Analysis
-
max time kernel
160s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 09:38
Static task
static1
Behavioral task
behavioral1
Sample
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe
Resource
win10v2004-20220901-en
General
-
Target
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe
-
Size
352KB
-
MD5
a93d75cb6f72c1847c3f5afc9c94bbbb
-
SHA1
016409e124f98d565c5a5fa3d3b2428152259df7
-
SHA256
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
-
SHA512
ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
SSDEEP
6144:Y3Q7OlkZayQFnE0oqCtBK/OLyUsn07wWQshOBqSTeaybz+ffB:v/rWZoqf/OCPIOMj1P+
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 112 Avywuixyxmexxtr.exe 1068 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 112 Avywuixyxmexxtr.exe -
Loads dropped DLL 1 IoCs
Processes:
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exepid process 1888 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exeAvywuixyxmexxtr.exedescription pid process target process PID 1888 wrote to memory of 112 1888 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 1888 wrote to memory of 112 1888 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 1888 wrote to memory of 112 1888 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 1888 wrote to memory of 112 1888 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 112 wrote to memory of 1068 112 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 112 wrote to memory of 1068 112 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 112 wrote to memory of 1068 112 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 112 wrote to memory of 1068 112 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe"C:\Users\Admin\AppData\Local\Temp\724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5