Analysis
-
max time kernel
600s -
max time network
602s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe
Resource
win10v2004-20220901-en
General
-
Target
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe
-
Size
362KB
-
MD5
3921543c211364b4827c55aeeef5260c
-
SHA1
4b7f71b8e7f228dbb0d296120b6f6f455d22248c
-
SHA256
d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
-
SHA512
e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
SSDEEP
6144:5vUC68qdnE8dF49BpAoWvcUZUq1XvNWgTO3x5N22vWvLRKKAX5l++SyVI:pxCRE8dQvWBZU6/1T85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 1928 Avywuixyxmexxtr.exe 1424 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
pid Process 1928 Avywuixyxmexxtr.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1928 1980 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe 28 PID 1980 wrote to memory of 1928 1980 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe 28 PID 1980 wrote to memory of 1928 1980 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe 28 PID 1980 wrote to memory of 1928 1980 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe 28 PID 1928 wrote to memory of 1424 1928 Avywuixyxmexxtr.exe 29 PID 1928 wrote to memory of 1424 1928 Avywuixyxmexxtr.exe 29 PID 1928 wrote to memory of 1424 1928 Avywuixyxmexxtr.exe 29 PID 1928 wrote to memory of 1424 1928 Avywuixyxmexxtr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a_unpacked.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:1424
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD53921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
Filesize
362KB
MD53921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
Filesize
362KB
MD53921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e
-
Filesize
362KB
MD53921543c211364b4827c55aeeef5260c
SHA14b7f71b8e7f228dbb0d296120b6f6f455d22248c
SHA256d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d
SHA512e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e