPBY1NCA/wEMWxHBzXvNWgTO3x5N22vWvLRKKAX5l++SyVI:zbVSBYj9px/1T85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 976 Avywuixyxmexxtr.exe 1320 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
pid Process 976 Avywuixyxmexxtr.exe -
Loads dropped DLL 1 IoCs
pid Process 896 4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 896 wrote to memory of 976 896 4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe 28 PID 896 wrote to memory of 976 896 4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe 28 PID 896 wrote to memory of 976 896 4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe 28 PID 896 wrote to memory of 976 896 4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe 28 PID 976 wrote to memory of 1320 976 Avywuixyxmexxtr.exe 29 PID 976 wrote to memory of 1320 976 Avywuixyxmexxtr.exe 29 PID 976 wrote to memory of 1320 976 Avywuixyxmexxtr.exe 29 PID 976 wrote to memory of 1320 976 Avywuixyxmexxtr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe"C:\Users\Admin\AppData\Local\Temp\4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\4bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:1320
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD55a4add9136f4bab32c9576ea03133c3e
SHA1c72534ef23599b2801da50e2e7e5206c8c57ab1e
SHA2564bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8
SHA5124c31c713cb37b68410c90f5b5c802c65c2ced6d08ce7d7ff59b4fd14a2f01481161a118fbdace4773e4291b44056076740c73f14a73beef25d21b5ac6d8b026d
-
Filesize
362KB
MD55a4add9136f4bab32c9576ea03133c3e
SHA1c72534ef23599b2801da50e2e7e5206c8c57ab1e
SHA2564bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8
SHA5124c31c713cb37b68410c90f5b5c802c65c2ced6d08ce7d7ff59b4fd14a2f01481161a118fbdace4773e4291b44056076740c73f14a73beef25d21b5ac6d8b026d
-
Filesize
362KB
MD55a4add9136f4bab32c9576ea03133c3e
SHA1c72534ef23599b2801da50e2e7e5206c8c57ab1e
SHA2564bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8
SHA5124c31c713cb37b68410c90f5b5c802c65c2ced6d08ce7d7ff59b4fd14a2f01481161a118fbdace4773e4291b44056076740c73f14a73beef25d21b5ac6d8b026d
-
Filesize
362KB
MD55a4add9136f4bab32c9576ea03133c3e
SHA1c72534ef23599b2801da50e2e7e5206c8c57ab1e
SHA2564bf65d181881bbc86ad154f3352acd2ebb5f76893c9e7b3b05230726d1a7e3b8
SHA5124c31c713cb37b68410c90f5b5c802c65c2ced6d08ce7d7ff59b4fd14a2f01481161a118fbdace4773e4291b44056076740c73f14a73beef25d21b5ac6d8b026d