Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe
Resource
win10v2004-20220812-en
General
-
Target
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe
-
Size
744KB
-
MD5
7f3cc059ffc6c11fe42695e5f19553ab
-
SHA1
f22555d2898e3486b2c628a2e523657f5fbbe475
-
SHA256
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
-
SHA512
441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc
-
SSDEEP
12288:qq/OIg++nlSl1ljxOzAqzmkZh9Twx2p9SoBUkAKL9Aus+8:qq/OIYlSl/jTqzmMhwW9KgL+
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1152 Avywuixyxmexxtr.exe 2032 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 1152 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exepid process 1444 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe 1444 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exeAvywuixyxmexxtr.exedescription pid process target process PID 1444 wrote to memory of 1152 1444 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe Avywuixyxmexxtr.exe PID 1444 wrote to memory of 1152 1444 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe Avywuixyxmexxtr.exe PID 1444 wrote to memory of 1152 1444 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe Avywuixyxmexxtr.exe PID 1444 wrote to memory of 1152 1444 b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe Avywuixyxmexxtr.exe PID 1152 wrote to memory of 2032 1152 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1152 wrote to memory of 2032 1152 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1152 wrote to memory of 2032 1152 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1152 wrote to memory of 2032 1152 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe"C:\Users\Admin\AppData\Local\Temp\b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w1303⤵
- Executes dropped EXE
PID:2032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD57f3cc059ffc6c11fe42695e5f19553ab
SHA1f22555d2898e3486b2c628a2e523657f5fbbe475
SHA256b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
SHA512441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc
-
Filesize
744KB
MD57f3cc059ffc6c11fe42695e5f19553ab
SHA1f22555d2898e3486b2c628a2e523657f5fbbe475
SHA256b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
SHA512441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc
-
Filesize
744KB
MD57f3cc059ffc6c11fe42695e5f19553ab
SHA1f22555d2898e3486b2c628a2e523657f5fbbe475
SHA256b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
SHA512441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc
-
Filesize
744KB
MD57f3cc059ffc6c11fe42695e5f19553ab
SHA1f22555d2898e3486b2c628a2e523657f5fbbe475
SHA256b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
SHA512441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc
-
Filesize
744KB
MD57f3cc059ffc6c11fe42695e5f19553ab
SHA1f22555d2898e3486b2c628a2e523657f5fbbe475
SHA256b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
SHA512441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc