Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 19:26
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
776KB
-
MD5
764c9db67ee35531d30351e6090790ea
-
SHA1
cfce16907d2de28580a4aa84e1331630693c9994
-
SHA256
ea8aac95160933ae46880376807706daacee9f13728080085d727a771e7d99f5
-
SHA512
2bc4d60a90a87682adfd4c2127cce9ba08c17f0a8cabb45bda41be8793060ba0d89d2ad4ab391ecdd77354a42cb5f90c43624696cb0c280ef287903b660af09e
-
SSDEEP
12288:hgpSlh7IYnO8MHuBmP0xdB8S9WwxxNkS:hqYngS4wf
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 992 Avywuixyxmexxtr.exe 1708 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 992 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.exepid process 1380 Trojan-Ransom.Win32.Blocker.exe 1380 Trojan-Ransom.Win32.Blocker.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.exeAvywuixyxmexxtr.exedescription pid process target process PID 1380 wrote to memory of 992 1380 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1380 wrote to memory of 992 1380 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1380 wrote to memory of 992 1380 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1380 wrote to memory of 992 1380 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 992 wrote to memory of 1708 992 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 992 wrote to memory of 1708 992 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 992 wrote to memory of 1708 992 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 992 wrote to memory of 1708 992 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
776KB
MD5764c9db67ee35531d30351e6090790ea
SHA1cfce16907d2de28580a4aa84e1331630693c9994
SHA256ea8aac95160933ae46880376807706daacee9f13728080085d727a771e7d99f5
SHA5122bc4d60a90a87682adfd4c2127cce9ba08c17f0a8cabb45bda41be8793060ba0d89d2ad4ab391ecdd77354a42cb5f90c43624696cb0c280ef287903b660af09e
-
Filesize
776KB
MD5764c9db67ee35531d30351e6090790ea
SHA1cfce16907d2de28580a4aa84e1331630693c9994
SHA256ea8aac95160933ae46880376807706daacee9f13728080085d727a771e7d99f5
SHA5122bc4d60a90a87682adfd4c2127cce9ba08c17f0a8cabb45bda41be8793060ba0d89d2ad4ab391ecdd77354a42cb5f90c43624696cb0c280ef287903b660af09e
-
Filesize
776KB
MD5764c9db67ee35531d30351e6090790ea
SHA1cfce16907d2de28580a4aa84e1331630693c9994
SHA256ea8aac95160933ae46880376807706daacee9f13728080085d727a771e7d99f5
SHA5122bc4d60a90a87682adfd4c2127cce9ba08c17f0a8cabb45bda41be8793060ba0d89d2ad4ab391ecdd77354a42cb5f90c43624696cb0c280ef287903b660af09e
-
Filesize
776KB
MD5764c9db67ee35531d30351e6090790ea
SHA1cfce16907d2de28580a4aa84e1331630693c9994
SHA256ea8aac95160933ae46880376807706daacee9f13728080085d727a771e7d99f5
SHA5122bc4d60a90a87682adfd4c2127cce9ba08c17f0a8cabb45bda41be8793060ba0d89d2ad4ab391ecdd77354a42cb5f90c43624696cb0c280ef287903b660af09e
-
Filesize
776KB
MD5764c9db67ee35531d30351e6090790ea
SHA1cfce16907d2de28580a4aa84e1331630693c9994
SHA256ea8aac95160933ae46880376807706daacee9f13728080085d727a771e7d99f5
SHA5122bc4d60a90a87682adfd4c2127cce9ba08c17f0a8cabb45bda41be8793060ba0d89d2ad4ab391ecdd77354a42cb5f90c43624696cb0c280ef287903b660af09e