Analysis
-
max time kernel
169s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 18:44
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
870KB
-
MD5
e93af50428fcc74af931bfed7a1dc1b2
-
SHA1
9d49afd20fdd7b02944c149c86e5d94038d2311f
-
SHA256
19013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
-
SHA512
2f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
SSDEEP
12288:DoqwmCU3rRTTClQzzBnBwbwZ04htC5hDHsrY+oC9Q7ICnqDNs7Q+sSG61OMk+xID:klQN/TBBw0Z0KE5hDHeH3wqa7Q+O0
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1124 Avywuixyxmexxtr.exe 1728 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 1124 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.exepid process 1620 Trojan-Ransom.Win32.Blocker.exe 1620 Trojan-Ransom.Win32.Blocker.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.exeAvywuixyxmexxtr.exedescription pid process target process PID 1620 wrote to memory of 1124 1620 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1620 wrote to memory of 1124 1620 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1620 wrote to memory of 1124 1620 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1620 wrote to memory of 1124 1620 Trojan-Ransom.Win32.Blocker.exe Avywuixyxmexxtr.exe PID 1124 wrote to memory of 1728 1124 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1124 wrote to memory of 1728 1124 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1124 wrote to memory of 1728 1124 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1124 wrote to memory of 1728 1124 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w12c3⤵
- Executes dropped EXE
PID:1728
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981